984f754990 | ||
---|---|---|
detection | ||
images | ||
incident_response | ||
policy | ||
.gitignore | ||
LICENSE.txt | ||
Makefile | ||
README.md |
README.md
osquery-defense-kit
Real-world queries for using osquery as part of your detection & response pipeline.
Organization
detection/
- Threat detection queries tuned for alert generation.response/
- Data collection to assist in responding to possible threats. Tuned for periodic evidence collection.policy/
- Security policy queries tuned for alert generation.
Where suitable, queries are further divided up by MITRE ATT&CK tactics categories. Queries are periodically released in osquery query pack format. See Local Pack Generation
for more information.
Linux Case Study: Shikitega (September 2022)
https://cybersecurity.att.com/blogs/labs-research/shikitega-new-stealthy-malware-targeting-linux
Here is a partial list of what queries would have fired an alert based on these queries:
- Initial Dropper Execution, detected by:
execution/tiny-executable-events.sql
execution/tiny-executable.sql
- Next Stage Dropper Execution, detected by:
execution/tiny-executable-events.sql
execution/tiny-executable.sql
execution/unexpected-shell-parents.sql
- Escalation Prep, detected by:
execution/sketchy-fetchers.sql
execution/sketchy-fetcher-events.sql
c2/unexpected-talkers-linux.sql
c2/exotic-command-events.sql
c2/exotic-cmdline.sql
- Escalation Tool Execution detected by:
execution/unexpected-executable-permissions.sql
execution/unexpected-executable-directory-linux.sql
execution/unexpected-tmp-executables.sql
c2/exotic-command-events.sql
c2/exotic-cmdline.sql
initial_access/unexpected-shell-parents.sql
evasion/missing-from-disk-linux.sql
- Privilege Escalation detected by:
privesc/unexpected-setxid-process.sql
privesc/unexpected-privilege-escalation.sql
privesc/events/unexpected-privilege-escalation-events.sql
evasion/name_path_mismatch.sql
- Persistence detected by:
persistence/unexpected-cron-entries.sql
execution/unexpected-executable-directory-linux.sql
macOS Case Study: CloudMensis (April 2022)
https://www.welivesecurity.com/2022/07/19/i-see-what-you-did-there-look-cloudmensis-macos-spyware/
Here is a partial list of what stages would have been detected by particular queries:
-
Initial Dropper Execution, detected by:
c2/unexpected-talkers-macos.sql
-
Second Stage Execution, detected by:
execution/unexpected-executable-directory-macos.sql
persistence/unexpected-launch-daemon-macos.sql
execution/unexpected-mounts.sql
-
TCC Bypass, detected by:
evasion/unexpected-env-values.sql
-
Spy Agent Execution, detected by:
c2/unexpected-talkers-macos.sql
execution/exotic-command-events.sql
execution/unexpected-executable-directory-macos.sql
False Positive Policy
We endeavor to exclude real-world false positives from our detection
queries.
Managing false positives is easier said than done - pull requests are welcome!
Tag Intervals Mapping
Our base interval is 1 hour (3600s), but this interval is modified by the tags in place:
- continuous: 15 seconds
- transient: 5 minutes
- persistent: 1 hour (default)
- postmortem: 6 hours
In addition, we'll also use the following modifier tags:
- Often: 4X as often (~1m for transient, 15 minutes for persistent)
- Seldom: 2X as seldomly (10 minutes for transient, 2 hours for persistent)
Local pack generation
Run make packs