Warning: You are viewing an older version of this documentation. Most recent is here: 40.0.1

Declarations of Compromise

Note

Declarations of Compromise were formerly known as STR Events prior U38.0.0

See also

If you want to know more about Declarations of Compromise ™, read this page.

Custom Declarations of Compromise

From the Hunting interface, it is possible to create custom Declarations of Compromise (DoC) that will appear in the Operational Center and be identified as custom Threats.

Once you have created a filter that matches a specific threat in your environment, click the Policy Actions dropdown and select Create DoC Event.

Declaration of Compromise Dropdown Menu

A modal will appear and let you configure the custom threat.

If the filter allows detecting an already existing threats, select that threat otherwise create a new threat by clicking on the + icon next to the Threat Name section.

Declaration of Compromise Modal

Under the Threat Vector section, set:

  • The Offender Key to the field name that represents the attacking system such as src_ip or dest_ip

  • The Asset Key to the field name that represents the impacted asset such as src_ip or dest_ip

  • The Asset Type to describe the kind of impacted asset (IP, Username or Mail)

  • The Kill Chain phase translating the phase in which these alerts belong such as Command & Control for example

Then, you can decide to:

  • Generate Declaration of Compromise from historical data

  • Generate Webhook actions from those historical Declarations of Compromise

Finally, select one or more rulesets in which to deploy those changes.

Depending on your environment, the generation of historical events may take some time. The progression can be observed under Status of tasks with a task named create STR events from historical data (Probe Management > Appliances > Left Panel (Tasks) )

Important

Once a new Declaration of Compromise has been created, please update/push ruleset.

Note

Once created, a specific Policy action for that Declaration of Compromise will be created and can be seen under the Policies menu. You can delete custom Declarations of Compromise by simply deleting the associated policy.

Editing a Custom Declaration of Compromise

From the Radar interface, select Custom Threats under Families. You will be able to edit the name, the description and additional information of that threat. Note that the fields description and Additional Information are Markdown compatible and images can be embedded too as in this example:

# Example

This is a serious **Threat**

![Alt text](https://www.stamus-networks.com/hubfs/favicon.ico "Optional title")

DoC Suppression

You may decide to suppress a Declaration of Compromise from appearing in the Operational Center. The suppression will be performed by combining a Signature ID and an IP address, or subnet, of an Offender.

To do so:

  1. Go to Probe Management

  2. Go to the Rulesets page

  3. Click on Edit ruleset (ruleset where the DoC is deployed)

  4. Under Expert mode, configure event suppression under Suppress events

  5. Update/push ruleset in order to apply the suppression

suppress gen_id 2, sig_id 1002025885, track by_src, ip 107.182.230.25/8

The tracking can be either by_src, by_dst or by_either.

Note

gen_id corresponds to the gid of the signature, which is always 2 for Declarations of Compromise

Note

Variables can be used for the ip as well but make sure that this variable is defined on the probe settings

suppress gen_id 2, sig_id 1002025885, track by_either, $SCANNERS

Finding the sig_id

To find the sig_id required for the event suppression, go under Threat Radar and:

  • Open the Asset Table

  • Unfold the desired asset such as 10.7.5.101

  • Under the Detection Methods tab, identify the sig_id of the appropriate signature as illustrated in the following screenshot

Finding the signature SID in assets table

Find the Offender IP

To find the Offender IP required for the event suppression, go under Threat Radar and:

  • Go to Threat Family page

  • Select a Threat

  • Go to the Assets tab

  • Select Offenders from the Ctrl menu on the right of each impacted assets

Finding the offender IP in the assets table