- System Logs: Event logs (Windows Event Logs, Sysmon logs), process creation logs, and PowerShell execution logs.
- Network Data: Packet captures (PCAPs), NetFlow data, and connection logs (e.g., firewall or proxy logs).
- File Metadata: Hashes (MD5, SHA256), file paths, file sizes, and timestamps.
- Process Information: Process names, parent-child relationships, command-line arguments, and execution frequency.
- Memory Dumps: Analyzing in-memory data for signs of process injection or in-memory-only malware.
- User Activity Data: Login patterns, privileged access, remote connections, and user behavior patterns.
Data Sources:
- Use endpoint monitoring tools like Sysmon (for Windows), auditd (for Linux), or other logging tools to collect detailed logs.
- Network traffic can be captured using tools like Wireshark, Zeek, or Suricata.
1. Types of Data Needed
System-Level Data:
- File Operations:
- Data Points: File creation, modification, deletion, file path, file type, file size, file hash (MD5/SHA256), file execution frequency, etc.
- Data Source: OS audit logs, File Integrity Monitoring (FIM) tools, Windows Event Logs, Linux
auditd
logs.
- Process Creation:
- Data Points: Process name, parent process, command-line arguments, execution path, process ID (PID), start and end time, CPU usage, memory usage, process tree relationships, etc.
- Data Source: Sysmon (for Windows), Process Monitoring Tools (
ps
command for Linux), OS-level monitoring tools.
- Registry Modifications (Windows only):
- Data Points: Registry key changes, value changes, registry hives accessed, frequency of access, malicious registry paths.
- Data Source: Sysmon Event Logs, Windows Event Logs, custom scripts using PowerShell.
- Application Behavior:
- Data Points: Application start/stop events, API calls made by applications, anomalous access to critical files or resources, DLL injection, execution of unsigned binaries.
- Data Source: Application logs, Sysmon, Event Tracing for Windows (ETW), EDR solutions that monitor application activity.
Network-Level Data:
- Network Behavior:
- Data Points: Source IP, destination IP, source port, destination port, protocol (TCP/UDP), packet size, session duration, data transfer volume, flags (SYN, ACK), frequency of connections, encrypted vs. unencrypted traffic.
- Data Source: Packet Capture (PCAP) files, NetFlow data, firewall logs, Intrusion Detection Systems (IDS) like Zeek or Suricata, network appliances.
- Malicious Network Activities:
- Data Points: Indicators of DDoS attacks (e.g., unusually high request rates), abnormal connection patterns, unusual spikes in traffic, DNS query anomalies, unauthorized access attempts, suspicious C2 (Command and Control) traffic.
- Data Source: PCAP files, DNS logs, Proxy server logs, IPS/IDS alerts, threat intelligence feeds.
Contextual Data: