InQuest / ThreatKB

Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)
GNU General Public License v2.0
94 stars 18 forks source link

Auto expiration of C2 artifacts. #59

Closed pedramamini closed 4 years ago

pedramamini commented 7 years ago

Consider for example the C2 IPs for WannaCry from https://www.lastline.com/blog/wannacry-ransomware/:

image

The Amazon IPs for example can be quick to recycle, resulting in a false positive opportunity. We want auto aging of C2 artifacts on the following passive attribute:

The following are active measures, that we'll save for manual / net-assess:

pedramamini commented 5 years ago

Let's simplify this. Drop "Expiration Type", rename "Expiration Timestamp" to "Expiration Date". Have a daily background job that runs and for all artifacts at or after the expiration date:

  1. Change the state of that artifact to whatever the user has designated as the "Retired State".
  2. Add a comment to the artifact stating that it was automatically expired.
  3. Add an entry to the activity log (see screenshot below) stating that the artifact was automatically expired.

image