Azure-Sentinel/Solutions/Group-IB/Playbooks
..
azuredeploy-GIBIndicatorProcessor.json
azuredeploy-GIBTIA_APT_ThreatActor.json
azuredeploy-GIBTIA_APT_Threats.json
azuredeploy-GIBTIA_Attacks_ddos.json
azuredeploy-GIBTIA_Attacks_deface.json
azuredeploy-GIBTIA_Attacks_phishing.json
azuredeploy-GIBTIA_Attacks_phishing_kit.json
azuredeploy-GIBTIA_BP_phishing.json
azuredeploy-GIBTIA_BP_phishing_kit.json
azuredeploy-GIBTIA_Compromised_account.json
azuredeploy-GIBTIA_Compromised_card.json
azuredeploy-GIBTIA_Compromised_imei.json
azuredeploy-GIBTIA_Compromised_mule.json
azuredeploy-GIBTIA_HI_Threat.json
azuredeploy-GIBTIA_HI_Threat_Actor.json
azuredeploy-GIBTIA_Malware_Targeted_Malware.json
azuredeploy-GIBTIA_Malware_cnc.json
azuredeploy-GIBTIA_OSI_GitLeak.json
azuredeploy-GIBTIA_OSI_PublicLeak.json
azuredeploy-GIBTIA_OSI_Vulnerability.json
azuredeploy-GIBTIA_Suspicious_ip_open_proxy.json
azuredeploy-GIBTIA_Suspicious_ip_socks_proxy.json
azuredeploy-GIBTIA_Suspicious_ip_tor_node.json
readme.md

readme.md

Ingest Group-IB Threat Intelligence & Attribution Feeds and Indicators Collections

Author: Hesham Saad

Group-IB Azure Sentinel playbooks designed by Group-IB team and supported by Microsoft team to ingest Threat Intelligence & Attribution feeds and indicators from multiple Group-IB data collections and writes them to Microsoft Security Graph API to be listed under Azure Sentinel ThreatIntelligenceIndicators table and custom log tables as well for adversaries, threat actors,...etc

There are a number of pre-configuration steps required before deploying the playbooks.

Group-IB Sentinel Playbooks Collections Detailed Description

  1. "GIBIndicatorProcessor" Playbook
    This playbook is used to send indicators to Microsoft Security Graph API from all other GIB playbooks.
  1. "GIBTIA_APT_Threats" Playbook
    a. Collection: apt/threat
    b. Has Indicators: Yes
    c. Indicators Content:
    GIB APT Threat Indicator(IPv4)
    GIB APT Threat Indicator(domain)
    GIB APT Threat Indicator(url)
    GIB APT Threat Indicator(md5)
    GIB APT Threat Indicator(sha256)
    GIB APT Threat Indicator(sha1)
    d. Description:
    Group-IB continuously monitors activities undertaken by hacker groups, investigate, collect, and analyze information about all emerging and ongoing attacks. Based on this information, we provide IOC's related to APT Groups Attacks.
  1. "GIBTIA_APT_ThreatActor" Playbook
    a. Collection: apt/threat_actor
    b. Has Indicators: No
    c. Indicators Content: N/A
    d. Description:
    This collection contains APT groups info, with detailed descriptions.
  1. "GIBTIA_Attacks_ddos" Playbook
    a. Collection: attacks/ddos
    b. Has Indicators: Yes
    c. Indicators Content:
    GIB DDoS Attack(IPv4)
    d. Description:
    The "DDoS attacks" collection contains a DDoS Attacks targets and C2 indicators.
  1. "GIBTIA_Attacks_deface" Playbook
    a. Collection: attacks/deface
    b. Has Indicators: Yes
    c. Indicators Content:
    GIB Attack Deface(url)
    d. Description:
    The “Deface” collection contains information about online resources that have become subject to defacement attacks (the visual content of a website being substituted or modified).
  1. "GIBTIA_Attacks_phishing" Playbook
    a. Collection: attacks/phishing
    b. Has Indicators: Yes
    c. Indicators Content:
    GIB Phishing Domain(domain)
    GIB Phishing IP(IPv4)
    GIB Phishing URL(url)
    d. Description:
    The “Attacks Phishing" collection provides information about various phishing resources (including URLs, Domains and IPs.).
  1. "GIBTIA_Attacks_phishing_kit" Playbook
    a. Collection: attacks/phishing_kit
    b. Has Indicators: Yes
    c. Indicators Content:
    GIB Phishing Kit Email(email)
    d. Description:
    The “Atacks Phishing Kits” collection contains information about the archives of phishing kits. Emails gotten from kits can be obtained as indicators.
  1. "GIBTIA_BP_phishing" Playbook
    a. Collection: bp/phishing
    b. Has Indicators: Yes
    c. Indicators Content:
    GIB Phishing Domain(domain)
    GIB Phishing IP(IPv4)
    GIB Phishing URL(url)
    d. Description:
    The "BP Phishing" collection provides events related to clients company.
  1. "GIBTIA_BP_phishing_kit" Playbook
    a. Collection: bp/phishing_kit
    b. Has Indicators: Yes
    c. Indicators Content:
    GIB Phishing Kit Email(email)
    d. Description:
    The "BP Phishing Kit" collection provides phishing kits related to clients company.
  1. "GIBTIA_Compromised_account" Playbook
    a. Collection: compromised/account
    b. Has Indicators: Yes
    c. Indicators Content:
    GIB Compromised Account CNC(url)
    GIB Compromised Account CNC(domain)
    GIB Compromised Account CNC(IPv4)
    d. Description:
    This collection contains credentials collected from various phishing resources, botnets, command-and-control (C&C) servers used by hackers.
  1. "GIBTIA_Compromised_card" Playbook
    a. Collection: compromised/card
    b. Has Indicators: Yes
    c. Indicators Content:
    GIB Compromised Card CNC URL(url)
    GIB Compromised Card CNC Domain(domain)
    GIB Compromised Card CNC IP(IPv4)
    d. Description:
    This collection contains information about compromised bank cards. This includes data collected from card shops, specialized forums, and public sources.
  1. "GIBTIA_Compromised_imei" Playbook
    a. Collection: compromised/imei
    b. Has Indicators: Yes
    c. Indicators Content:
    GIB Compromised IMEI CNC Domain(domain)
    GIB Compromised IMEI CNC URL(url)
    GIB Compromised IMEI CNC IP(IPv4)
    d. Description:
    The section contains data on infected mobile devices, which is obtained by analyzing mobile botnets. It does not contain personal data and is available to all system users.
  1. "GIBTIA_Compromised_mule" Playbook
    a. Collection: compromised/mule
    b. Has Indicators: Yes
    c. Indicators Content:
    GIB Compromised Mule CNC Domain(domain)
    GIB Compromised Mule CNC URL(url)
    GIB Compromised Mule CNC IP(IPv4)
    d. Description:
    This section contains information about bank accounts to which threat actors have transferred or plan to transfer stolen money. Man-in-the-Browser (MITB) attacks, mobile Trojans, and phishing kits allow fraudsters to make money transfers automatically. Playbook provides C2 data related to compromitation.
  1. "GIBTIA_HI_Threat" Playbook
    a. Collection: hi/threat
    b. Has Indicators: Yes
    c. Indicators Content:
    GIB HI Threat Indicator(domain)
    d. Description:
    Group-IB continuously monitors activities undertaken by hacker groups, investigate, collect, and analyze information about all emerging and ongoing attacks. Based on this information, we provide IOC's related to Hackers Attacks.
  1. "GIBTIA_HI_ThreatActor" Playbook
    a. Collection: hi/threat_actor
    b. Has Indicators: No
    c. Indicators Content: N/A
    d. Description:
    This collection contains non-APT groups and Individual hackers info, with detailed descriptions.
  1. "GIBTIA_Malware_cnc" Playbook
    a. Collection: malware/cnc
    b. Has Indicators: Yes
    c. Indicators Content:
    GIB Malware CNC Domain(domain)
    GIB Malware CNC URL(url)
    GIB Malware CNC IP(IPv4)
    d. Description:
    The "Malware" collection contains Malwares C2 detected by group IB.
  1. "GIBTIA_Malware_Targeted_Malware" Playbook
    a. Collection: malware/targeted_malware
    b. Has Indicators: Yes
    c. Indicators Content:
    GIB Malware Targeted Malware(md5)
    GIB Malware Targeted Malware(sha1)
    GIB Malware Targeted Malware(sha256)
    GIB Malware Targeted Malware Inject(md5)
    d. Description:
    The “Targeted Trojans” section contains information about malicious programs targeting the client's infrastructure. Information is collected by examining a multitude of malicious files and investigating various incidents.
  1. "GIBTIA_OSI_GitLeak" Playbook
    a. Collection: osi/git_leak
    b. Has Indicators: No
    c. Indicators Content: N/A
    d. Description:
    Open-source repositories such as GitHub contain codes that anyone can search for. They are often used by threat actors planning to attack a specific company. The “Git Leaks” section contains the above data in code repositories.
  1. "GIBTIA_OSI_PublicLeak" Playbook
    a. Collection: osi/public_leak
    b. Has Indicators: No
    c. Indicators Content: N/A
    d. Description:
    The “Public leaks” collection contains the leaked clinets data collected on popular file-sharing resources or text/information exchange websites.
  1. "GIBTIA_OSI_Vulnerability" Playbook
    a. Collection: osi/vulnerability
    b. Has Indicators: No
    c. Indicators Content: N/A
    d. Description:
    The “Vulnerabilities” collection displays information about vulnerabilities detected in the software by version.
  1. "GIBTIA_Suspicious_ip_open_proxy" Playbook
    a. Collection: suspicious_ip/open_proxy
    b. Has Indicators: Yes
    c. Indicators Content:
    GIB Open Proxy Address(IPv4)
    d. Description:
    The “Open proxy” collection proviedes information about lists of proxy servers that are publicly available on various online resources related to anonymity. In addition, proxy servers may be configured as open proxies intentionally or as a result of misconfiguration or breaches.
  1. "GIBTIA_Suspicious_ip_socks_proxy" Playbook
    a. Collection: suspicious_ip/socks_proxy
    b. Has Indicators: Yes
    c. Indicators Content:
    GIB Socks Proxy Address(IPv4)
    d. Description:
    The “Socks proxy” collection providess information about addresses where malware that turns infected computers into SOCKS proxies has been installed. Such computers (bots) are rented out and used in various attacks to ensure the attacker as much anonymity as possible.
  1. "GIBTIA_Suspicious_ip_tor_node" Playbook
    a. Collection: suspicious_ip/tor_node
    b. Has Indicators: Yes
    c. Indicators Content:
    GIB Tor Node Address(IPv4)
    d. Description:
    The “Tor Node” collection displays information about Tor exit nodes, which are the final Tor relays in the circuit. The nodes act as a medium between a Tor client and public Internet.

