Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Documentation] What's the maintainance plan with iocs.json #14

Closed
jbrinksmeier opened this issue Dec 6, 2020 · 10 comments
Closed

[Documentation] What's the maintainance plan with iocs.json #14

jbrinksmeier opened this issue Dec 6, 2020 · 10 comments
Labels
documentation Improvements or additions to documentation

Comments

@jbrinksmeier
Copy link

While searching for possible extensions to the IOCs used by tinycheck, I found myself missing some information about how this iocs.json is to be maintained by this project. You mentioned some sources in the docs, for example https://github.com/Te-k/stalkerware-indicators, but it looks like not all of the available iocs from there made it into the iocs.json. I am creating a watcher for them right now and it is painfree with the architecture you came up with.

In general it would be good to know how plans are to maintain the iocs.json in this repo. Are you watching sources like Te-k/stalkerware-indicators proactively and update the iocs.json? Is the plan to maintain this repository as a comprehensive list of IOCs with input/PRs from the community as

If you have seen something very suspicious and/or needs to be investigated/integrated in one of these two lists, don't hesitate to ping us. You can also do you own watcher. Remember, sharing is caring.

suggests?

Thanks for a feedback on this matter :)

@posixpoet
Copy link

Yes, maintenance or better: "transparency" of the utilized IOCs would be great.
I imagine a Info page and part of the report (if not already).

@felixaime : It's been said before - great work. My first runs with it are promising.

@felixaime
Copy link
Contributor

felixaime commented Dec 8, 2020

Hello jbrinksmeier,

While searching for possible extensions to the IOCs used by tinycheck, I found myself missing some information about how this iocs.json is to be maintained by this project. You mentioned some sources in the docs, for example https://github.com/Te-k/stalkerware-indicators, but it looks like not all of the available iocs from there made it into the iocs.json. I am creating a watcher for them right now and it is painfree with the architecture you came up with.

Yes you're right. Strange for the Tek repo, I though to have integrated all of them. We are thinking to do a special export on another github repo centralizing only stalkerware IOCs and maintained by guys working on this kind of threats - which is not my case. I'm just passing through and gave this idea to the community.

In general it would be good to know how plans are to maintain the iocs.json in this repo. Are you watching sources like Te-k/stalkerware-indicators proactively and update the iocs.json? Is the plan to maintain this repository as a comprehensive list of IOCs with input/PRs from the community as

If you have seen something very suspicious and/or needs to be investigated/integrated in one of these two lists, don't hesitate to ping us. You can also do you own watcher. Remember, sharing is caring.

suggests?

Really, IOCs management is still a pain in the ass (for example, I'm not mentioning the source, validity period associated to them etc.). I wanted something very easy and small to begin. As of today, trust me that there is no "strategy" to maintain it except inputs/PRs from the community and myself. I came with this bucket of few IOCs to launch the projet.

I'm thinking to create a Wiki page on them (we definitely need a wiki-like stuff to share ideas and improvements). Anyway, here is a list of what's integrated:

To hunt the "unknown" threats:

  • Many known dynamic/free DNS from AFRAID and other DynamicDNS providers;
  • Different fancy top level domains (such .xyz, .club etc.);
  • Network ranges associated to some hosters known to be APTs nests;
  • Name servers associated to bulletproof domain services;
  • Snort rules (much like experiments here for now.)

To hunt the "unknown" threats:

  • Tek and Cian stalkerware network IOCs (I know that they're not exhaustive)
  • Costin geo-trackers list from his repo.
  • Emilien's stratum rules to find some miners.

Thanks for a feedback on this matter :)

You're welcome!

@jbrinksmeier
Copy link
Author

jbrinksmeier commented Dec 9, 2020

great summary, thank you. that's been exactly what I wanted to know.
Meanwhile, I created a PR for Tek's IOC repository that creates a file for each release including the known domains and certificates to be included by adding https://github.com/Te-k/stalkerware-indicators/releases/download/indicators-for-tinycheck.jsonto the ioc watchers in config.yml. Maybe this is of some use to others while this project evolves.
If you find the time, I'd be grateful for you quickly checking if I got the format of the ioc file right here: AssoEchap/stalkerware-indicators#5. I added samples in the description.
I'm especially unsure about the tpl property as I found no usages of them and simply hardcoded them to white as the others in the original ioc.json.

@felixaime
Copy link
Contributor

Your URL doesn't work yet :/ After that, yeah I can check and integrate the URL to the default watchers ;)

Félix.

@jbrinksmeier
Copy link
Author

ups, my bad. The url is obviously not working as the PR is not been accepted yet. Indeed I wanted to link to the PR: AssoEchap/stalkerware-indicators#5

@Te-k
Copy link
Contributor

Te-k commented Dec 12, 2020

I have updated the Github action to build the JSON file automatically, thanks @jbrinksmeier ! So I think anyone can use that https://github.com/Te-k/stalkerware-indicators/raw/master/indicators-for-tinycheck.json as a source for tiny check.

If I am right the certificates in the TinyCheck list are TLS certificates, not android app certificates? If yes, it does not make sense to have the android app certificates in this list, but I can do some work to have a list of IP addresses if it helps Tiny Check detection.

Regarding IOCs, I have tried to integrate in this repository all the indicators I have seen from different public sources, so it should be quite complete. I am totally open to add some more if you see some missing indicators (and I am going to do some more reversing soon to get some more domains)

@felixaime
Copy link
Contributor

Cool! Thanks Te-k! I'm gonna to test it and integrate it in the watchers this week if I have time!

Have a good sunday,
Félix.

felixaime added a commit that referenced this issue Dec 16, 2020
Related to the issue #14, thanks for his time and his contribution!
@felixaime
Copy link
Contributor

Hello,

I've added the feed this evening to the default watchers IOCs. Thanks Te-k for your contribution!
I keep this issue open for anyone who have questions about IOCs.

Have a great evening,
Félix.

@posixpoet
Copy link

Oh mighty wizards
I may be asking much, still: Would the IOCs be able to discover NSO Group’s Pegasus spyware?
https://citizenlab.ca/2020/12/the-great-ipwn-journalists-hacked-with-suspected-nso-group-imessage-zero-click-exploit/
Stay safe,
me

@felixaime
Copy link
Contributor

felixaime commented Dec 21, 2020

Hello posixpoet,

I think yes (possible medium alerts at least) because some of their domains used some DNS name servers which are already referenced in the iocs.json. Yeah, that's why I wanted to use what I name "extended-IOCs".

Moreover, I hesitate to add the certificates issuer, but I think that it will be more FP than Let's Encrypt. I need to test this issuer, so see if any big domain/service use it or not (like in the whole Alexa 1M...) to prevent the false positive if any.

Anyway, I'm in holiday so I haven't had the time to investigate more deeply on their case.
Cheers,
Félix.

@felixaime felixaime added the documentation Improvements or additions to documentation label Dec 29, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
documentation Improvements or additions to documentation
Projects
None yet
Development

No branches or pull requests

4 participants