Skip to content

Instantly share code, notes, and snippets.

@MHaggis
Last active November 26, 2018 16:52
Show Gist options
  • Save MHaggis/f08ba5d6cab4e39182fd17fa59ad3266 to your computer and use it in GitHub Desktop.
Save MHaggis/f08ba5d6cab4e39182fd17fa59ad3266 to your computer and use it in GitHub Desktop.
### Stats
| metadata type=sourcetypes index=carbonblack
`cb` | stats values(computer_name)
`cb` type=alert | stats values(docs{}.endpoint) by watchlist_name
`cb` notification_type="watchlist.hit.*" | stats values(watchlist_name)
`cb` | stats values(feed_name)
`cb` | stats count by feed_name
`cb` notification_type=feed.*| stats values(feed_name) count by computer_name
`cb` | stats values(type)
### Critical Process Check by process
`cb` process="powershell.exe" OR process="msbuild.exe" OR process="psexec.exe" OR process="at.exe" OR process="schtasks.exe" OR process="net.exe" OR process="vssadmin.exe" OR process="utilman.exe" OR process="wmic.exe" OR process="mshta.exe" OR process="wscript.exe" OR process="cscript.exe" OR process="cmd.exe" OR process="whoami.exe" OR process="mmc.exe" OR process="systeminfo.exe" OR process="csvde.exe" OR process="certutil.exe" | stats values(command_line) by process
### Critical Process Check by computer
`cb` process="powershell.exe" OR process="msbuild.exe" OR process="psexec.exe" OR process="at.exe" OR process="schtasks.exe" OR process="net.exe" OR process="vssadmin.exe" OR process="utilman.exe" OR process="wmic.exe" OR process="mshta.exe" OR process="wscript.exe" OR process="cscript.exe" OR process="cmd.exe" OR process="whoami.exe" OR process="mmc.exe" OR process="systeminfo.exe" OR process="csvde.exe" OR process="certutil.exe" | stats values(command_line) by computer_name
### Endpoint Deep Dive
`cb` computer_name=collider01 type="ingress.event.procstart" | stats values(command_line) by process
`cb` process=net.exe | stats values(computer_name) by date_hour
`cb` process=net.exe | stats values(command_line) by date_hour
### Feeds, Watchlist Alerts
`cb` feed_name=bit9endpointvisibility | stats values(ioc_query_string) by docs{}.cmdline
### Username Analysis
`cb` | stats values(username) count by computer_name
`cb` | stats values(computer_name) count by username
`cb` [ inputlookup adminaccounts ]| stats values(username) count
`cb` | stats dc(username) count by computer_name
`cb` | stats dc(computer_name) count by username
`cb` username!=SYSTEM username!="LOCAL SERVICE" username!="NETWORK SERVICE" | stats dc(computer_name) count by username
### Network Analysis
`cb` computer_name=collider01 type="ingress.event.netconn" direction="outbound" | stats count by remote_port
`cb` type="ingress.event.netconn" direction="outbound" | stats count by remote_port
`cb` type="ingress.event.netconn" direction="outbound" | stats dc(remote_port) by local_port
`cb` type="ingress.event.netconn" direction="outbound" | stats dc(local_port) by remote_port
`cb` type="ingress.event.netconn" | iplocation remote_ip AS geoip | stats values(City) by computer_name
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment