Query Details

Multiple IP Entity Device Network Events

Query

// This query assumes a feed of threat indicators is ingested/synchronized periodically, and each synchronization ingests new indicators and only old indicators that have been modified.
// Active threat indicators in Sentinel are renovated as ThreatIntelligenceIndicator events every ~12 days.
let query_frequency = 1h;
let query_period = 14d;
let query_wait = 0h;
let table_query_lookback = 14d;
let _TIBenignProperty =
    _GetWatchlist('ID-TIBenignProperty')
    | where Notes has_any ("[DestinationIPAddress]")
    | project IndicatorId, BenignProperty
;
let _TIExcludedSources = toscalar(
    _GetWatchlist('Activity-ExpectedSignificantActivity')
    | where Activity == "ThreatIndicatorSource"
    | summarize make_list(Auxiliar)
    );
let _TITableMatch = (table_start: datetime, table_end: datetime, only_new_ti: boolean, ti_start: datetime = datetime(null)) {
    // Scheduled Analytics rules have a query period limit of 14d
    let _Indicators =// materialize(
        ThreatIntelligenceIndicator
        | where TimeGenerated > ago(query_period)
        // Take the earliest TimeGenerated and the latest column info
        | summarize hint.strategy=shuffle
            minTimeGenerated = min(TimeGenerated),
            arg_max(TimeGenerated, Active, Description, ActivityGroupNames, IndicatorId, ThreatType, DomainName, Url, ExpirationDateTime, ConfidenceScore, SourceSystem, Tags, AdditionalInformation, ExternalIndicatorId, NetworkIP, NetworkSourceIP, NetworkDestinationIP, EmailSourceIpAddress)
            by IndicatorId
        // Remove inactive or expired indicators
        | where not(not(Active) or ExpirationDateTime < now())
        // Pick indicators that contain the desired entity type
        | mv-expand IPAddress = pack_array(NetworkIP, NetworkSourceIP, NetworkDestinationIP, EmailSourceIpAddress) to typeof(string)
        | where isnotempty(IPAddress)
        | extend TI_IPAddress = IPAddress
        // Remove indicators from specific sources
        | where not(AdditionalInformation has_any (_TIExcludedSources))
        // Remove excluded indicators with benign properties
        | join kind=leftanti _TIBenignProperty on IndicatorId, $left.IPAddress == $right.BenignProperty
        // Deduplicate indicators by IPAddress column, equivalent to using join kind=innerunique afterwards
        | summarize hint.strategy=shuffle
            minTimeGenerated = min(minTimeGenerated),
            take_any(*)
            by IPAddress
        // If we want only new indicators, remove indicators received previously
        | where not(only_new_ti and minTimeGenerated < ti_start)
    //)
    ;
    //let _IndicatorsLength = toscalar(_Indicators | summarize count());
    //let _IndicatorsPrefilter = toscalar(
    //    _Indicators
    //    | extend AuxiliarField = tostring(extract(@"([0-9A-Za-f]+)[\.\:]", 1, IPAddress))
    //    | summarize make_set_if(AuxiliarField, isnotempty(AuxiliarField), 10000)
    //);
    //let _IndicatorsPrefilterLength = array_length(_IndicatorsPrefilter);
    let _TableEvents =
        DeviceNetworkEvents
        | where ingestion_time() between (table_start .. table_end)
        // Filter events that may contain indicators
        | where not(isempty(RemoteIP))
            and not(ActionType == "NetworkSignatureInspected")
            and not(RemoteIPType in ("Private", "Loopback", "Teredo", "Broadcast"))//Reserved
        //| where not(_IndicatorsPrefilterLength < 10000 and not(RemoteIP has_any (_IndicatorsPrefilter))) // "has_any" limit 10000
        | extend IPAddress = iff(RemoteIPType == "FourToSixMapping", trim_start("::ffff:", RemoteIP), RemoteIP)
        | where not(isnotempty(parse_ipv4(IPAddress)) and (ipv4_is_private(IPAddress) or ipv4_is_in_any_range(IPAddress, "0.0.0.0/8", "127.0.0.0/8")))
        //| where not(_IndicatorsLength < 1000000 and not(IPAddress in (toscalar(_Indicators | summarize make_list(TI_IPAddress))))) // "in" limit 1.000.000
        | project-rename DeviceNetworkEvents_TimeGenerated = TimeGenerated
    ;
    _Indicators
    | join kind=inner hint.strategy=shuffle _TableEvents on IPAddress
    // Take only a single event by key columns
    //| summarize hint.strategy=shuffle take_any(*) by IPAddress, DeviceName
    //| where not(todynamic(AdditionalInformation)["value_type"] == "domain" and not(DomainName has RemoteUrl or RemoteUrl has DomainName))
    //| where not(todynamic(AdditionalInformation)["value_type"] == "url" and not(trim_end(@"\/", Url) endswith trim_end(@"\/", RemoteUrl)))
    //| where not(todynamic(AdditionalInformation)["value_type"] in ("domain", "url") and isempty(RemoteUrl))
    | project
        DeviceNetworkEvents_TimeGenerated,
        Description,
        ActivityGroupNames,
        IndicatorId,
        ThreatType,
        DomainName,
        Url,
        ExpirationDateTime,
        ConfidenceScore,
        SourceSystem,
        Tags,
        AdditionalInformation,
        TI_IPAddress,
        NetworkIP,
        NetworkSourceIP,
        NetworkDestinationIP,
        EmailSourceIpAddress,
        DeviceName,
        LocalIP,
        ActionType,
        RemoteUrl,
        RemoteIP,
        RemotePort,
        Protocol,
        LocalPort,
        InitiatingProcessCommandLine,
        InitiatingProcessFolderPath,
        InitiatingProcessAccountName,
        InitiatingProcessAccountUpn
};
union// isfuzzy=true
    // Match      current table events                                all indicators available
    _TITableMatch(ago(query_frequency + query_wait), ago(query_wait), false),
    // Match      past table events                                                          new indicators since last query execution
    _TITableMatch(ago(table_query_lookback + query_wait), ago(query_frequency + query_wait), true, ago(query_frequency))
| summarize arg_max(DeviceNetworkEvents_TimeGenerated, *) by IndicatorId, DeviceName
| extend
    timestamp = DeviceNetworkEvents_TimeGenerated,
    HostCustomEntity = DeviceName,
    AccountCustomEntity = InitiatingProcessAccountUpn,
    IPCustomEntity = TI_IPAddress

