Nozomi Networks

Prev Next
Self Service Ingestion

Connect this data source on your own, using the Hunters platform.

TL;DR

Supported data types

3rd party detection

Hunters detection

IOC search

Search

Table name

Log format

Collection method

Nozomi Alerts

✅

nozomi_alerts

NDJSON

API


Overview

imageNozomi Networks specializes in providing cybersecurity solutions and services, particularly in the areas of operational technology (OT) and Internet of Things (IoT) security.

The core of Nozomi Networks' offerings revolves around securing critical infrastructure from cyber threats, vulnerabilities, and attacks that could lead to downtime, safety hazards, and financial losses. They leverage machine learning and artificial intelligence to monitor and analyze network traffic and device behavior in real-time, enabling them to detect anomalies, intrusions, and potential threats with high accuracy.

Supported data types

Nozomi Alerts

Table name: nozomi_alerts

Nozomi Networks Alerts are notifications generated by their cybersecurity solutions, specifically designed to inform users about potential security incidents, vulnerabilities, or other relevant events within their operational technology (OT), Internet of Things (IoT), and industrial control system (ICS) environments. These alerts are a critical component of Nozomi Networks' approach to ensuring the cybersecurity and operational integrity of critical infrastructure and industrial operations.

Send data to Hunters

Hunters support API collection for Nozomi Alerts.

To connect Nozomi Networks logs to Hunters:

  1. Follow the steps in this guide by Nozomi Networks and acquire the following information:

    • Key name

    • Key token

    • Host

  2. Complete the process on the Hunters platform, following this guide.

Expected format

Logs are expected in JSON format.

{
    "ack": false,
    "appliance_host": "a.b.com",
    "appliance_ip": null,
    "bpf_filter": "(ip host 1.2.3.4 and ip host 1.2.3.4` and (tcp port 445 or tcp port 139)) or (vlan and ip host 1.2.3.4 and ip host 1.2.3.4` and (tcp port 445 or tcp port 139))",
    "capture_device": "em1",
    "close_option": null,
    "closed_time": 0,
    "created_time": 1710254564969,
    "description": "Multiple 'access denied' events detected with protocol smb. The username '<empty>' attempted at least 40 connections in 15 seconds. Last path trying to access path",
    "dst_roles": "consumer, web_server, dns_server",
    "grouped_visible": true,
    "id": "021443c2-5042-450b-a0ac-f17915c43e2a",
    "id_dst": "1.2.3.4`",
    "id_src": "1.2.3.4",
    "ip_dst": "1.2.3.4`",
    "ip_src": "1.2.3.4",
    "is_incident": false,
    "is_security": true,
    "label_dst": "a.b.com",
    "label_src": "GIW00207",
    "mac_dst": "00:50:56:9a:97:dd",
    "mac_src": "8c:ec:4b:42:48:90",
    "name": "Multiple Access Denied events",
    "note": null,
    "parents": [],
    "playbook_contents": null,
    "port_dst": 445,
    "port_src": 62311,
    "properties": {
        "alert_data": [
            {
                "hosts": "1.2.3.4",
                "passwords": "",
                "paths": "path",
                "usernames": ""
            },
            {
                "hosts": "1.2.3.4",
                "passwords": "",
                "paths": "path",
                "usernames": ""
            },
            {
                "hosts": "1.2.3.4",
                "passwords": "",
                "paths": "path",
                "usernames": ""
            },
            {
                "hosts": "1.2.3.4",
                "passwords": "",
                "paths": "path",
                "usernames": ""
            },
            {
                "hosts": "1.2.3.4",
                "passwords": "",
                "paths": "path",
                "usernames": ""
            },
            {
                "hosts": "1.2.3.4",
                "passwords": "",
                "paths": "path",
                "usernames": ""
            },
            {
                "hosts": "1.2.3.4",
                "passwords": "",
                "paths": "path",
                "usernames": ""
            },
            {
                "hosts": "1.2.3.4",
                "passwords": "",
                "paths": "path",
                "usernames": ""
            },
            {
                "hosts": "1.2.3.4",
                "passwords": "",
                "paths": "path",
                "usernames": ""
            },
            {
                "hosts": "1.2.3.4",
                "passwords": "",
                "paths": "path",
                "usernames": ""
            }
        ],
        "bad_actor": "1.2.3.4",
        "from_id": "1.2.3.4",
        "is_dst_node_learned": true,
        "is_dst_public": false,
        "is_dst_reputation_bad": false,
        "is_src_node_learned": true,
        "is_src_public": false,
        "is_src_reputation_bad": false,
        "mitre_attack_enterprise": {
            "techniques": [
                {
                    "id": "T1110",
                    "name": "Brute Force",
                    "tactic": "Credential Access"
                }
            ]
        },
        "mitre_attack_for_ics": {
            "destination": {
                "types": [
                    "Engineering Workstation"
                ]
            },
            "source": {
                "types": [
                    "Engineering Workstation"
                ]
            }
        },
        "raised_by": "n2os_ids",
        "remediation_target": "1.2.3.4",
        "solution": "Investigate the host '1.2.3.4' that triggered the alert",
        "src_sec_profile": "medium",
        "to_id": "1.2.3.4`",
        "usernames": [
            "<empty>"
        ],
        "victims": [
            "1.2.3.4`"
        ]
    },
    "protocol": "smb",
    "record_created_at": 1710255014514,
    "risk": 8.0,
    "sec_profile_visible": true,
    "severity": 10,
    "src_roles": "terminal, web_server, dns_server",
    "status": "open",
    "threat_name": "",
    "time": 1710254564969,
    "trace_sha1": null,
    "trace_status": null,
    "transport_protocol": "tcp",
    "trigger_id": null,
    "trigger_type": null,
    "type_id": "SIGN:MULTIPLE-ACCESS-DENIED",
    "type_name": "Multiple Access Denied events",
    "zone_dst": "File/Print",
    "zone_src": "1234 - zone test"
}
    ```