Mandiant-auditparser

From aldeid
Jump to: navigation, search
You are here:
AuditParser

Description

Audit Parser is a python based tool written by Ryan Kazanciyan at Mandiant. It converts the raw XML output generated by by Mandiant Intelligent Response, Redline, or IOC Finder into tab-delimited text files. These files contain extensive evidence from disk, registry, event logs, memory, and other parsed Windows artifacts that can be used for live response analysis. The tab-delimited data can easily be reviewed in spreadsheet applications like Microsoft Excel or LibreOffice Calc.

Installation

$ sudo aptitude install python-lxml
$ cd /data/src/
$ git clone https://github.com/mandiant/AuditParser.git
$ cd AuditParser/

Usage

Syntax

Usage: AuditParser.py [options]

Options

-h, --help
show this help message and exit
-i INPATH, --input=INPATH
XML input directory (req). NO TRAILING SLASHES
-o OUTPATH, --output=OUTPATH
Output directory (req). NO TRAILING SLASHES
-t, --timeline
Build timeline, requires --starttime and --endtime
--starttime=STARTTIME
Start time, format yyyy-mm-ddThh:mm:ssZ
--endtime=ENDTIME
End time, format yyyy-mm-ddThh:mm:ssZ

Examples

Output

$ python AuditParser.py -i /data/tmp/20130329114223/ -o /data/tmp/ioc/
Parsing input file: /data/tmp/20130329114223/mir.w32ports.2d093875.xml
Parsing input file: /data/tmp/20130329114223/mir.w32drivers-modulelist.7c57415e.xml
Parsing input file: /data/tmp/20130329114223/mir.w32prefetch.735e3327.xml
Parsing input file: /data/tmp/20130329114223/mir.w32services.652d723b.xml
Parsing input file: /data/tmp/20130329114223/mir.w32kernel-hookdetection.08637537.xml
Parsing input file: /data/tmp/20130329114223/mir.w32useraccounts.101b2855.xml
Parsing input file: /data/tmp/20130329114223/mir.w32volumes.1a1e453a.xml
Parsing input file: /data/tmp/20130329114223/mir.filedownloadhistory.130a6e43.xml
Parsing input file: /data/tmp/20130329114223/mir.w32network-dns.67124311.xml
Parsing input file: /data/tmp/20130329114223/mir.w32registryapi.232c5a3b.xml
Parsing input file: /data/tmp/20130329114223/mir.w32processes-memory.1e571f14.xml
Parsing input file: /data/tmp/20130329114223/mir.w32tasks.23246131.xml
Parsing input file: /data/tmp/20130329114223/mir.w32systemrestore.226f2f7e.xml
Parsing input file: /data/tmp/20130329114223/mir.formhistory.157a6f5f.xml
Parsing input file: /data/tmp/20130329114223/mir.cookiehistory.5f075330.xml
Parsing input file: /data/tmp/20130329114223/mir.w32eventlogs.4e3d0e14.xml
Parsing input file: /data/tmp/20130329114223/mir.urlhistory.57026223.xml
Parsing input file: /data/tmp/20130329114223/mir.w32network-arp.044d0a72.xml
Parsing input file: /data/tmp/20130329114223/mir.w32scripting-persistence.21467952.xml
Parsing input file: /data/tmp/20130329114223/mir.w32system.0a033e38.xml
Parsing input file: /data/tmp/20130329114223/mir.w32drivers-signature.146f3b5b.xml
Parsing input file: /data/tmp/20130329114223/mir.w32network-route.2e391015.xml
Parsing input file: /data/tmp/20130329114223/mir.w32hivelist.27321078.xml
Parsing input file: /data/tmp/20130329114223/mir.w32disks.32421969.xml
Parsing input file: /data/tmp/20130329114223/mir.w32rawfiles.546e1004.xml

It results in a serie of txt files (separator: tabulator) that you can open with Calc or Excel:

Audit-parser-csv.png

Timeline analysis

One cool feature is the ability to extract all events from a given period of time:

