Query Details

Multiple Domain Entity Dns Events

Query

// This query assumes a feed of threat indicators is ingested/synchronized periodically, and each synchronization ingests new indicators and only old indicators that have been modified.
// Active threat indicators in Sentinel are renovated as ThreatIntelligenceIndicator events every ~12 days.
let query_frequency = 1h;
let query_period = 14d;
let query_wait = 0h;
let table_query_lookback = 6h;
let _TIBenignProperty =
    _GetWatchlist('ID-TIBenignProperty')
    | where Notes has_any ("[DestinationDomain]")
    | project IndicatorId, BenignProperty
;
let _TIExcludedSources = toscalar(
    _GetWatchlist('Activity-ExpectedSignificantActivity')
    | where Activity == "ThreatIndicatorSource"
    | summarize make_list(Auxiliar)
    );
let _TITableMatch = (table_start: datetime, table_end: datetime, only_new_ti: boolean, ti_start: datetime = datetime(null)) {
    // Scheduled Analytics rules have a query period limit of 14d
    let _Indicators =// materialize(
        ThreatIntelligenceIndicator
        | where TimeGenerated > ago(query_period)
        // Take the earliest TimeGenerated and the latest column info
        | summarize hint.strategy=shuffle
            minTimeGenerated = min(TimeGenerated),
            arg_max(TimeGenerated, Active, Description, ActivityGroupNames, IndicatorId, ThreatType, DomainName, Url, ExpirationDateTime, ConfidenceScore, AdditionalInformation, ExternalIndicatorId)
            by IndicatorId
        // Remove inactive or expired indicators
        | where not(not(Active) or ExpirationDateTime < now())
        // Pick indicators that contain the desired entity type
        | where isnotempty(DomainName)
        | extend Domain = tolower(DomainName)
        // Remove indicators from specific sources
        | where not(AdditionalInformation has_any (_TIExcludedSources))
        // Remove excluded indicators with benign properties
        | join kind=leftanti _TIBenignProperty on IndicatorId, $left.Domain == $right.BenignProperty
        // Deduplicate indicators by Domain column, equivalent to using join kind=innerunique afterwards
        | summarize hint.strategy=shuffle
            minTimeGenerated = min(minTimeGenerated),
            take_any(*)
            by Domain
        // If we want only new indicators, remove indicators received previously
        | where not(only_new_ti and minTimeGenerated < ti_start)
    //)
    ;
    //let _IndicatorsLength = toscalar(_Indicators | summarize count());
    //let _IndicatorsPrefilter = toscalar(
    //    _Indicators
    //    | extend AuxiliarField = tostring(split(Domain, ".")[-1])
    //    | summarize make_set_if(AuxiliarField, isnotempty(AuxiliarField))
    //);
    //let _IndicatorsPrefilterLength = array_length(_IndicatorsPrefilter);
    let _TableEvents =
        DnsEvents
        | where TimeGenerated between (table_start .. table_end)
        // Filter events that may contain indicators
        | where isnotempty(Name)
        //| where not(_IndicatorsPrefilterLength < 10000 and not(Name has_any (_IndicatorsPrefilter))) // valid TLD ~1500 , "has_any" limit 10000
        | summarize hint.strategy=shuffle take_any(*) by OriginalDomain = tolower(Name)
        //| where not(_IndicatorsPrefilterLength < 10000 and not(tostring(split(OriginalDomain, ".")[-1]) in (_IndicatorsPrefilter)))
        | extend SplitLevelDomains = split(OriginalDomain, ".")
        | mv-expand Level = range(0, array_length(SplitLevelDomains) - 2) to typeof(int)
        | extend Domain = strcat_array(array_slice(SplitLevelDomains, Level, -1), ".")
        //| where not(_IndicatorsLength < 1000000 and not(Domain in (toscalar(_Indicators | summarize make_list(Domain))))) // "in" limit 1.000.000
        | project-rename DnsEvents_TimeGenerated = TimeGenerated
    ;
    _Indicators
    | join kind=inner hint.strategy=shuffle _TableEvents on Domain
    // Take only a single event by key columns
    //| summarize hint.strategy=shuffle take_any(*) by Domain, ClientIP
    | project
        DnsEvents_TimeGenerated,
        Description, ActivityGroupNames, IndicatorId, ThreatType, DomainName, Url, ExpirationDateTime, ConfidenceScore, AdditionalInformation,
        Computer, SubType, ClientIP, QueryType, Name, IPAddresses, MaliciousIP, IndicatorThreatType
};
union// isfuzzy=true
    // Match      current table events                                all indicators available
    _TITableMatch(ago(query_frequency + query_wait), ago(query_wait), false),
    // Match      past table events                                                          new indicators since last query execution
    _TITableMatch(ago(table_query_lookback + query_wait), ago(query_frequency + query_wait), true, ago(query_frequency))
| summarize arg_max(DnsEvents_TimeGenerated, *) by IndicatorId, ClientIP
| extend
    timestamp = DnsEvents_TimeGenerated,
    IPCustomEntity = ClientIP,
    URLCustomEntity = Url

