osquery-defense-kit/README.md

96 lines
3.6 KiB
Markdown
Raw Normal View History

# osquery-defense-kit
Real-world queries for using osquery as part of your detection & response pipeline.
2022-10-13 13:11:17 +00:00
![osquery-defense-kit](images/logo-small.png?raw=true "osquery-defense-kit logo")
## Organization
2022-10-13 18:58:52 +00:00
* `detection/` - Threat detection queries tuned for alert generation.
* `response/` - Data collection to assist in responding to possible threats. Tuned for periodic evidence collection.
* `policy/` - Security policy queries tuned for alert generation.
2022-10-13 18:58:52 +00:00
Where suitable, queries are further divided up by [MITRE ATT&CK](https://attack.mitre.org/) tactics categories. Queries are periodically released in [osquery query pack](https://osquery.readthedocs.io/en/stable/deployment/configuration/#query-packs) format. See `Local Pack Generation` for more information.
## Linux Case Study: Shikitega (September 2022)
<https://cybersecurity.att.com/blogs/labs-research/shikitega-new-stealthy-malware-targeting-linux>
2022-10-13 18:58:52 +00:00
Here is a partial list of what queries would have fired an alert based on these queries:
* *Initial Dropper Execution*, detected by:
* `execution/tiny-executable-events.sql`
* `execution/tiny-executable.sql`
* *Next Stage Dropper Execution*, detected by:
* `execution/tiny-executable-events.sql`
* `execution/tiny-executable.sql`
* `execution/unexpected-shell-parents.sql`
* *Escalation Prep*, detected by:
* `execution/sketchy-fetchers.sql`
* `execution/sketchy-fetcher-events.sql`
* `c2/unexpected-talkers-linux.sql`
* `c2/exotic-command-events.sql`
* `c2/exotic-cmdline.sql`
* *Escalation Tool Execution* detected by:
* `execution/unexpected-executable-permissions.sql`
* `execution/unexpected-executable-directory-linux.sql`
* `execution/unexpected-tmp-executables.sql`
* `c2/exotic-command-events.sql`
* `c2/exotic-cmdline.sql`
* `initial_access/unexpected-shell-parents.sql`
* `evasion/missing-from-disk-linux.sql`
* *Privilege Escalation* detected by:
* `privesc/unexpected-setxid-process.sql`
* `privesc/unexpected-privilege-escalation.sql`
* `privesc/events/unexpected-privilege-escalation-events.sql`
* `evasion/name_path_mismatch.sql`
* *Persistence* detected by:
* `persistence/unexpected-cron-entries.sql`
* `execution/unexpected-executable-directory-linux.sql`
## macOS Case Study: CloudMensis (April 2022)
<https://www.welivesecurity.com/2022/07/19/i-see-what-you-did-there-look-cloudmensis-macos-spyware/>
Here is a partial list of what stages would have been detected by particular queries:
* *Initial Dropper Execution*, detected by:
* `c2/unexpected-talkers-macos.sql`
* *Second Stage Execution*, detected by:
* `execution/unexpected-executable-directory-macos.sql`
* `persistence/unexpected-launch-daemon-macos.sql`
* `execution/unexpected-mounts.sql`
* *TCC Bypass*, detected by:
* `evasion/unexpected-env-values.sql`
* *Spy Agent Execution*, detected by:
* `c2/unexpected-talkers-macos.sql`
* `execution/exotic-command-events.sql`
* `execution/unexpected-executable-directory-macos.sql`
2022-10-13 13:11:17 +00:00
2022-10-13 18:58:52 +00:00
## False Positive Policy
We endeavor to exclude real-world false positives from our `detection` queries.
Managing false positives is easier said than done - pull requests are welcome!
2022-10-14 18:19:13 +00:00
## Tag Intervals Mapping
2022-10-13 18:58:52 +00:00
2022-10-14 18:19:13 +00:00
Our base interval is 1 hour (3600s), but this interval is modified by the tags in place:
2022-10-13 18:58:52 +00:00
2022-10-14 18:19:13 +00:00
* continuous: 15 seconds
* transient: 5 minutes
* persistent: 1 hour (default)
* postmortem: 6 hours
2022-10-13 18:58:52 +00:00
2022-10-14 18:19:13 +00:00
In addition, we'll also use the following modifier tags:
2022-10-13 18:58:52 +00:00
2022-10-14 18:19:13 +00:00
* Often: 4X as often (~1m for transient, 15 minutes for persistent)
* Seldom: 2X as seldomly (10 minutes for transient, 2 hours for persistent)
2022-10-13 18:58:52 +00:00
2022-10-13 13:11:17 +00:00
## Local pack generation
Run `make packs`