Team T5

TeamT5

Threat hunting tool "ThreatSonar"

There are several types of cyber-attacks depending on the purpose, but among them, cyber-espionage attacks that target information assets are particularly sophisticated, and attacks are carried out by sneaking past existing security products. Detecting and detecting already hidden threats is difficult with existing security tools alone, and "threat hunting" is one of the detection methods. "Threat hunting" is a method of sifting through collected PC and network data based on knowledge such as attacker behavior and frequently used techniques, and then finding suspicious traces and detecting latent threats.

  • ThreatSonar

ThreatSonar is a platform for information gathering, data analysis, and threat analysis for carrying out "threat hunting". It is created from the advanced knowledge of the latest attack methods that Team T5 has cultivated in incident response, and is optimized to detect latent threats. The well-organized user interface makes it easy to check the analysis results and conduct further investigations based on the traces found.

Features of ThreatSonar

  1. Lightweight scan tools and easy-to-install servers
    • lightweight scan tool
      1. Scan tool requires no installation and works in user mode
      2. The scan tool scans for about 30 minutes (depending on the customer's environment) and is automatically deleted when the PC is logged off
      3. Ability to limit CPU usage during scanning
      4. It specializes in detecting and collecting investigation information, and does not have functions for deleting files, stopping processes, or blocking communication, so the impact on terminals is minimal.
    • Easy-to-install server
      1. ThreatSonar Server is delivered as a virtual appliance for easy installation
      2. Supports various platforms (VMware, VirtualBox, Xen, AWS, etc.)
      3. It is also possible to use our cloud server tenant (no server installation required)
  2. Easy-to-use feature set for threat hunting
    • Implementation of threat modeling based on proprietary threat intelligence
    • Process memory scanning function
    • Process file writing and execution time timeline function
    • Statistical outlier investigation capabilities
  3. An interface that can investigate the information necessary for threat hunting from various perspectives
    The threat level based on our unique modeling is displayed for each file and event, and it becomes the threat level of the terminal, so you can easily check the priority of the investigation. In addition, the collected information can be checked from various viewpoints, such as file-by-file, network information, and process write/execution time axis information. Possible
  • An interface that can investigate the information necessary for threat hunting from various perspectives

Use Case

  • Usage example
    1. Prompt investigation of terminals and devices suspected of being infected
    2. PC regular diagnosis
  • Usage range example
    1. Regular diagnosis of all OA terminals
    2. Strengthening security at overseas bases and group companies
    3. Enhanced security for critical assets such as servers
    4. Enhanced security for control terminals, etc. where agents cannot be installed
  • Scan tool compatible OS
  Compatible OS
Windows
  • Windows XP SP3 *
  • Windows Vista
  • Windows 7
  • Windows 8
  • Windows 8.1
  • Windows 10
Windows Server
  • Windows Server 2003 SP2 *
  • Windows Server 2008
  • Windows Server 2012
  • Windows Server 2016
Linux
  • Linux Kernel 2.6.25, with Glibc 2.5 (32/64-bit)
    1. Ubuntu 10.04 (Kernel 2.6.32, Glibc 2.11)
    2. Debian 5 (Kernel 2.6.26, Glibc 2.7)
    3. CentOS 6.10 (Kernel 2.6.32, Glibc 2.12)
    4. RHEL 6 (Kernel 2.6.32, Glibc 2.12)
    5. OpenSUSE 11.0 (Kernel 2.6.25, Glibc 2.8)

* Microsoft security updates KB948963 and KB968730 must be applied

Inquiry/Document request

In charge of Macnica TeamT5

Mon-Fri 8:45-17:30