Viewing Results
Viewing Results
Sandfly constantly looks at your Linux hosts for signs of compromise or other suspicious activity. Anything it finds is reported as an alarm for you to view and take action. Sandfly also keeps track of every time it checks a host and found that it passed the check. This works as an auditing platform to show you the last time a system was checked and found to be clean.
Viewing Alerts
Alerts are shown as a list of hosts affected with associated Mitre ATT&CK tags plus other supporting data. Each row is double clickable to get to the alert details.
To view alerts, simply double click on a row or click the hyper-linked, primary data element. This will take you to a detailed forensic view of the result.
Forensic Data Viewer
The forensic data view of an alert has details that include information such as the affected target name, first and last seen dates, and severity. Additionally, you will see an explanation in plain English about what was found.
Mitre ATT&CK Details
Along with the alert information you will have links to the Mitre ATT&CK tag(s) that the attack falls under. Clicking on a tag will take you to the Mitre ATT&CK page describing the tactic in more detail.
Along with the high-level tactic type, Sandfly will provide a specific ATT&CK ID of the tactic if one is available in the Mitre database.
Result Host Summary
Below the explanation data section is a summary view of the host. Clicking the Go to Host button takes you directly to the registration data where the full details of that host can be seen.
Sandfly Hunter
Below an alert is the Sandfly Hunter mode. This mode allows you to search across all hosts for particularly important forensic data in an alert. This forensic data will vary depending on the alert type seen, but includes names, paths, cryptographic hashes and other information that can help you quickly see what other hosts may have that relates to the alert.
For instance, clicking on a suspicious process will show you cryptographic hashes of that process. You can then click on the Sandfly Hunter hash search and Sandfly will show you all hosts running that same process whether or not it generated an alert. Below we have found a suspicious process on one host, but clicking on that hash shows that multiple hosts were seen running that same process without alerts. This kind of search can help identify spread of malicious binaries, users, SSH keys and other important threat hunting data.
The Sandfly Hunter is a powerful feature and is discussed in further detail in the Sandfly Hunter section.
Results Action Buttons
The top of each result details includes buttons with common actions for a result. These actions are:
Recheck Event
Sometimes you may want to quickly check if an event is still happening on a system. The Recheck button immediately initiates a manual scan, using the host and sandfly from the result, so the host can be checked again to see if the alert reoccurs. If it does, then this can confirm that the alert is still an issue. If you are experiencing a transient alert that you think is a false alarm but not something to be whitelisted, you can use this button to confirm.
Whitelist Event
Clicking on the Whitelist button opens a form for adding a new rule which can either completely disable a sandfly or apply hash matches that prevents matched results from becoming alerts.
The section on Whitelisting explains this process further.
Profile Events
Clicking on the Create Profile button opens a form for creating a new result profile which can be used for drift detection and/or result whitelisting.
Clicking on the Add to Profile button opens a separate form for adding selected hosts and/or results to an existing result profile.
The section on Result Profiles explains the profiling feature in detail.
Delete Event
Clicking the Delete button will delete this event and take you back to the results screen.
IMPORTANT: Suspicious Problems Do Not Just Fix Themselves
Computers are not spontaneous. If a problem is found by Sandfly and then just vanishes it could be a false alarm. But then again, it may not. Suspicious activity that fixes itself is in itself suspicious.
Sandfly and False Alarms
The sandflies that do the investigations are written carefully to not have false alarms. However, if this is your first time running Sandfly it is possible that something in your environment configuration could cause a false alarm.
We suggest you treat any threats detected as real unless you can verify 100% they are not a problem. If you sure it is a false alarm and it is activating constantly, please see the section on Whitelisting to disable or override the offending module on this host.
After you whitelist the sandfly, please contact us if you think it is a genuine false alarm. We can help diagnose if it is a legitimate false alarm, or just something with your particular environment that cannot be avoided. If we determine it is a problem with the sandfly we will create a fix and get it posted in the next update.
TODO: Contact Us If a Sandfly is Causing False Alarms
If you find a sandfly that is always causing a false alarm, please let us know. If the false alarm is unique to your environment, it may not be something we can help with. But if it is not unique to your environment, we want to know so we can fix it and make Sandfly as reliable as possible.
Updated 3 months ago