Deployment Steps

  1. Deploy GIBIndicatorsProcessor playbook first
  2. Deploy Required collections Playbooks and configure the following parameters:
    a. GIB Username - is a login to access GIB TI&A Web Interface
    b. Save only indicators - set to true if only indicators enrichment is required, otherwise, an additional table in Workspace with full event content will be created
    Note: Some collections provide no indicators, so do not have this parameter configurable and add GIB TI&A events only in Log Workspace c. GIB Action - This is an action required to set in a particular indicator type provided through the current collection.(The action to apply if the indicator is matched from within the targetProduct security tool. Possible values are: unknown, allow, block, alert)
    d. GIB API URL - is an GIB TI&A API URL
    e. Configure API Key variable. API Key can be generated in the Profile Section in Group-IB TI&A Web Interface, it's highly recommended to use Azure Key Vault Playbook Get Secret control

Note:

  • In case if you faced an issue while deploying one of the Playbooks via the ARM template's option, please refer to the Playbook json file and do a manual copy & paste activity to a blank Playbook (Logic App).
  • Please ensure keeping the default value of PlaybookName as is since there is a dependencies at other playbooks for the messages batching process on the names, ensure that GIBIndicatorsProcessor playbook be installed first then deploy any other needed playbook (Collection) and ensure that all PLaybooks have the same resource group region.
  • Based on the Playbooks (Logic App) selected region (East US, UAE North, West Europe,...etc) please ensure validating the Logic APP region outbound IPs list are been whitelisted with Group-IB, for more details: https://docs.microsoft.com/azure/logic-apps/logic-apps-limits-and-config#outbound-ip-addresses

Register an Azure AD App for TI Indicators Graph API Write Access

  1. Go to Azure Active Directory / App Registrations
  2. Create +New Registration
  3. Give it a name. Click Register.
  4. Click API Permissions Blade.
  5. Click Add a Permission.
  6. Click Microsoft Graph.
  7. Click Appplication Permissions
  8. Check permissions for ThreatIndicators (ThreatIndicators.ReadWrite.OwnedBy). Click Add permissions.
  9. Click grant admin consent for domain.com
  10. Click Certificates and Secrets
  11. Click New Client Secret
  12. Enter a description, select never. Click Add.
  13. IMPORTANT. Click copy next to the new secret and paste it somewhere temporaily. You can not come back to get the secret once you leave the blade.
  14. Copy the client Id from the application properties and paste it somewhere.
  15. Also copy the tenant Id from the AAD directory properties blade.