applicable_platforms: Windows
---
-
-
+
This detection is to identify a creation of "user mode service" where the service file path is located in non-common service folder in windows.
diff --git a/docs/analytics/CAR-2021-11-001/index.md b/docs/analytics/CAR-2021-11-001/index.md
index bec2ed6f..18eb1c64 100644
--- a/docs/analytics/CAR-2021-11-001/index.md
+++ b/docs/analytics/CAR-2021-11-001/index.md
@@ -8,8 +8,7 @@ analytic_type: TTP
contributors: Lucas Heiligenstein
applicable_platforms: Windows
---
-
-
+
Detection of creation of registry key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\SafeDllSearchMode. The key SafeDllSearchMode, if set to 0, will block the Windows mechanism for the search DLL order and adversaries may execute their own malicious dll.
diff --git a/docs/analytics/CAR-2021-11-002/index.md b/docs/analytics/CAR-2021-11-002/index.md
index ebd130b7..61b22c50 100644
--- a/docs/analytics/CAR-2021-11-002/index.md
+++ b/docs/analytics/CAR-2021-11-002/index.md
@@ -8,8 +8,7 @@ analytic_type: TTP
contributors: Lucas Heiligenstein
applicable_platforms: Windows
---
-
-
+
Detection of modification of the registry key values of `Notify`, `Userinit`, and `Shell` located in `HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\` and `HKEY_LOCAL_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\`. When a user logs on, the Registry key values of `Notify`, `Userinit` and `Shell` are used to load dedicated Windows component. Attackers may insert malicious payload following the legitimate value to launch a malicious payload.
diff --git a/docs/analytics/CAR-2021-12-001/index.md b/docs/analytics/CAR-2021-12-001/index.md
index 22eb641d..b7078c65 100644
--- a/docs/analytics/CAR-2021-12-001/index.md
+++ b/docs/analytics/CAR-2021-12-001/index.md
@@ -8,8 +8,7 @@ analytic_type: TTP
contributors: Lucas Heiligenstein
applicable_platforms: Windows
---
-
-
+
Detection of the creation or modification of Scheduled Tasks with a suspicious script, extension or user writable path. Attackers may create or modify Scheduled Tasks for the persistent execution of malicious code. This detection focuses at the same time on EventIDs 4688 and 1 with process creation (SCHTASKS) and EventID 4698, 4702 for Scheduled Task creation/modification event log.
diff --git a/docs/analytics/CAR-2021-12-002/index.md b/docs/analytics/CAR-2021-12-002/index.md
index bb1a9467..53fcf621 100644
--- a/docs/analytics/CAR-2021-12-002/index.md
+++ b/docs/analytics/CAR-2021-12-002/index.md
@@ -8,8 +8,7 @@ analytic_type: TTP
contributors: Lucas Heiligenstein
applicable_platforms: Windows
---
-
-
+
Detection of the modification of the registry key `Common Startup` located in `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\` and `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\`. When a user logs on, any files located in the Startup Folder are launched. Attackers may modify these folders with other files in order to evade detection set on these default folders. This detection focuses on EventIDs 4688 and 1 for process creation and EventID 4657 for the modification of the Registry Keys.
diff --git a/docs/analytics/CAR-2022-03-001/index.md b/docs/analytics/CAR-2022-03-001/index.md
index 0b100f86..a10887d6 100644
--- a/docs/analytics/CAR-2022-03-001/index.md
+++ b/docs/analytics/CAR-2022-03-001/index.md
@@ -8,8 +8,7 @@ analytic_type: TTP
contributors: Lucas Heiligenstein
applicable_platforms: Windows
---
-
-
+
Adversaries may disable Windows event logging to limit data that can be leveraged for detections and audits. Windows event logs record user and system activity such as login attempts, process creation, and much more. This data is used by security tools and analysts to generate detections. There are different ways to perform this attack.
1. The first one is to create the Registry Key `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\MiniNt`. This action will not generate Security EventLog 4657 or Sysmon EventLog 13 because the value of the key remains empty. However, if an attacker uses powershell to perform this attack (and not cmd), a Security EventLog 4663 will be generated (but 4663 generates a lot of noise).
2. The second way is to disable the service EventLog (display name Windows Event Log). After disabed, attacker must reboot the system. The action of disabling or put in manual the service will modify the Registry Key value `HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\start`, therefore Security EventLog 4657 or Sysmon EventLog 13 will be generated on the system.
diff --git a/docs/analytics/by_technique/index.md b/docs/analytics/by_technique/index.md
index 3ecf4011..e1445b68 100644
--- a/docs/analytics/by_technique/index.md
+++ b/docs/analytics/by_technique/index.md
@@ -28,6 +28,31 @@ permalink: /analytics/by_technique
T1003.002: Security Account Manager |
|
+
+ T1007: System Service Discovery |
+ (N/A - technique only) |
+ |
+
+
+ T1010: Application Window Discovery |
+ (N/A - technique only) |
+ |
+
+
+ T1012: Query Registry |
+ (N/A - technique only) |
+ |
+
+
+ T1016: System Network Configuration Discovery |
+ (N/A - technique only) |
+ |
+
+
+ T1018: Remote System Discovery |
+ (N/A - technique only) |
+ |
+
T1021: Remote Services |
(N/A - technique only) |
@@ -49,6 +74,16 @@ permalink: /analytics/by_technique
T1021.006: Windows Remote Management |
|
+
+ T1029: Scheduled Transfer |
+ (N/A - technique only) |
+ |
+
+
+ T1033: System Owner/User Discovery |
+ (N/A - technique only) |
+ |
+
T1036: Masquerading |
(N/A - technique only) |
@@ -67,6 +102,31 @@ permalink: /analytics/by_technique
T1037.001: Logon Script (Windows) |
|
+
+ T1039: Data from Network Shared Drive |
+ (N/A - technique only) |
+ |
+
+
+ T1040: Network Sniffing |
+ (N/A - technique only) |
+ |
+
+
+ T1046: Network Service Discovery |
+ (N/A - technique only) |
+ |
+
+
+ T1047: Windows Management Instrumentation |
+ (N/A - technique only) |
+ |
+
+
+ T1049: System Network Connections Discovery |
+ (N/A - technique only) |
+ |
+
T1053: Scheduled Task/Job |
@@ -75,7 +135,7 @@ permalink: /analytics/by_technique
|
- T1053.002: At (Windows) |
+ T1053.002: At |
|
@@ -89,6 +149,11 @@ permalink: /analytics/by_technique
T1055.001: Dynamic-link Library Injection |
|
+
+ T1057: Process Discovery |
+ (N/A - technique only) |
+ |
+
T1059: Command and Scripting Interpreter |
(N/A - technique only) |
@@ -106,6 +171,11 @@ permalink: /analytics/by_technique
T1059.001: PowerShell |
|
+
+ T1068: Exploitation for Privilege Escalation |
+ (N/A - technique only) |
+ |
+
T1069: Permission Groups Discovery |
@@ -118,7 +188,7 @@ permalink: /analytics/by_technique
|
- T1070: Indicator Removal on Host |
+ T1070: Indicator Removal |
T1070.003: Clear Command History |
@@ -143,6 +213,11 @@ permalink: /analytics/by_technique
T1078.003: Local Accounts |
|
+
+ T1082: System Information Discovery |
+ (N/A - technique only) |
+ |
+
T1087: Account Discovery |
@@ -154,6 +229,21 @@ permalink: /analytics/by_technique
T1087.002: Domain Account |
|
+
+ T1098: Account Manipulation |
+ (N/A - technique only) |
+ |
+
+
+ T1105: Ingress Tool Transfer |
+ (N/A - technique only) |
+ |
+
+
+ T1112: Modify Registry |
+ (N/A - technique only) |
+ |
+
T1127: Trusted Developer Utilities Proxy Execution |
T1127.001: MSBuild |
@@ -164,13 +254,28 @@ permalink: /analytics/by_technique
T1136.001: Local Account |
|
+
+ T1140: Deobfuscate/Decode Files or Information |
+ (N/A - technique only) |
+ |
+
+
+ T1187: Forced Authentication |
+ (N/A - technique only) |
+ |
+
+
+ T1197: BITS Jobs |
+ (N/A - technique only) |
+ |
+
T1204: User Execution |
T1204.002: Malicious File |
|
- T1218: Signed Binary Proxy Execution |
+ T1218: System Binary Proxy Execution |
T1218.010: Regsvr32 |
@@ -199,6 +304,11 @@ permalink: /analytics/by_technique
T1222.002: Linux and Mac File and Directory Permissions Modification |
|
+
+ T1490: Inhibit System Recovery |
+ (N/A - technique only) |
+ |
+
T1505: Server Software Component |
T1505.003: Web Shell |
@@ -257,7 +367,11 @@ permalink: /analytics/by_technique
|
- T1548: Abuse Elevation Control Mechanism |
+ T1548: Abuse Elevation Control Mechanism |
+ (N/A - technique only) |
+ |
+
+
T1548.002: Bypass User Account Control |
|
@@ -323,6 +437,11 @@ permalink: /analytics/by_technique
T1569.002: Service Execution |
|
+
+ T1570: Lateral Tool Transfer |
+ (N/A - technique only) |
+ |
+
T1574: Hijack Execution Flow |
diff --git a/docs/analytics/index.md b/docs/analytics/index.md
index 80989bb7..ad04a76f 100644
--- a/docs/analytics/index.md
+++ b/docs/analytics/index.md
@@ -207,7 +207,7 @@ permalink: /analytics/
CAR-2014-03-006 |
RunDLL32.exe monitoring |
March 28 2014 |
- |
+ |
Dnif, Logpoint, Pseudocode |
Windows |
@@ -351,8 +351,8 @@ permalink: /analytics/
CAR-2016-04-002 |
User Activity from Clearing Event Logs |
April 14 2016 |
- |
- Logpoint, Pseudocode, Sigma |
+ |
+ Logpoint, Pseudocode, Sigma, Splunk |
Windows, Linux, macOS |
@@ -391,7 +391,7 @@ permalink: /analytics/
CAR-2019-04-002 |
Generic Regsvr32 |
April 24 2019 |
- |
+ |
Pseudocode, Splunk |
Windows |
@@ -399,7 +399,7 @@ permalink: /analytics/
CAR-2019-04-003 |
Squiblydoo |
April 24 2019 |
- |
+ |
Eql, Logpoint, Psuedocode, Splunk |
Windows |
@@ -559,7 +559,7 @@ permalink: /analytics/
CAR-2020-11-005 |
Clear Powershell Console Command History |
November 30 2020 |
- |
+ |
Logpoint, Pseudocode, Splunk |
Windows |
@@ -575,7 +575,7 @@ permalink: /analytics/
CAR-2020-11-007 |
Network Share Connection Removal |
November 30 2020 |
- |
+ |
Logpoint, Pseudocode, Splunk |
Windows |
@@ -591,7 +591,7 @@ permalink: /analytics/
CAR-2020-11-009 |
Compiled HTML Access |
November 30 2020 |
- |
+ |
Logpoint, Pseudocode, Splunk |
Windows |
@@ -599,7 +599,7 @@ permalink: /analytics/
CAR-2020-11-010 |
CMSTP |
November 30 2020 |
- |
+ |
Logpoint, Pseudocode, Splunk |
Windows |
@@ -615,7 +615,7 @@ permalink: /analytics/
CAR-2021-01-001 |
Identifying Port Scanning Activity |
October 23 2020 |
- |
+ |
Splunk |
Windows, Linux |
@@ -631,7 +631,7 @@ permalink: /analytics/
CAR-2021-01-003 |
Clearing Windows Logs with Wevtutil |
December 02 2020 |
- |
+ |
Splunk |
Windows |
diff --git a/docs/car_attack/car_attack.json b/docs/car_attack/car_attack.json
index a363f7e5..02432b5c 100644
--- a/docs/car_attack/car_attack.json
+++ b/docs/car_attack/car_attack.json
@@ -5,23 +5,22 @@
"domain": "mitre-enterprise",
"techniques": [
{
- "techniqueID": "T1490",
+ "techniqueID": "T1003",
"color": "#c6dbef",
- "comment": "CAR-2020-04-001: Shadow Copy Deletion",
+ "comment": "CAR-2013-04-002: Quick execution of a series of suspicious commands | CAR-2013-07-001: Suspicious Arguments | CAR-2019-04-004: Credential Dumping via Mimikatz | CAR-2019-07-002: Lsass Process Dump via Procdump | CAR-2019-08-001: Credential Dumping via Windows Task Manager | CAR-2019-08-002: Active Directory Dumping via NTDSUtil | CAR-2020-05-001: MiniDump of LSASS | CAR-2021-05-011: Create Remote Thread into LSASS",
"enabled": true,
"showSubtechniques": true
},
{
- "techniqueID": "T1003",
+ "techniqueID": "T1003.003",
"color": "#c6dbef",
- "comment": "CAR-2013-04-002: Quick execution of a series of suspicious commands | CAR-2013-07-001: Suspicious Arguments | CAR-2019-04-004: Credential Dumping via Mimikatz | CAR-2019-07-002: Lsass Process Dump via Procdump | CAR-2019-08-001: Credential Dumping via Windows Task Manager | CAR-2019-08-002: Active Directory Dumping via NTDSUtil",
- "enabled": true,
- "showSubtechniques": true
+ "comment": "CAR-2019-08-002: Active Directory Dumping via NTDSUtil | CAR-2020-05-001: MiniDump of LSASS",
+ "enabled": true
},
{
"techniqueID": "T1003.001",
"color": "#c6dbef",
- "comment": "CAR-2013-07-001: Suspicious Arguments | CAR-2019-04-004: Credential Dumping via Mimikatz | CAR-2019-07-002: Lsass Process Dump via Procdump | CAR-2019-08-001: Credential Dumping via Windows Task Manager",
+ "comment": "CAR-2013-07-001: Suspicious Arguments | CAR-2019-04-004: Credential Dumping via Mimikatz | CAR-2019-07-002: Lsass Process Dump via Procdump | CAR-2019-08-001: Credential Dumping via Windows Task Manager | CAR-2021-05-011: Create Remote Thread into LSASS",
"enabled": true
},
{
@@ -34,10 +33,36 @@
{
"techniqueID": "T1105",
"color": "#c6dbef",
- "comment": "CAR-2013-05-003: SMB Write Request | CAR-2013-05-005: SMB Copy and Execution | CAR-2013-07-001: Suspicious Arguments",
+ "comment": "CAR-2013-07-001: Suspicious Arguments | CAR-2021-05-005: BITSAdmin Download File | CAR-2021-05-006: CertUtil Download With URLCache and Split Arguments | CAR-2021-05-007: CertUtil Download With VerifyCtl and Split Arguments",
+ "enabled": true,
+ "showSubtechniques": true
+ },
+ {
+ "techniqueID": "T1559",
+ "color": "#c6dbef",
+ "comment": "CAR-2021-01-006: Unusual Child Process spawned using DDE exploit",
+ "enabled": true,
+ "showSubtechniques": true
+ },
+ {
+ "techniqueID": "T1559.002",
+ "color": "#c6dbef",
+ "comment": "CAR-2021-01-006: Unusual Child Process spawned using DDE exploit",
+ "enabled": true
+ },
+ {
+ "techniqueID": "T1606",
+ "color": "#c6dbef",
+ "comment": "CAR-2021-05-008: Certutil exe certificate extraction",
"enabled": true,
"showSubtechniques": true
},
+ {
+ "techniqueID": "T1606.002",
+ "color": "#c6dbef",
+ "comment": "CAR-2021-05-008: Certutil exe certificate extraction",
+ "enabled": true
+ },
{
"techniqueID": "T1187",
"color": "#c6dbef",
@@ -48,20 +73,33 @@
{
"techniqueID": "T1053",
"color": "#c6dbef",
- "comment": "CAR-2013-01-002: Autorun Differences | CAR-2013-04-002: Quick execution of a series of suspicious commands | CAR-2013-05-004: Execution with AT | CAR-2013-08-001: Execution with schtasks | CAR-2015-04-001: Remotely Scheduled Tasks via AT | CAR-2015-04-002: Remotely Scheduled Tasks via Schtasks",
+ "comment": "CAR-2013-01-002: Autorun Differences | CAR-2013-04-002: Quick execution of a series of suspicious commands | CAR-2013-05-004: Execution with AT | CAR-2013-08-001: Execution with schtasks | CAR-2015-04-001: Remotely Scheduled Tasks via AT | CAR-2015-04-002: Remotely Scheduled Tasks via Schtasks | CAR-2020-09-001: Scheduled Task - FileAccess | CAR-2021-12-001: Scheduled Task Creation or Modification Containing Suspicious Scripts, Extensions or User Writable Paths",
"enabled": true,
"showSubtechniques": true
},
{
"techniqueID": "T1053.005",
"color": "#c6dbef",
- "comment": "CAR-2013-01-002: Autorun Differences | CAR-2013-04-002: Quick execution of a series of suspicious commands | CAR-2013-08-001: Execution with schtasks | CAR-2015-04-002: Remotely Scheduled Tasks via Schtasks",
+ "comment": "CAR-2013-01-002: Autorun Differences | CAR-2013-04-002: Quick execution of a series of suspicious commands | CAR-2013-08-001: Execution with schtasks | CAR-2015-04-002: Remotely Scheduled Tasks via Schtasks | CAR-2020-09-001: Scheduled Task - FileAccess | CAR-2021-12-001: Scheduled Task Creation or Modification Containing Suspicious Scripts, Extensions or User Writable Paths",
+ "enabled": true
+ },
+ {
+ "techniqueID": "T1070",
+ "color": "#c6dbef",
+ "comment": "CAR-2016-04-002: User Activity from Clearing Event Logs | CAR-2020-11-005: Clear Powershell Console Command History | CAR-2020-11-007: Network Share Connection Removal | CAR-2021-01-003: Clearing Windows Logs with Wevtutil",
+ "enabled": true,
+ "showSubtechniques": true
+ },
+ {
+ "techniqueID": "T1070.003",
+ "color": "#c6dbef",
+ "comment": "CAR-2020-11-005: Clear Powershell Console Command History",
"enabled": true
},
{
"techniqueID": "T1218",
"color": "#c6dbef",
- "comment": "CAR-2014-03-006: RunDLL32.exe monitoring | CAR-2019-04-002: Generic Regsvr32 | CAR-2019-04-003: Squiblydoo",
+ "comment": "CAR-2014-03-006: RunDLL32.exe monitoring | CAR-2019-04-002: Generic Regsvr32 | CAR-2019-04-003: Squiblydoo | CAR-2020-11-009: Compiled HTML Access | CAR-2020-11-010: CMSTP",
"enabled": true,
"showSubtechniques": true
},
@@ -84,10 +122,17 @@
"enabled": true,
"showSubtechniques": true
},
+ {
+ "techniqueID": "T1197",
+ "color": "#c6dbef",
+ "comment": "CAR-2021-05-004: BITS Job Persistence | CAR-2021-05-005: BITSAdmin Download File",
+ "enabled": true,
+ "showSubtechniques": true
+ },
{
"techniqueID": "T1546",
"color": "#c6dbef",
- "comment": "CAR-2013-01-002: Autorun Differences | CAR-2014-11-003: Debuggers for Accessibility Applications | CAR-2014-11-008: Command Launched from WinLogon",
+ "comment": "CAR-2013-01-002: Autorun Differences | CAR-2014-11-003: Debuggers for Accessibility Applications | CAR-2014-11-008: Command Launched from WinLogon | CAR-2020-09-002: Component Object Model Hijacking | CAR-2020-09-005: AppInit DLLs | CAR-2020-11-011: Registry Edit from Screensaver",
"enabled": true,
"showSubtechniques": true
},
@@ -97,6 +142,12 @@
"comment": "CAR-2013-01-002: Autorun Differences | CAR-2014-11-003: Debuggers for Accessibility Applications | CAR-2014-11-008: Command Launched from WinLogon",
"enabled": true
},
+ {
+ "techniqueID": "T1218.001",
+ "color": "#c6dbef",
+ "comment": "CAR-2020-11-009: Compiled HTML Access",
+ "enabled": true
+ },
{
"techniqueID": "T1021.001",
"color": "#c6dbef",
@@ -106,7 +157,7 @@
{
"techniqueID": "T1059",
"color": "#c6dbef",
- "comment": "CAR-2013-02-003: Processes Spawning cmd.exe | CAR-2013-04-002: Quick execution of a series of suspicious commands | CAR-2014-04-003: Powershell Execution | CAR-2014-11-002: Outlier Parents of Cmd | CAR-2014-11-004: Remote PowerShell Sessions",
+ "comment": "CAR-2013-02-003: Processes Spawning cmd.exe | CAR-2013-04-002: Quick execution of a series of suspicious commands | CAR-2014-04-003: Powershell Execution | CAR-2014-11-002: Outlier Parents of Cmd | CAR-2014-11-004: Remote PowerShell Sessions | CAR-2021-01-002: Unusually Long Command Line Strings",
"enabled": true,
"showSubtechniques": true
},
@@ -116,10 +167,29 @@
"comment": "CAR-2013-02-003: Processes Spawning cmd.exe | CAR-2014-11-002: Outlier Parents of Cmd",
"enabled": true
},
+ {
+ "techniqueID": "T1569",
+ "color": "#c6dbef",
+ "comment": "CAR-2013-04-002: Quick execution of a series of suspicious commands | CAR-2014-02-001: Service Binary Modifications | CAR-2014-03-005: Remotely Launched Executables via Services | CAR-2021-05-012: Create Service In Suspicious File Path",
+ "enabled": true,
+ "showSubtechniques": true
+ },
+ {
+ "techniqueID": "T1569.001",
+ "color": "#c6dbef",
+ "comment": "CAR-2021-05-012: Create Service In Suspicious File Path",
+ "enabled": true
+ },
+ {
+ "techniqueID": "T1569.002",
+ "color": "#c6dbef",
+ "comment": "CAR-2013-04-002: Quick execution of a series of suspicious commands | CAR-2014-02-001: Service Binary Modifications | CAR-2014-03-005: Remotely Launched Executables via Services | CAR-2021-05-012: Create Service In Suspicious File Path",
+ "enabled": true
+ },
{
"techniqueID": "T1570",
"color": "#c6dbef",
- "comment": "CAR-2014-03-001: SMB Write Request - NamedPipes",
+ "comment": "CAR-2013-05-003: SMB Write Request | CAR-2013-05-005: SMB Copy and Execution | CAR-2014-03-001: SMB Write Request - NamedPipes",
"enabled": true,
"showSubtechniques": true
},
@@ -139,7 +209,7 @@
{
"techniqueID": "T1574",
"color": "#c6dbef",
- "comment": "CAR-2013-01-002: Autorun Differences | CAR-2013-03-001: Reg.exe called from Command Shell | CAR-2013-04-002: Quick execution of a series of suspicious commands | CAR-2014-02-001: Service Binary Modifications | CAR-2014-07-001: Service Search Path Interception",
+ "comment": "CAR-2013-01-002: Autorun Differences | CAR-2013-03-001: Reg.exe called from Command Shell | CAR-2013-04-002: Quick execution of a series of suspicious commands | CAR-2014-02-001: Service Binary Modifications | CAR-2014-07-001: Service Search Path Interception | CAR-2020-05-003: Rare LolBAS Command Lines | CAR-2021-11-001: Registry Edit with Creation of SafeDllSearchMode Key Set to 0",
"enabled": true,
"showSubtechniques": true
},
@@ -150,16 +220,16 @@
"enabled": true
},
{
- "techniqueID": "T1569",
+ "techniqueID": "T1127",
"color": "#c6dbef",
- "comment": "CAR-2013-04-002: Quick execution of a series of suspicious commands | CAR-2014-02-001: Service Binary Modifications | CAR-2014-03-005: Remotely Launched Executables via Services",
+ "comment": "CAR-2020-11-008: MSBuild and msxsl",
"enabled": true,
"showSubtechniques": true
},
{
- "techniqueID": "T1569.002",
+ "techniqueID": "T1127.001",
"color": "#c6dbef",
- "comment": "CAR-2013-04-002: Quick execution of a series of suspicious commands | CAR-2014-02-001: Service Binary Modifications | CAR-2014-03-005: Remotely Launched Executables via Services",
+ "comment": "CAR-2020-11-008: MSBuild and msxsl",
"enabled": true
},
{
@@ -194,16 +264,69 @@
"comment": "CAR-2016-04-004: Successful Local Account Login",
"enabled": true
},
+ {
+ "techniqueID": "T1548",
+ "color": "#c6dbef",
+ "comment": "CAR-2013-10-002: DLL Injection via Load Library | CAR-2019-04-001: UAC Bypass | CAR-2021-01-008: Disable UAC | CAR-2021-02-002: Get System Elevation",
+ "enabled": true,
+ "showSubtechniques": true
+ },
{
"techniqueID": "T1021.002",
"color": "#c6dbef",
"comment": "CAR-2013-01-003: SMB Events Monitoring | CAR-2013-04-002: Quick execution of a series of suspicious commands | CAR-2013-05-003: SMB Write Request | CAR-2013-05-005: SMB Copy and Execution | CAR-2014-05-001: RPC Activity",
"enabled": true
},
+ {
+ "techniqueID": "T1574.001",
+ "color": "#c6dbef",
+ "comment": "CAR-2021-11-001: Registry Edit with Creation of SafeDllSearchMode Key Set to 0",
+ "enabled": true
+ },
+ {
+ "techniqueID": "T1112",
+ "color": "#c6dbef",
+ "comment": "CAR-2013-01-002: Autorun Differences | CAR-2013-03-001: Reg.exe called from Command Shell | CAR-2013-04-002: Quick execution of a series of suspicious commands | CAR-2014-11-005: Remote Registry | CAR-2020-05-003: Rare LolBAS Command Lines | CAR-2021-11-001: Registry Edit with Creation of SafeDllSearchMode Key Set to 0 | CAR-2021-11-002: Registry Edit with Modification of Userinit, Shell or Notify | CAR-2021-12-002: Modification of Default Startup Folder in the Registry Key 'Common Startup'",
+ "enabled": true,
+ "showSubtechniques": true
+ },
+ {
+ "techniqueID": "T1055",
+ "color": "#c6dbef",
+ "comment": "CAR-2013-10-002: DLL Injection via Load Library | CAR-2020-11-003: DLL Injection with Mavinject | CAR-2020-11-004: Processes Started From Irregular Parent",
+ "enabled": true,
+ "showSubtechniques": true
+ },
+ {
+ "techniqueID": "T1055.012",
+ "color": "#c6dbef",
+ "comment": "CAR-2020-11-004: Processes Started From Irregular Parent",
+ "enabled": true
+ },
+ {
+ "techniqueID": "T1140",
+ "color": "#c6dbef",
+ "comment": "CAR-2021-05-009: CertUtil With Decode Argument",
+ "enabled": true,
+ "showSubtechniques": true
+ },
+ {
+ "techniqueID": "T1562",
+ "color": "#c6dbef",
+ "comment": "CAR-2013-04-002: Quick execution of a series of suspicious commands | CAR-2016-04-003: User Activity from Stopping Windows Defensive Services | CAR-2020-09-003: Indicator Blocking - Driver Unloaded | CAR-2021-01-007: Detecting Tampering of Windows Defender Command Prompt | CAR-2022-03-001: Disable Windows Event Logging",
+ "enabled": true,
+ "showSubtechniques": true
+ },
+ {
+ "techniqueID": "T1562.001",
+ "color": "#c6dbef",
+ "comment": "CAR-2013-04-002: Quick execution of a series of suspicious commands | CAR-2016-04-003: User Activity from Stopping Windows Defensive Services | CAR-2021-01-007: Detecting Tampering of Windows Defender Command Prompt",
+ "enabled": true
+ },
{
"techniqueID": "T1036",
"color": "#c6dbef",
- "comment": "CAR-2013-05-002: Suspicious Run Locations | CAR-2013-05-009: Running executables with same hash and different names",
+ "comment": "CAR-2013-05-002: Suspicious Run Locations | CAR-2013-05-009: Running executables with same hash and different names | CAR-2021-04-001: Common Windows Process Masquerading",
"enabled": true,
"showSubtechniques": true
},
@@ -253,20 +376,20 @@
{
"techniqueID": "T1069",
"color": "#c6dbef",
- "comment": "CAR-2013-04-002: Quick execution of a series of suspicious commands | CAR-2016-03-001: Host Discovery Commands",
+ "comment": "CAR-2013-04-002: Quick execution of a series of suspicious commands | CAR-2016-03-001: Host Discovery Commands | CAR-2020-11-006: Local Permission Group Discovery",
"enabled": true,
"showSubtechniques": true
},
{
"techniqueID": "T1069.001",
"color": "#c6dbef",
- "comment": "CAR-2013-04-002: Quick execution of a series of suspicious commands | CAR-2016-03-001: Host Discovery Commands",
+ "comment": "CAR-2013-04-002: Quick execution of a series of suspicious commands | CAR-2016-03-001: Host Discovery Commands | CAR-2020-11-006: Local Permission Group Discovery",
"enabled": true
},
{
"techniqueID": "T1069.002",
"color": "#c6dbef",
- "comment": "CAR-2013-04-002: Quick execution of a series of suspicious commands | CAR-2016-03-001: Host Discovery Commands",
+ "comment": "CAR-2013-04-002: Quick execution of a series of suspicious commands | CAR-2016-03-001: Host Discovery Commands | CAR-2020-11-006: Local Permission Group Discovery",
"enabled": true
},
{
@@ -276,17 +399,10 @@
"enabled": true,
"showSubtechniques": true
},
- {
- "techniqueID": "T1112",
- "color": "#c6dbef",
- "comment": "CAR-2013-01-002: Autorun Differences | CAR-2013-03-001: Reg.exe called from Command Shell | CAR-2013-04-002: Quick execution of a series of suspicious commands | CAR-2014-11-005: Remote Registry",
- "enabled": true,
- "showSubtechniques": true
- },
{
"techniqueID": "T1574.011",
"color": "#c6dbef",
- "comment": "CAR-2013-01-002: Autorun Differences | CAR-2013-03-001: Reg.exe called from Command Shell | CAR-2013-04-002: Quick execution of a series of suspicious commands",
+ "comment": "CAR-2013-01-002: Autorun Differences | CAR-2013-03-001: Reg.exe called from Command Shell | CAR-2013-04-002: Quick execution of a series of suspicious commands | CAR-2020-05-003: Rare LolBAS Command Lines",
"enabled": true
},
{
@@ -361,27 +477,14 @@
{
"techniqueID": "T1046",
"color": "#c6dbef",
- "comment": "CAR-2013-04-002: Quick execution of a series of suspicious commands",
- "enabled": true,
- "showSubtechniques": true
- },
- {
- "techniqueID": "T1562",
- "color": "#c6dbef",
- "comment": "CAR-2013-04-002: Quick execution of a series of suspicious commands",
+ "comment": "CAR-2013-04-002: Quick execution of a series of suspicious commands | CAR-2021-01-001: Identifying Port Scanning Activity",
"enabled": true,
"showSubtechniques": true
},
- {
- "techniqueID": "T1562.001",
- "color": "#c6dbef",
- "comment": "CAR-2013-04-002: Quick execution of a series of suspicious commands",
- "enabled": true
- },
{
"techniqueID": "T1562.006",
"color": "#c6dbef",
- "comment": "CAR-2013-04-002: Quick execution of a series of suspicious commands",
+ "comment": "CAR-2013-04-002: Quick execution of a series of suspicious commands | CAR-2020-09-003: Indicator Blocking - Driver Unloaded",
"enabled": true
},
{
@@ -400,17 +503,23 @@
{
"techniqueID": "T1012",
"color": "#c6dbef",
- "comment": "CAR-2013-03-001: Reg.exe called from Command Shell | CAR-2013-04-002: Quick execution of a series of suspicious commands",
+ "comment": "CAR-2013-03-001: Reg.exe called from Command Shell | CAR-2013-04-002: Quick execution of a series of suspicious commands | CAR-2020-05-003: Rare LolBAS Command Lines",
"enabled": true,
"showSubtechniques": true
},
{
- "techniqueID": "T1089",
+ "techniqueID": "T1204",
"color": "#c6dbef",
- "comment": "CAR-2016-04-003: User Activity from Stopping Windows Defensive Services",
+ "comment": "CAR-2021-05-002: Batch File Write to System32",
"enabled": true,
"showSubtechniques": true
},
+ {
+ "techniqueID": "T1204.002",
+ "color": "#c6dbef",
+ "comment": "CAR-2021-05-002: Batch File Write to System32",
+ "enabled": true
+ },
{
"techniqueID": "T1218.011",
"color": "#c6dbef",
@@ -418,11 +527,18 @@
"enabled": true
},
{
- "techniqueID": "T1003.003",
+ "techniqueID": "T1055.001",
"color": "#c6dbef",
- "comment": "CAR-2019-08-002: Active Directory Dumping via NTDSUtil",
+ "comment": "CAR-2013-10-002: DLL Injection via Load Library | CAR-2020-11-003: DLL Injection with Mavinject",
"enabled": true
},
+ {
+ "techniqueID": "T1040",
+ "color": "#c6dbef",
+ "comment": "CAR-2020-11-002: Local Network Sniffing",
+ "enabled": true,
+ "showSubtechniques": true
+ },
{
"techniqueID": "T1222",
"color": "#c6dbef",
@@ -443,12 +559,24 @@
"enabled": true
},
{
- "techniqueID": "T1551",
+ "techniqueID": "T1547",
"color": "#c6dbef",
- "comment": "CAR-2016-04-002: User Activity from Clearing Event Logs",
+ "comment": "CAR-2013-01-002: Autorun Differences | CAR-2013-03-001: Reg.exe called from Command Shell | CAR-2020-05-003: Rare LolBAS Command Lines | CAR-2021-11-002: Registry Edit with Modification of Userinit, Shell or Notify | CAR-2021-12-002: Modification of Default Startup Folder in the Registry Key 'Common Startup'",
"enabled": true,
"showSubtechniques": true
},
+ {
+ "techniqueID": "T1547.001",
+ "color": "#c6dbef",
+ "comment": "CAR-2013-01-002: Autorun Differences | CAR-2013-03-001: Reg.exe called from Command Shell | CAR-2020-05-003: Rare LolBAS Command Lines | CAR-2021-12-002: Modification of Default Startup Folder in the Registry Key 'Common Startup'",
+ "enabled": true
+ },
+ {
+ "techniqueID": "T1070.001",
+ "color": "#c6dbef",
+ "comment": "CAR-2016-04-002: User Activity from Clearing Event Logs | CAR-2021-01-003: Clearing Windows Logs with Wevtutil",
+ "enabled": true
+ },
{
"techniqueID": "T1059.001",
"color": "#c6dbef",
@@ -456,16 +584,29 @@
"enabled": true
},
{
- "techniqueID": "T1547",
+ "techniqueID": "T1490",
"color": "#c6dbef",
- "comment": "CAR-2013-01-002: Autorun Differences | CAR-2013-03-001: Reg.exe called from Command Shell",
+ "comment": "CAR-2021-01-009: Detecting Shadow Copy Deletion or Resize | CAR-2021-05-003: BCDEdit Failure Recovery Modification",
"enabled": true,
"showSubtechniques": true
},
{
- "techniqueID": "T1547.001",
+ "techniqueID": "T1564",
"color": "#c6dbef",
- "comment": "CAR-2013-01-002: Autorun Differences | CAR-2013-03-001: Reg.exe called from Command Shell",