$ python AuditParser.py -i /data/tmp/IOC-dragondildo.exe/ -o /data/tmp/ioc/ \
  -t --starttime=2013-03-29T03:49:00Z --endtime=2013-03-29T03:53:00Z
$ cat /data/tmp/ioc/timeline.txt
Timestamp	Time Desc	RowType	User	EntryDesc	EntryData	Entry2Desc	Entry2Data
2013-03-29T03:49:23	Modified	RegistryItem	BUILTIN\Administrators	Path	HKEY_LOCAL_MACHINE\SOFTWA
RE\Macromedia\ColdFusion\CurrentVersion\Clients\38161-89880284		
2013-03-29T03:49:23	Modified	RegistryItem	BUILTIN\Administrators	Path	HKEY_LOCAL_MACHINE\SOFTWA
RE\Macromedia\ColdFusion\CurrentVersion\Clients\38161-89880284\urltoken	Text	CFID=38161&CFTOKEN=89880284
2013-03-29T03:49:23	Modified	RegistryItem	BUILTIN\Administrators	Path	HKEY_LOCAL_MACHINE\SOFTWA
RE\Macromedia\ColdFusion\CurrentVersion\Clients\38161-89880284\lastvisit	Text	{ts '2013-03-28 23:49:23'
}
2013-03-29T03:49:23	Modified	RegistryItem	BUILTIN\Administrators	Path	HKEY_LOCAL_MACHINE\SOFTWA
RE\Macromedia\ColdFusion\CurrentVersion\Clients\38161-89880284\timecreated	Text	{ts '2013-03-28 23:48:53'
}
2013-03-29T03:49:23	Modified	RegistryItem	BUILTIN\Administrators	Path	HKEY_LOCAL_MACHINE\SOFTWA
RE\Macromedia\ColdFusion\CurrentVersion\Clients\38161-89880284\hitcount	Text	2
2013-03-29T03:49:23	Modified	RegistryItem	BUILTIN\Administrators	Path	HKEY_LOCAL_MACHINE\SOFTWA
RE\Macromedia\ColdFusion\CurrentVersion\Clients\38161-89880284\cftoken	Text	89880284
2013-03-29T03:49:23	Modified	RegistryItem	BUILTIN\Administrators	Path	HKEY_LOCAL_MACHINE\SOFTWA
RE\Macromedia\ColdFusion\CurrentVersion\Clients\38161-89880284\cfid	Text	38161
2013-03-29T03:50:17	Modified	RegistryItem	BUILTIN\Administrators	Path	HKEY_LOCAL_MACHINE\SOFTWA
RE\Macromedia\ColdFusion\CurrentVersion\Clients\38166-29139396		
2013-03-29T03:50:17	Modified	RegistryItem	BUILTIN\Administrators	Path	HKEY_LOCAL_MACHINE\SOFTWA
RE\Macromedia\ColdFusion\CurrentVersion\Clients\38166-29139396\urltoken	Text	CFID=38166&CFTOKEN=29139396
2013-03-29T03:50:17	Modified	RegistryItem	BUILTIN\Administrators	Path	HKEY_LOCAL_MACHINE\SOFTWA
RE\Macromedia\ColdFusion\CurrentVersion\Clients\38166-29139396\lastvisit	Text	{ts '2013-03-28 23:50:17'
}
2013-03-29T03:50:17	Modified	RegistryItem	BUILTIN\Administrators	Path	HKEY_LOCAL_MACHINE\SOFTWA
RE\Macromedia\ColdFusion\CurrentVersion\Clients\38166-29139396\timecreated	Text	{ts '2013-03-28 23:49:47'
}
2013-03-29T03:50:17	Modified	RegistryItem	BUILTIN\Administrators	Path	HKEY_LOCAL_MACHINE\SOFTWA
RE\Macromedia\ColdFusion\CurrentVersion\Clients\38166-29139396\hitcount	Text	2
2013-03-29T03:50:17	Modified	RegistryItem	BUILTIN\Administrators	Path	HKEY_LOCAL_MACHINE\SOFTWA
RE\Macromedia\ColdFusion\CurrentVersion\Clients\38166-29139396\cftoken	Text	29139396
2013-03-29T03:50:17	Modified	RegistryItem	BUILTIN\Administrators	Path	HKEY_LOCAL_MACHINE\SOFTWA
RE\Macromedia\ColdFusion\CurrentVersion\Clients\38166-29139396\cfid	Text	38166
[REMOVED]

Comments

blog comments powered by Disqus