Skip to content

Commit 5684c73

Browse files
alexiacrumptonBuild and Push Automation Script
authored andcommitted
Automated commit to rebuild the static site
Signed-off-by: Build and Push Automation Script <>
1 parent 9a02481 commit 5684c73

File tree

89 files changed

+829
-570
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

89 files changed

+829
-570
lines changed

docs/analytics/CAR-2013-01-002/index.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,7 @@ The Sysinternals tool [Autoruns](../sensors/autoruns) checks the registry and fi
1414
Utilizes the Sysinternals autoruns tool (ignoring validated Microsoft entries). Primarily not a detection analytic by itself but through analysis of results by an analyst can be used for such. Building another analytic on top of this one identifying unusual entries would likely be a beneficial alternative.
1515

1616

17+
1718
### ATT&CK Detections
1819

1920
|Technique|Subtechnique(s)|Tactic(s)|Level of Coverage|

docs/analytics/CAR-2013-01-003/index.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,13 +9,14 @@ contributors: MITRE
99
applicable_platforms: N/A
1010
---
1111
<br><br>
12-
[Server Message Block](https://en.wikipedia.org/wiki/Server_Message Block) (SMB) is used by Windows to allow for file, pipe, and printer sharing over port 445/tcp. It allows for enumerating, and reading from and writing to file shares for a remote computer. Although it is heavily used by Windows servers for legitimate purposes and by users for file and printer sharing, many adversaries also use SMB to achieve [Lateral Movement](https://attack.mitre.org/tactics/TA0008). Looking at this activity more closely to obtain an adequate sense of situational awareness may make it possible to detect adversaries moving between hosts in a way that deviates from normal activity. Because SMB traffic is heavy in many environments, this analytic may be difficult to turn into something that can be used to quickly detect an APT. In some cases, it may make more sense to run this analytic in a forensic fashion. Looking through and filtering its output after an intrusion has been discovered may be helpful in identifying the scope of compromise.
12+
[Server Message Block](https://en.wikipedia.org/wiki/Server_Message Block) (SMB) is used by Windows to allow for file, pipe, and printer sharing over port 445/tcp. It allows for enumerating, and reading from and writing to file shares for a remote computer. Although it is heavily used by Windows servers for legitimate purposes and by users for file and printer sharing, many adversaries also use SMB to achieve [Lateral Movement](https://attack.mitre.org/tactics/TA0008). Looking at this activity more closely to obtain an adequate sense of situational awareness may make it possible to detect adversaries moving between hosts in a way that deviates from normal activity. Because SMB traffic is heavy in many environments, this analytic may be difficult to turn into something that can be used to quickly detect an APT. In some cases, it may make more sense to run this analytic in a forensic fashion. Looking through and filtering its output after an intrusion has been discovered may be helpful in identifying the scope of compromise.
1313

1414
### Output Description
1515

1616
The source, destination, content, and time of each event.
1717

1818

19+
1920
### ATT&CK Detections
2021

2122
|Technique|Subtechnique(s)|Tactic(s)|Level of Coverage|
@@ -45,14 +46,15 @@ The source, destination, content, and time of each event.
4546

4647
#### Pseudocode
4748

48-
Although there may be more native ways to detect detailed SMB events on the host, they can be extracted out of network traffic. With the right protocol decoders, port 445 traffic can be filtered and even the file path (relative to the share) can be retrieved.
49+
Although there may be more native ways to detect detailed SMB events on the host, they can be extracted out of network traffic. With the right protocol decoders, port 445 traffic can be filtered and even the file path (relative to the share) can be retrieved.
4950

5051

5152
```
5253
flow = search Flow:Message
5354
smb_events = filter flow where (dest_port == "445" and protocol == "smb")
5455
smb_events.file_name = smb_events.proto_info.file_name
5556
output smb_write
57+
5658
```
5759

5860

docs/analytics/CAR-2013-02-008/index.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@ Logon events are Windows Event Code 4624 for Windows Vista and above, 518 for pr
1515
Logon types 2, 3, 9 and 10 are of interest. For more details see the Logon Types table on Microsoft's [Audit Logon Events](https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc787567(v=ws.10)) page.
1616