+ "comment": "CAR-2020-08-001: NTFS Alternate Data Stream Execution - System Utilities | CAR-2020-08-002: NTFS Alternate Data Stream Execution - LOLBAS",
+ "enabled": true,
+ "showSubtechniques": true
+ },
+ {
+ "techniqueID": "T1564.004",
+ "color": "#c6dbef",
+ "comment": "CAR-2020-08-001: NTFS Alternate Data Stream Execution - System Utilities | CAR-2020-08-002: NTFS Alternate Data Stream Execution - LOLBAS",
+ "enabled": true
+ },
+ {
+ "techniqueID": "T1546.015",
+ "color": "#c6dbef",
+ "comment": "CAR-2020-09-002: Component Object Model Hijacking",
"enabled": true
},
{
@@ -477,7 +618,7 @@
{
"techniqueID": "T1547.004",
"color": "#c6dbef",
- "comment": "CAR-2013-01-002: Autorun Differences",
+ "comment": "CAR-2013-01-002: Autorun Differences | CAR-2021-11-002: Registry Edit with Modification of Userinit, Shell or Notify",
"enabled": true
},
{
@@ -513,20 +654,20 @@
{
"techniqueID": "T1546.010",
"color": "#c6dbef",
- "comment": "CAR-2013-01-002: Autorun Differences",
+ "comment": "CAR-2013-01-002: Autorun Differences | CAR-2020-09-005: AppInit DLLs",
"enabled": true
},
{
"techniqueID": "T1037",
"color": "#c6dbef",
- "comment": "CAR-2013-01-002: Autorun Differences",
+ "comment": "CAR-2013-01-002: Autorun Differences | CAR-2020-11-001: Boot or Logon Initialization Scripts",
"enabled": true,
"showSubtechniques": true
},
{
"techniqueID": "T1037.001",
"color": "#c6dbef",
- "comment": "CAR-2013-01-002: Autorun Differences",
+ "comment": "CAR-2013-01-002: Autorun Differences | CAR-2020-11-001: Boot or Logon Initialization Scripts",
"enabled": true
},
{
@@ -542,6 +683,12 @@
"comment": "CAR-2013-07-005: Command Line Usage of Archiving Software",
"enabled": true
},
+ {
+ "techniqueID": "T1562.002",
+ "color": "#c6dbef",
+ "comment": "CAR-2022-03-001: Disable Windows Event Logging",
+ "enabled": true
+ },
{
"techniqueID": "T1039",
"color": "#c6dbef",
@@ -550,29 +697,98 @@
"showSubtechniques": true
},
{
- "techniqueID": "T1055",
+ "techniqueID": "T1553",
"color": "#c6dbef",
- "comment": "CAR-2013-10-002: DLL Injection via Load Library",
+ "comment": "CAR-2021-05-001: Attempt To Add Certificate To Untrusted Store",
"enabled": true,
"showSubtechniques": true
},
{
- "techniqueID": "T1055.001",
+ "techniqueID": "T1553.004",
"color": "#c6dbef",
- "comment": "CAR-2013-10-002: DLL Injection via Load Library",
+ "comment": "CAR-2021-05-001: Attempt To Add Certificate To Untrusted Store",
"enabled": true
},
{
- "techniqueID": "T1548",
+ "techniqueID": "T1036.005",
"color": "#c6dbef",
- "comment": "CAR-2013-10-002: DLL Injection via Load Library | CAR-2019-04-001: UAC Bypass",
+ "comment": "CAR-2021-04-001: Common Windows Process Masquerading",
+ "enabled": true
+ },
+ {
+ "techniqueID": "T1546.002",
+ "color": "#c6dbef",
+ "comment": "CAR-2020-11-011: Registry Edit from Screensaver",
+ "enabled": true
+ },
+ {
+ "techniqueID": "T1070.005",
+ "color": "#c6dbef",
+ "comment": "CAR-2020-11-007: Network Share Connection Removal",
+ "enabled": true
+ },
+ {
+ "techniqueID": "T1068",
+ "color": "#c6dbef",
+ "comment": "CAR-2021-01-004: Unusual Child Process for Spoolsv.Exe or Connhost.Exe",
"enabled": true,
"showSubtechniques": true
},
+ {
+ "techniqueID": "T1136",
+ "color": "#c6dbef",
+ "comment": "CAR-2021-05-010: Create local admin accounts using net exe",
+ "enabled": true,
+ "showSubtechniques": true
+ },
+ {
+ "techniqueID": "T1136.001",
+ "color": "#c6dbef",
+ "comment": "CAR-2021-05-010: Create local admin accounts using net exe",
+ "enabled": true
+ },
{
"techniqueID": "T1548.002",
"color": "#c6dbef",
- "comment": "CAR-2013-10-002: DLL Injection via Load Library | CAR-2019-04-001: UAC Bypass",
+ "comment": "CAR-2013-10-002: DLL Injection via Load Library | CAR-2019-04-001: UAC Bypass | CAR-2021-01-008: Disable UAC",
+ "enabled": true
+ },
+ {
+ "techniqueID": "T1552",
+ "color": "#c6dbef",
+ "comment": "CAR-2020-09-004: Credentials in Files & Registry",
+ "enabled": true,
+ "showSubtechniques": true
+ },
+ {
+ "techniqueID": "T1552.001",
+ "color": "#c6dbef",
+ "comment": "CAR-2020-09-004: Credentials in Files & Registry",
+ "enabled": true
+ },
+ {
+ "techniqueID": "T1552.002",
+ "color": "#c6dbef",
+ "comment": "CAR-2020-09-004: Credentials in Files & Registry",
+ "enabled": true
+ },
+ {
+ "techniqueID": "T1505",
+ "color": "#c6dbef",
+ "comment": "CAR-2021-02-001: Webshell-Indicative Process Tree",
+ "enabled": true,
+ "showSubtechniques": true
+ },
+ {
+ "techniqueID": "T1505.003",
+ "color": "#c6dbef",
+ "comment": "CAR-2021-02-001: Webshell-Indicative Process Tree",
+ "enabled": true
+ },
+ {
+ "techniqueID": "T1218.003",
+ "color": "#c6dbef",
+ "comment": "CAR-2020-11-010: CMSTP",
"enabled": true
}
]
diff --git a/docs/data/analytics.json b/docs/data/analytics.json
index 251702c6..2ee43fdb 100644
--- a/docs/data/analytics.json
+++ b/docs/data/analytics.json
@@ -1 +1 @@
-{"analytics": [{"shortName": "Shadow Copy Deletion", "name": "CAR-2020-04-001", "fields": ["process/create/image_path", "process/create/command_line"], "attack": [{"tactics": ["Impact"], "technique": "Technique/T1490", "coverage": "Medium"}]}, {"shortName": "MiniDump of LSASS", "name": "CAR-2020-05-001", "fields": [], "attack": [{"tactics": ["Credential Access"], "technique": "Technique/T1003", "coverage": "Low"}]}, {"shortName": "Suspicious Arguments", "name": "CAR-2013-07-001", "fields": ["process/create/command_line", "process/create/exe"], "attack": [{"tactics": ["Credential Access"], "technique": "Technique/T1003", "coverage": "Low"}, {"tactics": ["Lateral Movement"], "technique": "Technique/T1021", "coverage": "Moderate"}, {"tactics": ["Command and Control", "Lateral Movement"], "technique": "Technique/T1105", "coverage": "Moderate"}]}, {"shortName": "Unusual Child Process spawned using DDE exploit", "name": "CAR-2021-01-006", "fields": ["process/create/command_line"], "attack": [{"tactics": ["Execution"], "technique": "Technique/T1559", "coverage": "Low"}]}, {"shortName": "Certutil exe certificate extraction", "name": "CAR-2021-05-008", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Credential Access"], "technique": "Technique/T1606", "coverage": "Moderate"}]}, {"shortName": "SMB Session Setups", "name": "CAR-2013-09-003", "fields": ["flow/message/dest_port", "flow/message/proto_info", "flow/message/protocol"], "attack": [{"tactics": ["Credential Access"], "technique": "Technique/T1187", "coverage": "Low"}]}, {"shortName": "Remotely Scheduled Tasks via Schtasks", "name": "CAR-2015-04-002", "fields": ["flow/message/dest_port", "flow/message/src_port", "flow/message/proto_info"], "attack": [{"tactics": ["Execution"], "technique": "Technique/T1053", "coverage": "Moderate"}]}, {"shortName": "Clear Powershell Console Command History", "name": "CAR-2020-11-005", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1070", "coverage": "Low"}]}, {"shortName": "Squiblydoo", "name": "CAR-2019-04-003", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1218", "coverage": "Moderate"}]}, {"shortName": "Execution with AT", "name": "CAR-2013-05-004", "fields": ["process/create/command_line", "process/create/exe"], "attack": [{"tactics": ["Execution", "Persistence", "Privilege Escalation"], "technique": "Technique/T1053", "coverage": "Moderate"}]}, {"shortName": "Create Remote Process via WMIC", "name": "CAR-2016-03-002", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Execution"], "technique": "Technique/T1047", "coverage": "Low"}]}, {"shortName": "BITS Job Persistence", "name": "CAR-2021-05-004", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Defense Evasion", "Persistence"], "technique": "Technique/T1197", "coverage": "Moderate"}]}, {"shortName": "Debuggers for Accessibility Applications", "name": "CAR-2014-11-003", "fields": ["process/create/command_line", "process/create/exe"], "attack": [{"tactics": ["Privilege Escalation", "Persistence"], "technique": "Technique/T1546", "coverage": "Moderate"}]}, {"shortName": "Compiled HTML Access", "name": "CAR-2020-11-009", "fields": ["process/create/exe"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1218", "coverage": "High"}]}, {"shortName": "Remote Desktop Logon", "name": "CAR-2016-04-005", "fields": [], "attack": [{"tactics": ["Lateral Movement"], "technique": "Technique/T1021", "coverage": "Moderate"}]}, {"shortName": "Processes Spawning cmd.exe", "name": "CAR-2013-02-003", "fields": ["process/create/exe", "process/create/parent_exe"], "attack": [{"tactics": ["Execution"], "technique": "Technique/T1059", "coverage": "Moderate"}]}, {"shortName": "Create Service In Suspicious File Path", "name": "CAR-2021-05-012", "fields": ["service/create/image_path"], "attack": [{"tactics": ["Execution"], "technique": "Technique/T1569", "coverage": "Moderate"}, {"tactics": ["Execution"], "technique": "Technique/T1569.002", "coverage": "Moderate"}]}, {"shortName": "SMB Write Request - NamedPipes", "name": "CAR-2014-03-001", "fields": ["flow/message/proto_info", "flow/start/dest_port"], "attack": [{"tactics": ["Lateral Movement"], "technique": "Technique/T1570", "coverage": "Low"}]}, {"shortName": "Service Binary Modifications", "name": "CAR-2014-02-001", "fields": ["file/create/file_path", "file/create/image_path", "process/create/image_path", "process/create/parent_exe"], "attack": [{"tactics": ["Persistence", "Privilege Escalation"], "technique": "Technique/T1543", "coverage": "Moderate"}, {"tactics": ["Persistence", "Privilege Escalation"], "technique": "Technique/T1574", "coverage": "Moderate"}, {"tactics": ["Execution"], "technique": "Technique/T1569", "coverage": "Moderate"}]}, {"shortName": "MSBuild and msxsl", "name": "CAR-2020-11-008", "fields": ["process/create/exe", "process/create/image_path"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1127", "coverage": "High"}]}, {"shortName": "User Login Activity Monitoring", "name": "CAR-2013-10-001", "fields": [], "attack": [{"tactics": ["Lateral Movement"], "technique": "Technique/T1021", "coverage": "Moderate"}, {"tactics": ["Defense Evasion"], "technique": "Technique/T1078", "coverage": "Moderate"}]}, {"shortName": "Successful Local Account Login", "name": "CAR-2016-04-004", "fields": [], "attack": [{"tactics": ["Lateral Movement"], "technique": "Technique/T1550", "coverage": "Moderate"}]}, {"shortName": "Outlier Parents of Cmd", "name": "CAR-2014-11-002", "fields": ["process/create/exe", "process/create/parent_exe"], "attack": [{"tactics": ["Execution"], "technique": "Technique/T1059", "coverage": "Moderate"}]}, {"shortName": "BITSAdmin Download File", "name": "CAR-2021-05-005", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Defense Evasion", "Persistence"], "technique": "Technique/T1197", "coverage": "Moderate"}, {"tactics": ["Command and Control"], "technique": "Technique/T1105", "coverage": "Moderate"}]}, {"shortName": "Get System Elevation", "name": "CAR-2021-02-002", "fields": ["process/create/exe", "process/create/parent_exe", "process/create/command_line", "service/create/command_line"], "attack": [{"tactics": ["Privilege Escalation", "Defense Evasion"], "technique": "Technique/T1548", "coverage": "Moderate"}]}, {"shortName": "SMB Copy and Execution", "name": "CAR-2013-05-005", "fields": ["process/create/image_path", "process/create/proto_info", "process/create/hostname"], "attack": [{"tactics": ["Lateral Movement"], "technique": "Technique/T1021", "coverage": "Moderate"}, {"tactics": ["Defense Evasion"], "technique": "Technique/T1078", "coverage": "Moderate"}, {"tactics": ["Lateral Movement"], "technique": "Technique/T1570", "coverage": "Moderate"}]}, {"shortName": "Generic Regsvr32", "name": "CAR-2019-04-002", "fields": ["process/create/exe", "process/create/parent_exe", "process/create/command_line", "process/create/image", "process/create/parent_image"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1218", "coverage": "Low"}]}, {"shortName": "Processes Started From Irregular Parent", "name": "CAR-2020-11-004", "fields": ["process/create/exe", "process/create/parent_exe"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1055", "coverage": "Low"}]}, {"shortName": "CertUtil With Decode Argument", "name": "CAR-2021-05-009", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1140", "coverage": "Moderate"}]}, {"shortName": "Detecting Tampering of Windows Defender Command Prompt", "name": "CAR-2021-01-007", "fields": ["process/create/command_line"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1562", "coverage": "Medium"}]}, {"shortName": "Running executables with same hash and different names", "name": "CAR-2013-05-009", "fields": ["process/create/exe", "process/create/md5_hash"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1036", "coverage": "Moderate"}]}, {"shortName": "RPC Activity", "name": "CAR-2014-05-001", "fields": ["flow/start/dest_port", "flow/start/src_port"], "attack": [{"tactics": ["Lateral Movement"], "technique": "Technique/T1021", "coverage": "Moderate"}]}, {"shortName": "Quick execution of a series of suspicious commands", "name": "CAR-2013-04-002", "fields": ["process/create/hostname", "process/create/ppid", "process/create/exe"], "attack": [{"tactics": ["Discovery"], "technique": "Technique/T1087", "coverage": "Low"}, {"tactics": ["Credential Access"], "technique": "Technique/T1003", "coverage": "Low"}, {"tactics": ["Discovery"], "technique": "Technique/T1069", "coverage": "Low"}, {"tactics": ["Discovery"], "technique": "Technique/T1057", "coverage": "Low"}, {"tactics": ["Lateral Movement"], "technique": "Technique/T1021", "coverage": "Low"}, {"tactics": ["Persistence", "Privilege Escalation"], "technique": "Technique/T1543", "coverage": "Low"}, {"tactics": ["Defense Evasion"], "technique": "Technique/T1112", "coverage": "Low"}, {"tactics": ["Persistence", "Privilege Escalation"], "technique": "Technique/T1574", "coverage": "Low"}, {"tactics": ["Discovery"], "technique": "Technique/T1018", "coverage": "Low"}, {"tactics": ["Execution"], "technique": "Technique/T1569", "coverage": "Low"}, {"tactics": ["Persistence", "Privilege Escalation", "Execution"], "technique": "Technique/T1053", "coverage": "Low"}, {"tactics": ["Exfiltration"], "technique": "Technique/T1029", "coverage": "Low"}, {"tactics": ["Discovery"], "technique": "Technique/T1033", "coverage": "Low"}, {"tactics": ["Discovery"], "technique": "Technique/T1007", "coverage": "Low"}, {"tactics": ["Discovery"], "technique": "Technique/T1082", "coverage": "Low"}, {"tactics": ["Discovery"], "technique": "Technique/T1049", "coverage": "Low"}, {"tactics": ["Discovery"], "technique": "Technique/T1016", "coverage": "Low"}, {"tactics": ["Discovery"], "technique": "Technique/T1010", "coverage": "Low"}, {"tactics": ["Discovery"], "technique": "Technique/T1518", "coverage": "Low"}, {"tactics": ["Discovery"], "technique": "Technique/T1046", "coverage": "Low"}, {"tactics": ["Defense Evasion"], "technique": "Technique/T1562", "coverage": "Low"}, {"tactics": ["Credential