Explanation

This query is used to match threat indicators with network events in order to identify any potential threats. The query retrieves threat indicators from a watchlist and filters out any indicators from excluded sources or with benign properties. It then matches these indicators with network events based on their IP addresses. The query also includes additional information about the events and indicators. The results are summarized by indicator ID and device name, and additional fields are added to provide more context, such as the timestamp, host custom entity, account custom entity, and IP custom entity.

Details

Jose Sebastián Canós profile picture

Jose Sebastián Canós

Released: August 22, 2023

Tables

ThreatIntelligenceIndicatorDeviceNetworkEvents

Keywords

ThreatIntelligenceIndicator,Sentinel,_GetWatchlist,ID-TIBenignProperty,DestinationIPAddress,Activity-ExpectedSignificantActivity,ThreatIndicatorSource,Activity,_TIExcludedSources,_TITableMatch,table_start,table_end,only_new_ti,ti_start,ThreatIntelligenceIndicator,TimeGenerated,Active,Description,ActivityGroupNames,IndicatorId,ThreatType,DomainName,Url,ExpirationDateTime,ConfidenceScore,SourceSystem,Tags,AdditionalInformation,ExternalIndicatorId,NetworkIP,NetworkSourceIP,NetworkDestinationIP,EmailSourceIpAddress,IPAddress,BenignProperty,DeviceNetworkEvents,RemoteIP,ActionType,RemoteIPType,Private,Loopback,Teredo,Broadcast,FourToSixMapping,trim_start,parse_ipv4,ipv4_is_private,ipv4_is_in_any_range,DeviceNetworkEvents_TimeGenerated,DeviceName,LocalIP,RemoteUrl,RemotePort,Protocol,LocalPort,InitiatingProcessCommandLine,InitiatingProcessFolderPath,InitiatingProcessAccountName,InitiatingProcessAccountUpn,ago,union,timestamp,HostCustomEntity,AccountCustomEntity,IPCustomEntity

Operators

letwhereprojecthas_anysummarizemake_listtoscalarjoinkind=leftantiextendmv-expandisnotemptyisnotemptynotminarg_maxbyiffparse_ipv4ipv4_is_privateipv4_is_in_any_rangeproject-renameunionagosummarizearg_maxextend

Actions