1717

18+
1819
### ATT&CK Detections
1920

2021
|Technique|Subtechnique(s)|Tactic(s)|Level of Coverage|
@@ -47,9 +48,10 @@ Logon types 2, 3, 9 and 10 are of interest. For more details see the Logon Types
4748
```
4849
users_list = search UserSession:Login
4950
users_grouped = group users_list by hostname
50-
users_grouped = from users_grouped select min(time) as earliest_time, max(time) as latest_time count(user) as user_count
51+
users_grouped = from users_grouped select min(time) as earliest_time, max(time) as latest_time count(user) as user_count
5152
multiple_logins = filter users_grouped where (latest_time - earliest_time <= 1 hour and user_count > 1)
5253
output multiple_logins
54+
5355
```
5456

5557

docs/analytics/CAR-2013-02-012/index.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@ Certain users will likely appear as being logged into several machines and may n
1818
User Name, Machines logged into, the earliest and latest times in which users were logged into the host, the type of logon, and logon ID.
1919

2020

21+
2122
### ATT&CK Detections
2223

2324
|Technique|Subtechnique(s)|Tactic(s)|Level of Coverage|

docs/analytics/CAR-2013-03-001/index.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@ The sequence of processes that resulted in `reg.exe` being started from a shell.
2121
- `reg.exe`
2222

2323

24+
2425
### ATT&CK Detections
2526

2627
|Technique|Subtechnique(s)|Tactic(s)|Level of Coverage|
@@ -65,6 +66,7 @@ reg = filter processes where (exe == "reg.exe" and parent_exe == "cmd.exe")
6566
cmd = filter processes where (exe == "cmd.exe" and parent_exe != "explorer.exe"")
6667
reg_and_cmd = join (reg, cmd) where (reg.ppid == cmd.pid and reg.hostname == cmd.hostname)
6768
output reg_and_cmd
69+
6870
```
6971

7072

@@ -77,6 +79,7 @@ DNIF version of the above pseudocode.
7779
_fetch * from event where $LogName=WINDOWS-SYSMON AND $EventID=1 AND $Process=regex(.*reg\.exe.*)i AND $ParentProcess=regex(.*cmd\.exe.*)i as #A limit 100
7880
>>_fetch * from event where $LogName=WINDOWS-SYSMON AND $EventID=1 AND $Process=regex(.*cmd\.exe.*)i NOT $ParentProcess=regex(.*explorer\.exe.*)i as #B limit 100
7981
>>_checkif sjoin #B.$PPID = #A.$CPID str_compare #B.$SystemName eq #A.$SystemName include
82+
8083
```
8184

8285

docs/analytics/CAR-2013-05-003/index.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,7 @@ flow = search Flow:Message
4848
smb_write = filter flow where (dest_port == "445" and protocol == "smb.write")
4949
smb_write.file_name = smb_write.proto_info.file_name
5050
output smb_write
51+
5152
```
5253

5354

docs/analytics/CAR-2013-07-005/index.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,7 @@ Before [exfiltrating data](https://attack.mitre.org/tactics/TA0010) that an adve
1414
In addition to looking for RAR or 7z program names, command line usage of 7Zip or RAR can be detected with the flag usage of "`\* a \*`". This is helpful, as adversaries may change program names.
1515

1616

17+
1718
### ATT&CK Detections
1819

1920
|Technique|Subtechnique(s)|Tactic(s)|Level of Coverage|
@@ -48,6 +49,7 @@ This analytic looks for the command line argument `a`, which is used by RAR. How
4849
processes = search Process:Create
4950
rar_argument = filter processes where (command_line == "* a *")
5051
output rar_argument
52+
5153
```
5254

5355

@@ -58,6 +60,7 @@ DNIF version of the above pseudocode.
5860

5961
```
6062
_fetch * from event where $LogName=WINDOWS-SYSMON AND $EventID=1 AND $Process=regex(.* a .*)i limit 100
63+
6164
```
6265