Access"], "technique": "Technique/T1098", "coverage": "Low"}, {"tactics": ["Execution"], "technique": "Technique/T1059", "coverage": "Moderate"}, {"tactics": ["Discovery"], "technique": "Technique/T1012", "coverage": "Low"}]}, {"shortName": "Suspicious Run Locations", "name": "CAR-2013-05-002", "fields": ["process/create/image_path"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1036", "coverage": "Low"}]}, {"shortName": "All Logins Since Last Boot", "name": "CAR-2015-07-001", "fields": ["user_session/login/user"], "attack": []}, {"shortName": "Batch File Write to System32", "name": "CAR-2021-05-002", "fields": ["file/create/extension", "file/create/file_path"], "attack": [{"tactics": ["Execution"], "technique": "Technique/T1204", "coverage": "Moderate"}]}, {"shortName": "Remote Registry", "name": "CAR-2014-11-005", "fields": ["flow/message/dest_port", "flow/message/proto_info"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1112", "coverage": "Moderate"}]}, {"shortName": "User Activity from Stopping Windows Defensive Services", "name": "CAR-2016-04-003", "fields": [], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1562", "coverage": "Low"}]}, {"shortName": "RunDLL32.exe monitoring", "name": "CAR-2014-03-006", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1218", "coverage": "Moderate"}]}, {"shortName": "Active Directory Dumping via NTDSUtil", "name": "CAR-2019-08-002", "fields": ["file/create/file_name", "file/create/image_path"], "attack": [{"tactics": ["Credential Access"], "technique": "Technique/T1003", "coverage": "Low"}]}, {"shortName": "Service Outlier Executables", "name": "CAR-2013-09-005", "fields": ["process/create/parent_image_path"], "attack": [{"tactics": ["Persistence"], "technique": "Technique/T1543", "coverage": "Moderate"}]}, {"shortName": "DLL Injection with Mavinject", "name": "CAR-2020-11-003", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Privilege Escalation", "Defense Evasion"], "technique": "Technique/T1055", "coverage": "Low"}]}, {"shortName": "Simultaneous Logins on a Host", "name": "CAR-2013-02-008", "fields": ["user_session/login/user", "user_session/login/hostname"], "attack": [{"tactics": ["Initial Access"], "technique": "Technique/T1078", "coverage": "Low"}]}, {"shortName": "Remotely Launched Executables via WMI", "name": "CAR-2014-12-001", "fields": ["flow/message/dest_port", "flow/message/proto_info", "flow/message/src_port", "process/create/command_line", "process/create/exe", "process/create/parent_exe"], "attack": [{"tactics": ["Execution"], "technique": "Technique/T1047", "coverage": "High"}]}, {"shortName": "Command Launched from WinLogon", "name": "CAR-2014-11-008", "fields": ["process/create/exe", "process/create/parent_exe"], "attack": [{"tactics": ["Privilege Escalation", "Persistence"], "technique": "Technique/T1546", "coverage": "Moderate"}]}, {"shortName": "Local Network Sniffing", "name": "CAR-2020-11-002", "fields": ["process/create/exe", "process/create/parent_exe"], "attack": [{"tactics": ["Credential Access", "Discovery"], "technique": "Technique/T1040", "coverage": "Moderate"}]}, {"shortName": "Identifying Port Scanning Activity", "name": "CAR-2021-01-001", "fields": ["flow/start/dest_ip"], "attack": [{"tactics": ["Discovery"], "technique": "Technique/T1046", "coverage": "Moderate"}]}, {"shortName": "Access Permission Modification", "name": "CAR-2019-07-001", "fields": [], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1222", "coverage": "Moderate"}]}, {"shortName": "User Activity from Clearing Event Logs", "name": "CAR-2016-04-002", "fields": [], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1070", "coverage": "Moderate"}]}, {"shortName": "Remote PowerShell Sessions", "name": "CAR-2014-11-004", "fields": ["process/create/exe", "process/create/parent_exe"], "attack": [{"tactics": ["Execution"], "technique": "Technique/T1059", "coverage": "Moderate"}, {"tactics": ["Lateral Movement"], "technique": "Technique/T1021", "coverage": "Moderate"}]}, {"shortName": "BCDEdit Failure Recovery Modification", "name": "CAR-2021-05-003", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Impact"], "technique": "Technique/T1490", "coverage": "Moderate"}]}, {"shortName": "Scheduled Task - FileAccess", "name": "CAR-2020-09-001", "fields": ["file/create/file_path", "file/create/image_path"], "attack": [{"tactics": ["Execution", "Persistence", "Privilege Escalation"], "technique": "Technique/T1053", "coverage": "Low"}]}, {"shortName": "NTFS Alternate Data Stream Execution - System Utilities", "name": "CAR-2020-08-001", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1564", "coverage": "Low"}]}, {"shortName": "User Logged in to Multiple Hosts", "name": "CAR-2013-02-012", "fields": [], "attack": [{"tactics": ["Lateral Movement"], "technique": "Technique/T1078", "coverage": "Moderate"}]}, {"shortName": "SMB Write Request", "name": "CAR-2013-05-003", "fields": ["flow/message/proto_info", "flow/message/dest_port"], "attack": [{"tactics": ["Lateral Movement"], "technique": "Technique/T1570", "coverage": "Moderate"}, {"tactics": ["Lateral Movement"], "technique": "Technique/T1021", "coverage": "Moderate"}, {"tactics": ["Defense Evasion"], "technique": "Technique/T1078", "coverage": "Moderate"}]}, {"shortName": "Credential Dumping via Mimikatz", "name": "CAR-2019-04-004", "fields": [], "attack": [{"tactics": ["Credential Access"], "technique": "Technique/T1003", "coverage": "Low"}]}, {"shortName": "Remote Windows Management Instrumentation (WMI) over RPC", "name": "CAR-2014-11-007", "fields": ["flow/message/proto_info"], "attack": [{"tactics": ["Execution"], "technique": "Technique/T1047", "coverage": "Moderate"}]}, {"shortName": "NTFS Alternate Data Stream Execution - LOLBAS", "name": "CAR-2020-08-002", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1564", "coverage": "Low"}]}, {"shortName": "Component Object Model Hijacking", "name": "CAR-2020-09-002", "fields": ["registry/add/key", "registry/remove/key", "registry/edit/key"], "attack": [{"tactics": ["Persistence", "Privilege Escalation"], "technique": "Technique/T1546", "coverage": "Moderate"}]}, {"shortName": "Powershell Execution", "name": "CAR-2014-04-003", "fields": ["process/create/exe", "process/create/parent_exe"], "attack": [{"tactics": ["Execution"], "technique": "Technique/T1059", "coverage": "High"}, {"tactics": ["Defense Evasion"], "technique": "Technique/T1059", "coverage": "Moderate"}]}, {"shortName": "Autorun Differences", "name": "CAR-2013-01-002", "fields": [], "attack": [{"tactics": ["Persistence"], "technique": "Technique/T1543", "coverage": "Moderate"}, {"tactics": ["Persistence"], "technique": "Technique/T1053", "coverage": "Moderate"}, {"tactics": ["Persistence"], "technique": "Technique/T1547", "coverage": "Moderate"}, {"tactics": ["Persistence", "Privilege Escalation"], "technique": "Technique/T1574", "coverage": "Moderate"}, {"tactics": ["Privilege Escalation", "Persistence"], "technique": "Technique/T1546", "coverage": "Moderate"}, {"tactics": ["Persistence", "Execution"], "technique": "Technique/T1112", "coverage": "Moderate"}, {"tactics": ["Persistence"], "technique": "Technique/T1037", "coverage": "Moderate"}]}, {"shortName": "Boot or Logon Initialization Scripts", "name": "CAR-2020-11-001", "fields": ["process/create/command_line", "process/create/exe", "registry/add/key", "registry/edit/key"], "attack": [{"tactics": ["Persistence", "Lateral Movement"], "technique": "Technique/T1037", "coverage": "Moderate"}]}, {"shortName": "Unusually Long Command Line