Forum Discussion
abk92394
Apr 06, 2022Copper Contributor
Searching Historical Logs for Threat Intelligence Matches.
Hello all,
I was just wondering what the best or most efficient way to search logs for threat intelligence IOCs was, I saw a previous post explaining how to do it if you would like to search a large amount of values via watchlist but I would like to do it only for threat intelligence IOCs, I have a search below that works for IP addresses and can also be applied to file hashes.
ThreatIntelligenceIndicator
| where isnotempty(NetworkIP)
| summarize by ThreatIntelIP=NetworkIP
| join
(
Network_MetaParser
| where isnotempty(SrcIpAddr)
| summarize by SrcIpAddr, DstIpAddr, EventProduct, DvcAction, DstPortNumber, NetworkProtocol, TimeGenerated
) on $left.ThreatIntelIP == $right.DstIpAddr
My question is regarding URL/Domain names. How do I search my logs for any URLs/domains that match or contain the URL/Domain values from threat intelligence. I've tried doing something like the below but it doesn't seem to work. Any suggestions would be greatly appreciated!
| summarize by URL
| where isnotempty(URL)
| where URL has_any (ThreatIntelligenceIndicator)
- JBUB_AcceleryntBrass Contributor
Here is something we made a long time ago but should still work as a template.
let dt_lookBack = 7d;
let ioc_lookBack = 14d;
ThreatIntelligenceIndicator
| where TimeGenerated > ago(ioc_lookBack)
| where isnotempty(DomainName)
| join (
CommonSecurityLog
| where TimeGenerated > ago(dt_lookBack)
| where isnotempty(DestinationHostName)
| extend CommonSecurityLog_TimeGenerated = TimeGenerated
)
on $left.DomainName == $right.DestinationHostName
| project SourceUserName, DomainName, CommonSecurityLog_TimeGenerated, Description, Activity
| extend AccountCustomEntity = SourceUserName
| extend HostCustomEntity = DomainName
| extend URLCustomEntity = DomainName - JonhedSteel Contributor
See if this works.
First, define a variable that will contain a list of all the URLs in the threat indicator table.
let TIUrls = toscalar(ThreatIntelligenceIndicator | summarize make_set(Url));
Then, you use mv-apply to compare the URL value against each indicator in the variable above.
Table //Table that contains the traffic logs | summarize by URL | where isnotempty(URL) | mv-apply l=TIUrls to typeof(string) on (where URL contains l)
- abk92394Copper Contributor
Thanks for you suggestion. I tried it and it works in a sense. It doesn't throw any errors, but I need to know which URLs from the Threat Intelligence list was matched, is there a way to output them side by side, kind of like the Join operator.
- JonhedSteel Contributor
If you want to compare identical columns, the template JBUB_Accelerynt posted looks fine.
If you want to check your logs against a list of URLs/DomainNames, then you would probably need to use the solution I listed.
When using mv-apply, the matched indicator URLs will be stored in the l column, when there are matches.
If you want to show all the info of the entry in the Threat indicator table, you can add the join bit below.
let TIUrls = toscalar(ThreatIntelligenceIndicator | summarize make_set(Url)); | mv-apply l=TIUrls to typeof(string) on (where URL contains l) | join ThreatIntelligenceIndicator on $left.l=$right.Url
The query I created is comparing with the Url field of the threat intelligence indicators, but if you want to compare with DomainNames instead, you can edit row 2 and 5, and change the "Url" for "DomainName".
let TIUrls = toscalar(ThreatIntelligenceIndicator | summarize make_set(DomainName)); | mv-apply l=TIUrls to typeof(string) on (where URL contains l) | join ThreatIntelligenceIndicator on $left.l=$right.DomainName