Giter Club home page Giter Club logo

osquery-attck's Introduction

Osquery-ATT&CK

Osquery-ATT&CK

The goal of this repository is to try to map the MITRE ATT&CK with the Osquery for enterprise threat hunting.

Each conf file is a Query Pack that can be used enterprise threat hunting wit osquery.

Mapping the MITRE ATT&CK Matrix with Osquery

I try to create Osquery pack that can cover some elements of the ATT&CK

Query Pack Descriprion

Windows

  • windows-registry-monitoring.conf : Track all the change in the registry for malware persistency. The registry path are the path that can be find here: https://attack.mitre.org/wiki/Persistence. A second article that explain some persistency method https://www.countercept.com/our-thinking/hunting-for-application-shim-databases
  • windows-incorrect_parent_process.conf : This check verify if some attackers or malware try to execute a legitimate process in a malicious way
  • windows-incorrect_path_process.conf : This check verify if some attackers or malware try to execute a legitimate process in a wrong path.. so it looks suspicious :)
  • windows-process_no_disk_binary.conf : This check retrieve events related to prcesso that do not have binary file on disk.
  • windows_powershell_events.conf : This check retrieve events generated by PowerShell from the powershell_events table. Osquery reads the Microsoft-Windows-PowerShell eventlog channel, so you need to enable (http://bit.ly/2LvjSXn) Script block logging.
  • windows_system_running_processes.conf : This check retrieve the running process on the system.
  • windows_persistence-startup_items.conf : This check retrieve the program that start when the OS start.
  • windows_service-persistence.conf : This check retrive the service that start automatically
  • windows_critical_service_status.conf : This check retrive critical service status change. So is possible to catch the attackers that stop a critical service like Windows Firewall Service.
  • windows_scheduled_tasks.conf : This check retrive scheduled tasks of the system
  • network_connection_listening.conf : This check retrive the network connection of the system and the listening port
  • windows_anomaly_process-execution.conf : This Check try to catch anomaly process execution in the Enterprise environment.
  • windows_generic_detection.conf : This is a generic detection query pack.
  • windows_browsere-extensions.conf : This check retrive the IExplorer and Chrome Browser browsere extensions.
  • windows_new_dir_relevant_infection_path.conf : This check retrive new directory creation under common path used by the malware for install and store file.
  • windows_new_file_relevant_infection_path.conf : This check retrive new file creation under common path used by the malware for install and store file. This check return also the MD5 so you can double check with your Threat Intelligence, Virustotal website or other tools.

Linux

  • linux_network_connections.conf : This check retrive the network connection of the system, the listening port and possible reverse shell on the system (Thanks @clong).
  • generic_linux.conf : Generic query for retrieve useful info for SIEM side anomaly detection
  • linux_running_processes.conf : This check retrive the system running processes list with CMDLINE not null.
  • linux_local_job_scheduling.conf : This check retrive local job scheduling with Cron
  • linux_command_execution.conf : This check retrive the shell_history for each users on the system
  • linux_home_root_hidden_file_directory.conf : This check retrive hidden file and directory in home and root path
  • linux_relevant_folder_check.conf : This check retrive hidden file and directory in relevant path must be review before used
  • linux_users_check.conf : This check retrive create and deleted account, all logged in users and last logged in users
  • linux_browser_extensions.conf : This check retrive Chrome, Firefox and Opera extensions (Thanks @FritzX6)
  • linux_kernel_modules_and_extensions.conf : This check try to retrive loading, unloading, and manipulating modules on Linux systems

ATT&CK MAPPING

Windows ATT&CK MAPPING

  • windows-registry-monitoring.conf
    • ATT&CK: T1015,T1138,T1131,T1037,T1128,T1060,T1180,T1004,T1058,T1103,T1112
  • windows-incorrect_parent_process.conf
    • ATT&CK: T1173,T1086,T1204,T1183
  • windows_powershell_events.conf
    • ATT&CK: T1086,T1064
  • windows_system_running_processes.conf
    • ATT&CK: T1034,T1121,T1117,T1085
  • windows_persistence-startup_items.conf
    • ATT&CK: T1060
  • windows_service-persistence.conf
    • ATT&CK: T1050
  • windows_critical_service_status.conf
    • ATT&CK: T1089
  • windows_scheduled_tasks.conf
    • ATT&CK: T1053
  • network_connection_listening.conf
    • ATT&CK: T1086,T1093,T1020,T1041,T1011,T1029,T1043,T1090,T1094,T1024,T1008,T1219,T1105,T1065
  • windows_anomaly_process-execution.conf
    • ATT&CK: T1191,T1118,T1059,T1170,T1086,T1117,T1053,T1035,T1197,T1128,T1134,T1126,T1087,T1201,T1069,T1057,T1012,T1018,T1063,T1082,T1049,T1007,T1124,T1076
  • windows_generic_detection.conf
    • ATT&CK: T1136,T1078,T1116,T1075,T1097
  • windows_browsere-extensions.conf
    • ATT&CK: T1176
  • windows_new_dir_relevant_infection_path.conf
    • ATT&CK: T1034,T1074,T1044,T1060,T1023
  • windows_new_file_relevant_infection_path.conf
    • ATT&CK: T1034,T1074,T1044,T1060,T1023

Linux ATT&CK MAPPING

  • linux_network_connections.conf
    • ATT&CK: T1108,T1100,T1102,T1105,T1039,T1029,T1011,T1041,T1048,T1020,T1094,,T1043T1065,T1071,T1219,T1104,T1008,T1001,T1132,T1090
  • generic_linux.conf
    • ATT&CK: T1059,T1169,T1206,T1025,T1052
  • linux_running_processes.cond
    • ATT&CK: T1059,T1108,T1166,T1100,T1064,T1107,T1003,T1033,T1016,T1082,T1057,T1201,T1083,T1217,T1087,T1072,T1002
  • linux_local_job_scheduling.conf
    • ATT&CK: T1168
  • linux_command_execution.conf
    • ATT&CK: T1064,T1059,T1153,T1166,T1100,T1055,T1222,T1107,T1146,T1081,T1003,T1033,T1016,T1082,T1201,T1083,T1217,T1087
  • linux_home_root_hidden_file_directory.conf
    • ATT&CK: T1158,T1100
  • linux_relevant_folder_check.conf
    • ATT&CK: T1158,T1100
  • linux_users_check.conf
    • ATT&CK: T1136,T1078
  • linux_browser_extensions.conf
    • ATT&CK: T1176
  • linux_kernel_modules_and_extensions.conf
    • ATT&CK: T1215

Notes

  • The query interval of each conf file is not tuned, so please test it in a test environment (suggestions are welcome)
  • Suggestions and improvements are welcome for each query pack conf file.
  • All the query output must sent to system like ELK or Splunk that correlate and alert.
  • For linux_relevant_folder_check.conf the WHERE clause must tuned to adjust the query for your environments needs
  • The project has just started, so stick around ;)

osquery-attck's People

Contributors

teoseller avatar srozb avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.