Query Details

Multiple File Hash Entity Device File Events

Query

// This query assumes a feed of threat indicators is ingested/synchronized periodically, and each synchronization ingests new indicators and only old indicators that have been modified.
// Active threat indicators in Sentinel are renovated as ThreatIntelligenceIndicator events every ~12 days.
let query_frequency = 1h;
let query_period = 14d;
let query_wait = 0h;
let table_query_lookback = 3d;
let _TIBenignProperty =
    _GetWatchlist('ID-TIBenignProperty')
    | where Notes has_any ("[Hash]")
    | project IndicatorId, BenignProperty
;
let _TIExcludedSources = toscalar(
    _GetWatchlist('Activity-ExpectedSignificantActivity')
    | where Activity == "ThreatIndicatorSource"
    | summarize make_list(Auxiliar)
    );
let _TITableMatch = (table_start: datetime, table_end: datetime, only_new_ti: boolean, ti_start: datetime = datetime(null)) {
    // Scheduled Analytics rules have a query period limit of 14d
    let _Indicators =// materialize(
        ThreatIntelligenceIndicator
        | where TimeGenerated > ago(query_period)
        // Take the earliest TimeGenerated and the latest column info
        | summarize hint.strategy=shuffle
            minTimeGenerated = min(TimeGenerated),
            arg_max(TimeGenerated, Active, Description, ActivityGroupNames, IndicatorId, ThreatType, DomainName, Url, ExpirationDateTime, ConfidenceScore, AdditionalInformation, ExternalIndicatorId, FileHashValue, FileHashType)
            by IndicatorId
        // Remove inactive or expired indicators
        | where not(not(Active) or ExpirationDateTime < now())
        // Pick indicators that contain the desired entity type
        | where isnotempty(FileHashValue)
        | extend FileHashValue = toupper(FileHashValue)
        // Remove indicators from specific sources
        | where not(AdditionalInformation has_any (_TIExcludedSources))
        // Remove excluded indicators with benign properties
        | join kind=leftanti _TIBenignProperty on IndicatorId, $left.FileHashValue == $right.BenignProperty
        // Deduplicate indicators by FileHashValue column, equivalent to using join kind=innerunique afterwards
        | summarize hint.strategy=shuffle
            minTimeGenerated = min(minTimeGenerated),
            take_any(*)
            by FileHashValue
        // If we want only new indicators, remove indicators received previously
        | where not(only_new_ti and minTimeGenerated < ti_start)
    //)
    ;
    //let _IndicatorsLength = toscalar(_Indicators | summarize count());
    let _TableEvents =
        DeviceFileEvents
        | where ingestion_time() between (table_start .. table_end)
        // Filter events that may contain indicators
        | mv-expand FileHashValue = pack_array(MD5, SHA1, SHA256) to typeof(string)
        | where isnotempty(FileHashValue)
        //| where not(FileHashValue in ("00000000000000000000000000000000", "0000000000000000000000000000000000000000000000000000000000000000"))
        | extend FileHashValue = toupper(FileHashValue)
        //| where not(_IndicatorsLength < 1000000 and not(FileHashValue in (toscalar(_Indicators | summarize make_list(FileHashValue))))) // "in" limit 1.000.000
        | extend
            DeviceFileEvents_FileName = FileName,
            DeviceFileEvents_FileSize = FileSize
        | project-rename DeviceFileEvents_TimeGenerated = TimeGenerated
    ;
    _Indicators
    | join kind=inner hint.strategy=shuffle _TableEvents on FileHashValue
    // Take only a single event by key columns
    //| summarize hint.strategy=shuffle take_any(*) by FileHashValue, DeviceName
    | project
        DeviceFileEvents_TimeGenerated,
        Description, ActivityGroupNames, IndicatorId, ThreatType, DomainName, Url, ExpirationDateTime, ConfidenceScore, AdditionalInformation, FileHashValue, FileHashType,
        DeviceName, InitiatingProcessAccountName, InitiatingProcessAccountUpn, ActionType, DeviceFileEvents_FileName, DeviceFileEvents_FileSize, FolderPath, FileOriginReferrerUrl, FileOriginUrl, InitiatingProcessCommandLine, InitiatingProcessFolderPath, MD5 = toupper(MD5), SHA1 = toupper(SHA1), SHA256 = toupper(SHA256)
};
union// isfuzzy=true
    // Match      current table events                                all indicators available
    _TITableMatch(ago(query_frequency + query_wait), ago(query_wait), false),
    // Match      past table events                                                          new indicators since last query execution
    _TITableMatch(ago(table_query_lookback + query_wait), ago(query_frequency + query_wait), true, ago(query_frequency))
| summarize arg_max(DeviceFileEvents_TimeGenerated, *) by IndicatorId, DeviceName
| extend
    timestamp = DeviceFileEvents_TimeGenerated,
    HostCustomEntity = DeviceName,
    AccountCustomEntity = InitiatingProcessAccountUpn,
    FileHashCustomEntity = FileHashValue

Explanation

This query is used to match threat indicators with table events. It assumes that a feed of threat indicators is ingested periodically, and each synchronization only includes new indicators and modified old indicators. The query defines several variables for the frequency and period of the query, as well as the lookback period for the table events.

The query first retrieves a list of benign properties and excluded sources from a watchlist. It then matches the threat indicators with the table events based on the FileHashValue column. The query removes inactive or expired indicators, filters indicators from specific sources, and removes excluded indicators with benign properties. It also deduplicates the indicators based on the FileHashValue column.

The query is executed periodically, and it matches both current and past table events with the available indicators. The results are summarized by IndicatorId and DeviceName, and additional fields are added for timestamp, host custom entity, account custom entity, and file hash custom entity.

Details

Jose Sebastián Canós profile picture

Jose Sebastián Canós

Released: December 5, 2022

Tables

ThreatIntelligenceIndicatorDeviceFileEvents

Keywords

ThreatIntelligenceIndicator,Sentinel,_GetWatchlist,Notes,IndicatorId,BenignProperty,_TIExcludedSources,Activity,Auxiliar,_TITableMatch,table_start,table_end,only_new_ti,ti_start,ThreatIntelligenceIndicator,TimeGenerated,Active,Description,ActivityGroupNames,ThreatType,DomainName,Url,ExpirationDateTime,ConfidenceScore,AdditionalInformation,ExternalIndicatorId,FileHashValue,FileHashType,AdditionalInformation,_TIExcludedSources,_TIBenignProperty,FileHashValue,DeviceFileEvents,DeviceFileEvents_TimeGenerated,FileName,FileSize,DeviceFileEvents_TimeGenerated,Description,ActivityGroupNames,IndicatorId,ThreatType,DomainName,Url,ExpirationDateTime,ConfidenceScore,AdditionalInformation,FileHashValue,FileHashType,DeviceName,InitiatingProcessAccountName,InitiatingProcessAccountUpn,ActionType,DeviceFileEvents_FileName,DeviceFileEvents_FileSize,FolderPath,FileOriginReferrerUrl,FileOriginUrl,InitiatingProcessCommandLine,InitiatingProcessFolderPath,MD5,SHA1,SHA256,timestamp,HostCustomEntity,AccountCustomEntity,FileHashCustomEntity

Operators

wherehas_anyprojectlettoscalarwheresummarizemake_listjoinkind=leftantiextendbyhint.strategy=shuffletake_anyproject-renamejoinkind=innerunionagosummarizearg_maxextend

Actions