Explanation

This query is used to match threat indicators with DNS events. The query assumes that a feed of threat indicators is ingested periodically, and each synchronization only includes new indicators and modified old indicators. The query has several variables defined, such as the frequency of the query, the period to look back for threat indicators, and the wait time before executing the query.

The query first retrieves a list of benign properties and excluded sources from a watchlist. It then matches the threat indicators with DNS events based on the domain. Inactive or expired indicators are removed, as well as indicators from specific sources and indicators with benign properties. The indicators are deduplicated by the domain column.

The query then retrieves DNS events within a specified time range and filters them based on the domain. The events are expanded to include subdomains and the domain is extracted. The indicators and events are joined based on the domain.

Finally, the query combines the results from two separate matches: one for current table events and all available indicators, and another for past table events and new indicators since the last query execution. The results are summarized and the latest DNS event for each indicator and client IP is selected. The results are then extended with additional columns for timestamp, IP custom entity, and URL custom entity.

Details

Jose Sebastián Canós profile picture

Jose Sebastián Canós

Released: December 5, 2022

Tables

ThreatIntelligenceIndicatorDnsEvents

Keywords

ThreatIntelligenceIndicator,Sentinel,_GetWatchlist,ID-TIBenignProperty,DestinationDomain,Activity-ExpectedSignificantActivity,ThreatIndicatorSource,Activity,table_start,table_end,only_new_ti,ti_start,ThreatIntelligenceIndicator,TimeGenerated,Active,Description,ActivityGroupNames,IndicatorId,ThreatType,DomainName,Url,ExpirationDateTime,ConfidenceScore,AdditionalInformation,ExternalIndicatorId,Domain,AdditionalInformation,_TIBenignProperty,IndicatorId,BenignProperty,Domain,_TIExcludedSources,_TIBenignProperty,IndicatorId,Domain,only_new_ti,ti_start,_Indicators,minTimeGenerated,arg_max,minTimeGenerated,Active,Description,ActivityGroupNames,IndicatorId,ThreatType,DomainName,Url,ExpirationDateTime,ConfidenceScore,AdditionalInformation,ExternalIndicatorId,Domain,_TIExcludedSources,_TIBenignProperty,IndicatorId,BenignProperty,Domain,_TableEvents,DnsEvents,TimeGenerated,Name,OriginalDomain,SplitLevelDomains,Level,Domain,DnsEvents_TimeGenerated,Description,ActivityGroupNames,IndicatorId,ThreatType,DomainName,Url,ExpirationDateTime,ConfidenceScore,AdditionalInformation,Computer,SubType,ClientIP,QueryType,Name,IPAddresses,MaliciousIP,IndicatorThreatType,DnsEvents_TimeGenerated,timestamp,IPCustomEntity,URLCustomEntity.

Operators

letwhereprojecthas_anysummarizemake_listtoscalarjoinkind=leftantiextendisnotemptytolowernothas_anybytake_anysplitarray_lengthstrcat_arraymv-expandrangetypeofproject-renameunionagoarg_maxsummarizeextend

Actions