[Osquery_manager] BITS artifact saved query #15896
Open
+95
−8
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
BITS Jobs Monitoring Artifact
This PR adds osquery saved queries for monitoring BITS (Background Intelligent Transfer Service) file transfers to detect potential data exfiltration or malware downloads. BITS is commonly abused by adversaries for covert file transfers and persistence mechanisms (MITRE ATT&CK T1197).
Read https://p.elstc.co/paste/-pG3RF1v#qxFQ0hk08Sj4C1zZ8es5KgJ72sl1-LdcpPg3rMVLecP
Core Forensic Artifacts Coverage Table
Queries by Platform
🪟 Windows - BITS Transfer Monitoring
Description
Monitors BITS (Background Intelligent Transfer Service) file transfers to identify potential security threats including data exfiltration, malware downloads, and persistence mechanisms. The query analyzes Windows Event Log Event ID 59 (BITS transfer completion) to detect transfers to non-whitelisted external domains.
Detection Focus:
Filtering Strategy:
Results
Query returns BITS transfer events with:
Results indicate suspicious external file transfer activity requiring investigation.
Platform
windowsInterval
3600seconds (1 hour)Query ID
bits_monitoring_windows_elasticECS Field Mappings
event.category→["network"]event.type→["connection", "info"]event.action→["bits-transfer"]event.code→eventidevent.provider→provider_nameurl.full→Urlurl.domain→Hostfile.name→Nametags→["persistence", "defense_evasion", "bits_jobs", "network_transfer", "mitre_t1197"]SQL Query
MITRE ATT&CK Coverage
Technique: T1197 - BITS Jobs