LogonTracer v1.6 Released

JPCERT/CC released the latest version (v1.6) of LogonTracer, a tool to support event log analysis. Previously, LogonTracer could not investigate multiple incidents simultaneously, but this update adds support for managing multiple logs. In addition, Sigma can now be used to investigate the presence of suspicious logs in the event log. This article introduces these updates. For other updated items, please refer to the following release:

https://github.com/JPCERTCC/LogonTracer/releases/tag/v1.6.0

Log Management Feature

When investigating multiple incidents, you may sometimes want to manage logs separately for each incident or investigate multiple incidents simultaneously. On LogonTracer, logs are managed in units of "case". This feature is available when using Neo4j Enterprise Edition as the database for LogonTracer. See Neo4j webpage for more information about Neo4j Enterprise Edition. The following describes the procedure for log management using a "case". Note that the following operations can be performed only by an administrator.

1. Create a case

First, create a new case from "Add New Case".

Case creation screen
Figure 1: Case creation screen

After a case is created, you will see that the case is used as shown in Figure 2. By default, the "Default" case is used, which all users can access.

Example of navigation bar
Figure 2: Example of navigation bar

When an event log is uploaded in this state, the log is managed in the created case. If you want to use a different case, you can change case from "Change Case".

2. Limit users who can access the case

You can limit users who can access a case. Create a new user from "Add User".

User creation screen
Figure 3: User creation screen

Next, from "Add Access to Case", specify which users can access the case. If you wish to change the settings, you can do so from "Delete Access to Case".

Case setting screen
Figure 4: Case setting screen

Sigma Support

Sigma is a common format for converting log detection signatures so that they can be used by SIEM and various security products. Many Sigma rules are available in the official Sigma repository and can be effectively used to investigate logs. Refer to the Sigma GitHub repository for further information:

https://github.com/SigmaHQ/sigma

A number of rules for investigating security event logs are also available, and LogonTracer now supports investigating event logs using these Sigma rules. When uploading an event log, check "Run scan using Sigma rules" and you can see the investigation results.

Event log upload screen
Figure 5: Event log upload screen

The investigation results can be downloaded as a CSV file from the sidebar. Although Sigma rules cannot detect all suspicious logons, they should still be helpful in investigating incidents.

Downloading Sigma rule scan results
Figure 6: Downloading Sigma rule scan results

Currently, LogonTracer only supports simple detection rules and does not cover rules that span multiple logs (such as count() in the condition field) or complex condition matching. We plan to support more complex detection conditions in the future.

In Closing

The LogonTracer v1.6 update includes login screen and bug fixes in addition to the above features introduced.

Please refer to the Wiki for details on how to use the new version.

https://github.com/JPCERTCC/LogonTracer/wiki

We will keep updating LogonTracer reflecting received requests, and your Pull Requests and comments are always welcome.

Shusei Tomonaga
(Translated by Takumi Nakano)

Back
Top
Next