This pack introduces the JARM indicator type and commands for generating new JARM fingerprints of servers using TLS.
Overview
The JARM pack for Cortex XSOAR leverages a the pyJARM library for generating JARM fingerprints. pyJARM is based on the original Salesforce research and implementation for fingerprinting servers using TLS. JARM is an active Transport Layer Security (TLS) server fingerprinting tool.
JARM can be useful in a number of use-cases including:
- Verifying that a group of servers share the same TLS configuration.
- Comparing JARM fingerprints to the fingerprints of known malicious actors to identify servers that may belong to a specific threat actor.
- Identifying whether your own servers are using the expected TLS configuration by comparing with a Known-good server.
JARM is an active fingerprinting tool, which means that generating a JARM fingerprint requires making multiple connections to the target server. Specifically, the JARM fingerprinting uses 10 custom crafted TLS client hello packets to generate the raw information necessary for fingerprinting.
You can read more about how JARM works here.
JARM Indicator Type
This pack includes the JARM indicator type with its own layout.
The JARM fingerprint is a 62 digit hexadecimal string and is compatible with auto-extract.
Indicator Fields
This following are the indicator fields for the JARM indicator layout.
- JARM Fingerprint (primary key)
- JARM Hosts (the hosts that originated this fingerprint). It is a tag field comprised of IP/FQDN:Port
Integrations
This pack includes an integration that implements the following Command.
- jarm-fingerprint - Accepts a host (FQDN or IP) and a port to attempt to generate a JARM fingerprint for.
Overview
The JARM pack for Cortex XSIAM leverages a the pyJARM library for generating JARM fingerprints. pyJARM is based on the original Salesforce research and implementation for fingerprinting servers using TLS. JARM is an active Transport Layer Security (TLS) server fingerprinting tool.
JARM can be useful in a number of use-cases including:
- Verifying that a group of servers share the same TLS configuration.
- Comparing JARM fingerprints to the fingerprints of known malicious actors to identify servers that may belong to a specific threat actor.
- Identifying whether your own servers are using the expected TLS configuration by comparing with a Known-good server.
JARM is an active fingerprinting tool, which means that generating a JARM fingerprint requires making multiple connections to the target server. Specifically, the JARM fingerprinting uses 10 custom crafted TLS client hello packets to generate the raw information necessary for fingerprinting.
You can read more about how JARM works here.
JARM Indicator Type
This pack includes the JARM indicator type with its own layout.
The JARM fingerprint is a 62 digit hexadecimal string and is compatible with auto-extract.
Indicator Fields
This following are the indicator fields for the JARM indicator layout.
- JARM Fingerprint (primary key)
- JARM Hosts (the hosts that originated this fingerprint). It is a tag field comprised of IP/FQDN:Port
Integrations
This pack includes an integration that implements the following Command.
- jarm-fingerprint - Accepts a host (FQDN or IP) and a port to attempt to generate a JARM fingerprint for.