6366

@@ -68,6 +71,7 @@ LogPoint version of the above pseudocode.
6871

6972
```
7073
norm_id=WindowsSysmon event_id=1 command="* a *"
74+
7175
```
7276

7377

docs/analytics/CAR-2013-08-001/index.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,7 @@ Look for instances of `schtasks.exe` running as processes. The `command_line` fi
4747
process = search Process:Create
4848
schtasks = filter process where (exe == "schtasks.exe")
4949
output schtasks
50+
5051
```
5152

5253

@@ -57,6 +58,7 @@ DNIF version of the above pseudocode.
5758

5859
```
5960
_fetch * from event where $LogName=WINDOWS-SYSMON AND $EventID=1 AND $App=schtasks.exe AND $Process=regex(.*(\/create|\/run|\/query|\/delete|\/change|\/end).*)i limit 100
61+
6062
```
6163

6264

@@ -67,6 +69,7 @@ LogPoint version of the above pseudocode.
6769

6870
```
6971
norm_id=WindowsSysmon event_id=1 image="*\schtasks.exe" command IN ["*/create*", "*/run*", "*/query*", "*/delete*", "*/change*", "*/end*"]
72+
7073
```
7174

7275

@@ -85,6 +88,7 @@ Create a new scheduled task with schtasks.exe and verify the analytic fires when
8588
* To remove the scheduled task, execute `schtasks /Delete /TN calctask`.
8689
* The program should respond with “SUCCESS: The scheduled task “calctask” was successfully deleted.”
8790

91+
8892
```
8993
schtasks /Create /SC ONCE /ST 19:00 /TR C:\Windows\System32\calc.exe /TN calctask
9094
schtasks /Delete /TN calctask

docs/analytics/CAR-2013-10-001/index.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,7 @@ Logon events are Windows Event Code 4624 for Windows Vista and above, 518 for pr
1919
The time of login events for distinct users on individual systems
2020

2121

22+
2223
### ATT&CK Detections
2324

2425
|Technique|Subtechnique(s)|Tactic(s)|Level of Coverage|
@@ -50,6 +51,7 @@ logon_events = search User_Session:Login
5051
filtered_logons = filter logon_events where (
5152
user NOT IN TOP30(user))
5253
output filtered_logons
54+
5355
```
5456

5557

@@ -61,6 +63,7 @@ Splunk version of the above pseudocode. NOTE - this is liable to be quite noisy
6163

6264
```
6365
index=__your_win_event_log_index__ EventCode=4624|search NOT [search index=__your_win_event_log_index__ EventCode=4624|top 30 Account_Name|table Account_Name]
66+
6467
```
6568

6669

@@ -75,6 +78,7 @@ _fetch * from event where $LogName=WINDOWS-NXLOG-AUDIT AND $SubSystem=AUTHENTICA
7578
>>_store in_disk david_test win_top_30 stack_replace
7679
>>_fetch * from event where $LogName=WINDOWS-NXLOG-AUDIT AND $SubSystem=AUTHENTICATION AND $Action=LOGIN limit 10000
7780
>>_checkif lookup david_test win_top_30 join $ScopeID = $ScopeID str_compare $User eq $User exclude
81+
7882
```
7983

8084

docs/analytics/CAR-2013-10-002/index.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@ Microsoft Windows allows for processes to remotely create threads within other p
1818
This behavior can be detected by looking for thread creations across processes, and resolving the entry point to determine the function name. If the function is `LoadLibraryA` or `LoadLibraryW`, then the intent of the remote thread is clearly to inject a DLL. When this is the case, the source process must be examined so that it can be ignored when it is both expected and a trusted process.
1919

2020

21+
2122
### ATT&CK Detections
2223

2324
|Technique|Subtechnique(s)|Tactic(s)|Level of Coverage|
@@ -56,6 +57,7 @@ remote_thread = filter (start_function == "LoadLibraryA" or start_function == "L
5657
remote_thread = filter (src_image_path != "C:\Path\To\TrustedProgram.exe")
5758
5859
output remote_thread
60+
5961
```
6062

6163

@@ -66,6 +68,7 @@ LogPoint version of the above pseudocode.
6668

6769
```
6870
norm_id=WindowsSysmon event_id=8 start_function IN ["LoadLibraryA", "LoadLibraryW"] -source_image="C:\Path\To\TrustedProgram.exe"
71+
6972
```
7073

7174

0 commit comments

Comments
 (0)