1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
|
$osquery_data = [
<|dt:1688910000, host:"fqdn1", ev_type:"someEv", ev_status:"", user:"", vpn:false, |>,
<|dt:1688910050, host:"fqdn2", ev_type:"login", ev_status:"success", user:"", vpn:true, |>,
<|dt:1688910100, host:"fqdn1", ev_type:"login", ev_status:"success", user:"", vpn:true, |>,
<|dt:1688910220, host:"fqdn1", ev_type:"login", ev_status:"success", user:"", vpn:false, |>,
<|dt:1688910300, host:"fqdn1", ev_type:"delete_all", ev_status:"", user:"", vpn:false, |>,
<|dt:1688910400, host:"fqdn2", ev_type:"delete_all", ev_status:"", user:"", vpn:false, |>,
<|dt:1688910500, host:"fqdn1", ev_type:"login", ev_status:"failed", user:"user1", vpn:false, |>,
<|dt:1688910500, host:"fqdn1", ev_type:"login", ev_status:"failed", user:"user2", vpn:false, |>,
<|dt:1688910600, host:"fqdn", ev_type:"someEv", ev_status:"", user:"user1", vpn:false, |>,
<|dt:1688910800, host:"fqdn2", ev_type:"login", ev_status:"failed", user:"user1", vpn:false, |>,
<|dt:1688910900, host:"fqdn2", ev_type:"login", ev_status:"failed", user:"user2", vpn:false, |>,
<|dt:1688911000, host:"fqdn2", ev_type:"login", ev_status:"success", user:"user1", vpn:false, |>,
<|dt:1688911001, host:"fqdn2", ev_type:"login", ev_status:"success", user:"user1", vpn:false, |>,
];
pragma FeatureR010="prototype";
pragma config.flags("MatchRecognizeStream", "disable");
SELECT *
FROM AS_TABLE($osquery_data) MATCH_RECOGNIZE(
ORDER BY CAST(dt as Timestamp)
MEASURES
LAST(LOGIN_SUCCESS_REMOTE.host) as remote_login_host,
LAST(LOGIN_SUCCESS_REMOTE.user) as remote_login_user,
LAST(LOGIN_SUCCESS_REMOTE.dt) as remote_login_dt,
LAST(SUSPICIOUS_ACTION_SOON.dt) as suspicious_action_dt,
LAST(SUSPICIOUS_ACTION_TIMEOUT.dt) as suspicious_action_timeout_dt,
FIRST(LOGIN_FAILED_SAME_USER.dt) as brutforce_begin,
FIRST(LOGIN_SUCCESS_SAME_USER.dt) as brutforce_end,
LAST(LOGIN_SUCCESS_SAME_USER.user) as brutforce_login
ONE ROW PER MATCH
AFTER MATCH SKIP TO NEXT ROW
PATTERN (
LOGIN_SUCCESS_REMOTE ANY_ROW1* (SUSPICIOUS_ACTION_SOON | SUSPICIOUS_ACTION_TIMEOUT) |
(LOGIN_FAILED_SAME_USER ANY_ROW2*){2,} LOGIN_SUCCESS_SAME_USER
)
DEFINE
LOGIN_SUCCESS_REMOTE as
LOGIN_SUCCESS_REMOTE.ev_type = "login" and
LOGIN_SUCCESS_REMOTE.ev_status = "success" and
LOGIN_SUCCESS_REMOTE.vpn = true and
COALESCE(LOGIN_SUCCESS_REMOTE.dt - FIRST(LOGIN_FAILED_SAME_USER.dt) <= 500, TRUE),
ANY_ROW1 as
COALESCE(ANY_ROW1.dt - FIRST(LOGIN_SUCCESS_REMOTE.dt) <= 500, TRUE),
SUSPICIOUS_ACTION_SOON as
SUSPICIOUS_ACTION_SOON.host = LAST(LOGIN_SUCCESS_REMOTE.host) and
SUSPICIOUS_ACTION_SOON.ev_type = "delete_all" and
COALESCE(SUSPICIOUS_ACTION_SOON.dt - FIRST(LOGIN_SUCCESS_REMOTE.dt) <= 500, TRUE),
SUSPICIOUS_ACTION_TIMEOUT as
COALESCE(SUSPICIOUS_ACTION_TIMEOUT.dt - FIRST(LOGIN_SUCCESS_REMOTE.dt) > 500, TRUE),
LOGIN_FAILED_SAME_USER as
LOGIN_FAILED_SAME_USER.ev_type = "login" and
LOGIN_FAILED_SAME_USER.ev_status <> "success" and
(LAST(LOGIN_FAILED_SAME_USER.user) IS NULL
or LAST(LOGIN_FAILED_SAME_USER.user) = LOGIN_FAILED_SAME_USER.user
) and COALESCE(LOGIN_FAILED_SAME_USER.dt - FIRST(LOGIN_FAILED_SAME_USER.dt) <= 500, TRUE),
ANY_ROW2 as
COALESCE(ANY_ROW2.dt - FIRST(LOGIN_FAILED_SAME_USER.dt) <= 500, TRUE),
LOGIN_SUCCESS_SAME_USER as
LOGIN_SUCCESS_SAME_USER.ev_type = "login" and
LOGIN_SUCCESS_SAME_USER.ev_status = "success" and
LOGIN_SUCCESS_SAME_USER.user = LAST(LOGIN_FAILED_SAME_USER.user) and
COALESCE(LOGIN_SUCCESS_SAME_USER.dt - FIRST(LOGIN_FAILED_SAME_USER.dt) <= 500, TRUE)
) AS MATCHED
;
|