7.5.7. Analysing the Active CTI alerts
7.5.7.1. Introduction
For information, see the following paragraphs:
7.5.7.1.1. Management of the Active CTI engine
7.5.7.1.2. Events generated by the engine
- In the main interface named WEB UI of the GCenter in the
`Alerts`
screenThe main interface named WEB UI is described in Overview of the WEB UI.- To view the alerts, select the
`Active CTI`
engine filter.See the presentation of the Web UI `Alerts`. - Click on the selected alert.The
`Alert details`
window is displayed.The detailed information of this alert is displayed.
- In the Kibana UI interface
- In the main interface WEB UI, click on the
`Hunting`
icon.The interface displayed is the interface named Kibana UI (described in Overview of the Kibana GUI). - Click on the
`Active CTI`
category of the`Alerts`
section then the`Overview`
or`Messages`
tab.The detailed information of this alert can be viewed in table or json format.ActiveCTI alerts are alerts that can be filtered by searching for the term event.module: active_cti in the Kibana search bar.
7.5.7.1.3. Essential information to understand the context of the alert
7.5.7.1.3.1. What are the key fields of an alert and their meaning?
If the alert is raised on a DNS packet, the value of the IoC is in the
``dns.query.rrname``
field of the alertIf the alert is raised on an HTTP packet, the value of the IoC is in the
``http.hostname``
field of the alertNote
These elements can be found in the ``Alert details details''.
Search for the IoC value in the general search bar at the top right of the home page
then select the IoC from the IoC present after searching
- Its descriptionThe IoC description consists of:
Its value
- The type of IoCIn the case of an ActiveCTI alert, alerts are associated with domains or URLs, but generally the platform includes file hashes, file names and IPs.
If Detection or not, see the ALERT HANDLING PROCEDURE
Its labels, which may correspond to:
- The type of threat involvedThis field can take different values including phishing, trojan, hacktool depending on how the threat was categorized by Gatewatcher CTI.
- On behalf of the associated malwareIn the case of a file hash or a URL or domain that downloads a file, if that file is categorized as belonging to a malware family, then the name will appear in the labels.For example: mirai, qbot, redline stealer.
- On behalf of the associated malwareIn the same way as for malware, if the threat is associated with a threat actor, its name will appear in the labels.For example: ta505, lockbit, lazarus group.
- Its external referencesThese are external articles or analyzes in which the IoC is present and which provide additional context.
7.5.7.2. Alert handling procedure
7.5.7.2.1. How do you verify the accuracy of an alert and determine if it represents a real threat?
`detection`
or `hunting`
.- If the usage_mode of the IoC mode has the
`hunting`
value which may be the case for a domain or an IP address, it means that the resource has not been contacted anymore.On a network, this can happen for example when a malicious resource tries to contact a domain that is no longer active. - On the other hand, if the usage_mode has the
`detection`
value, the IoC is still active and represents in this case a current threat.
7.5.7.2.2. How to categorize the threat based on the information collected?
To categorize the threat, explore several avenues:
Check threat type:
- In the case of a URL or domain, the associated threats are most often phishing or downloading a malicious file.This information is present in the IoC labels.If the labels do not determine the type of threat, the IoC value can give the information.Phishing URLs usually contain keywords that betray an attempt to spoof a service or company, where downloading a malicious file is often done from an IP and whose file name can be specified in the path.In other cases, IoC may refer to a domain of Command and Control, characterized by a specific malware name.
Search for threat on external CTI platforms:
For more information on the level of malicious activity or to download the threat in which of a file, turn to external Threat Intelligence platforms such as VirusTotal or MalwareBazaar.
Verify the original IP address of the alert in GCenter:
- If the alert is linked to an external IP address, review the reputation level of that address.An IP address with a bad reputation is more likely to be associated with malicious activity.
Note also that just because it is an internal IP address does not make it a false positive.
View alert history:
- View the history of similar alerts generated by ActiveCTI.If similar alerts have been confirmed as real threats in the past, it increases the likelihood that the current alert is also a threat.Depending on the observations, the threat can be categorized as real or not.
If necessary, use the File transactions functionality presented in the previous paragraph to obtain the majority of this information via a condensed view.
7.5.7.2.3. What answers are needed if the threat is confirmed?
Note
This procedure allows further investigation and evaluation of the extent of the incident after confirmation of a threat generated by the ActiveCTI engine.
In general, it is appropriate to:
Determine extent of infection: identify machines infected by the threat
Isolate the system: immediately isolate the contaminated system and ensure it cannot cause further damage
Notify: inform relevant parties of threat detection
Depending on the case, different approaches are taken:
if the threat is a domain or IP associated with the download of a malicious resource, in this case it is probably the transfer of a malicious tool to or within the infected environment:
Remove file or malware from infected machine(s)
Scan the machine from which the request was made to the malicious server, which would have been infected before the request
if the threat is associated with a Command and Control server, this implies that one or more infected machines communicate with the said server:
Remove the malicious tag that originated communications to the infected machine(s) server
if the threat is associated with phishing:
Identify the target of phishing
Ask the employee or employees about the details of the attack to assess the extent of the information communicated to the attacker
- Anticipate the actions of the attacker
- Monitor / block IoC related items
7.5.7.2.4. What if an alert from this engine is identified as a false positive?
ca existe??