Customized detections are a critical capability for any serious monitoring team. Being able to create your own detections is the difference between being at the mercy of a vendor and being able to fill in the detection gaps that are specific to your organization.
Detections can be grouped into three types.
The first two categories are the most commonly found throughout the information security industry.
A Lookup detection is the most simple form of detection and is often referred to as black-listing. An example of this would be checking traffic against a threat feed of "bad domain names". These threat feeds can be purchased from a vendor and track which domains are known sources of malicious activity. So in Lookup detection you look up each DNS resolution on your network against the list provided by the threat feed. Easy peasy.
A lookup rule in LimaCharlie.io looks like this:
Domain names matching the public "malwaredomains" list:
Stateless detections are a bit more interesting but still very simple in their application. This type of detection is called "stateless" because it does not keep any "state" between evaluations.
An example of a Stateless detection could be "look for any executable running from the Recycler Bin on Windows". It's a bit more involved than a one-to-one Lookup, but every process execution can be evaluated disjointly from anything external to it.
A stateless rule in LimaCharlie.io looks like this:
Detect file system Access Control List modifications
- event: NEW_PROCESS
op: is windows
- case sensitive: false
op: ends with
- case sensitive: false
Stateful rules are more complex. Here you want to keep track of some state and information over time in order to evaluate future events. In security these commonly fall into two categories:
The time-based detections are something along the lines of "if you see event ABC more than X times in Y seconds".
The descendance detections revolve around the parent-child relationships of various events. For example, "if you see event X as a descendant of event Z".
Those Stateful detections are usually difficult to make accessible to non-developers. Today, we're introducing a new capability in LimaCharlie, on top of having Lookup and Stateless detections, we now have easy Stateful detections available.
The in-depth documentation can be found here, but these examples should give you a taste:
Detect 4 reconnaissance tools executed within 5 seconds:
op: process burst
Detect "cmd.exe" executing as a descendant of "notepad.exe":
op: process descendant
The actual operators have more functionality than demonstrated above like descendance with with types of file created, it's worth a look!
All of those detections, Lookup, Stateless and Stateful run in the LimaCharlie cloud on all the data from all your agents, no infrastructure necessary.