Strings", "name": "CAR-2021-01-002", "fields": ["process/create/command_line"], "attack": [{"tactics": ["Execution"], "technique": "Technique/T1059", "coverage": "Low"}]}, {"shortName": "Lsass Process Dump via Procdump", "name": "CAR-2019-07-002", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Credential Access"], "technique": "Technique/T1003", "coverage": "Low"}]}, {"shortName": "Command Line Usage of Archiving Software", "name": "CAR-2013-07-005", "fields": ["process/create/command_line"], "attack": [{"tactics": ["Exfiltration"], "technique": "Technique/T1560", "coverage": "Moderate"}]}, {"shortName": "Clearing Windows Logs with Wevtutil", "name": "CAR-2021-01-003", "fields": ["process/create/command_line"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1070", "coverage": "Low"}]}, {"shortName": "Credential Dumping via Windows Task Manager", "name": "CAR-2019-08-001", "fields": ["file/create/file_name", "file/create/image_path"], "attack": [{"tactics": ["Credential Access"], "technique": "Technique/T1003", "coverage": "Low"}]}, {"shortName": "SMB Events Monitoring", "name": "CAR-2013-01-003", "fields": ["flow/message/dest_port", "flow/message/proto_info"], "attack": [{"tactics": ["Collection"], "technique": "Technique/T1039", "coverage": "Moderate"}, {"tactics": ["Lateral Movement"], "technique": "Technique/T1021", "coverage": "Moderate"}]}, {"shortName": "Services launching Cmd", "name": "CAR-2014-05-002", "fields": ["process/create/exe", "process/create/parent_exe"], "attack": [{"tactics": ["Persistence", "Privilege Escalation"], "technique": "Technique/T1543", "coverage": "Moderate"}]}, {"shortName": "Indicator Blocking - Driver Unloaded", "name": "CAR-2020-09-003", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1562", "coverage": "Low"}]}, {"shortName": "Attempt To Add Certificate To Untrusted Store", "name": "CAR-2021-05-001", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1553", "coverage": "Moderate"}]}, {"shortName": "Common Windows Process Masquerading", "name": "CAR-2021-04-001", "fields": ["process/create/exe", "process/create/image_path", "process/access/exe", "process/access/image_path", "process/terminate/exe", "process/terminate/image_path"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1036", "coverage": "Moderate"}]}, {"shortName": "Windows Remote Management (WinRM)", "name": "CAR-2014-11-006", "fields": ["flow/start/dest_port"], "attack": [{"tactics": ["Lateral Movement"], "technique": "Technique/T1021", "coverage": "Moderate"}]}, {"shortName": "Remotely Launched Executables via Services", "name": "CAR-2014-03-005", "fields": ["flow/start/pid", "process/create/parent_exe", "process/create/pid"], "attack": [{"tactics": ["Persistence"], "technique": "Technique/T1543", "coverage": "Moderate"}, {"tactics": ["Execution"], "technique": "Technique/T1569", "coverage": "Moderate"}]}, {"shortName": "Registry Edit from Screensaver", "name": "CAR-2020-11-011", "fields": ["registry/edit/key", "registry/add/key"], "attack": [{"tactics": ["Persistence", "Privilege Escalation"], "technique": "Technique/T1546", "coverage": "High"}]}, {"shortName": "Network Share Connection Removal", "name": "CAR-2020-11-007", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1070", "coverage": "High"}]}, {"shortName": "Execution with schtasks", "name": "CAR-2013-08-001", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Persistence"], "technique": "Technique/T1053", "coverage": "Moderate"}]}, {"shortName": "Unusual Child Process for Spoolsv.Exe or Connhost.Exe", "name": "CAR-2021-01-004", "fields": ["process/create/command_line"], "attack": [{"tactics": ["Privilege Escalation"], "technique": "Technique/T1068", "coverage": "Low"}]}, {"shortName": "Rare LolBAS Command Lines", "name": "CAR-2020-05-003", "fields": [], "attack": [{"tactics": ["Discovery"], "technique": "Technique/T1012", "coverage": "Low"}, {"tactics": ["Defense Evasion"], "technique": "Technique/T1112", "coverage": "Low"}, {"tactics": ["Persistence"], "technique": "Technique/T1547", "coverage": "Low"}, {"tactics": ["Persistence", "Privilege Escalation"], "technique": "Technique/T1574", "coverage": "Low"}]}, {"shortName": "Create local admin accounts using net exe", "name": "CAR-2021-05-010", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Persistence"], "technique": "Technique/T1136", "coverage": "Moderate"}]}, {"shortName": "Reg.exe called from Command Shell", "name": "CAR-2013-03-001", "fields": ["process/create/command_line", "process/create/hostname", "process/create/exe", "process/create/parent_exe", "process/create/pid", "process/create/ppid"], "attack": [{"tactics": ["Discovery"], "technique": "Technique/T1012", "coverage": "Moderate"}, {"tactics": ["Defense Evasion"], "technique": "Technique/T1112", "coverage": "Moderate"}, {"tactics": ["Persistence"], "technique": "Technique/T1547", "coverage": "Moderate"}, {"tactics": ["Persistence", "Privilege Escalation"], "technique": "Technique/T1574", "coverage": "Moderate"}]}, {"shortName": "DLL Injection via Load Library", "name": "CAR-2013-10-002", "fields": ["thread/remote_create/src_pid", "thread/remote_create/start_function"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1055", "coverage": "Moderate"}, {"tactics": ["Privilege Escalation"], "technique": "Technique/T1548", "coverage": "Moderate"}]}, {"shortName": "CertUtil Download With URLCache and Split Arguments", "name": "CAR-2021-05-006", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Command and Control"], "technique": "Technique/T1105", "coverage": "Moderate"}]}, {"shortName": "Credentials in Files & Registry", "name": "CAR-2020-09-004", "fields": ["process/create/command_line"], "attack": [{"tactics": ["Credential Access"], "technique": "Technique/T1552", "coverage": "Low"}]}, {"shortName": "Disable UAC", "name": "CAR-2021-01-008", "fields": ["process/create/image_path", "process/create/command_line"], "attack": [{"tactics": ["Privilege Escalation"], "technique": "Technique/T1548", "coverage": "Medium"}]}, {"shortName": "Webshell-Indicative Process Tree", "name": "CAR-2021-02-001", "fields": ["process/create/exe", "process/create/parent_exe"], "attack": [{"tactics": ["Persistence"], "technique": "Technique/T1505", "coverage": "Moderate"}]}, {"shortName": "UAC Bypass", "name": "CAR-2019-04-001", "fields": ["process/create/image_path", "process/create/parent_image_path", "process/create/integrity_level", "process/create/user", "process/create/parent_command_line"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1548", "coverage": "Low"}]}, {"shortName": "Detecting Shadow Copy Deletion via Vssadmin.exe", "name": "CAR-2021-01-009", "fields": ["process/create/command_line"], "attack": [{"tactics": ["Impact"], "technique": "Technique/T1490", "coverage": "Low"}]}, {"shortName": "Host Discovery Commands", "name": "CAR-2016-03-001", "fields": ["process/create/command_line", "process/create/exe"], "attack": [{"tactics": ["Discovery"], "technique": "Technique/T1087", "coverage": "Moderate"}, {"tactics": ["Discovery"], "technique": "Technique/T1069", "coverage": "Moderate"}, {"tactics": ["Discovery"], "technique": "Technique/T1016", "coverage": "Moderate"}, {"tactics": ["Discovery"], "technique": "Technique/T1082", "coverage": "Moderate"}, {"tactics": ["Discovery"], "technique": "Technique/T1033", "coverage": "Moderate"}, {"tactics": ["Discovery"], "technique": "Technique/T1057", "coverage": "Moderate"}, {"tactics": ["Discovery"], "technique": "Technique/T1007", "coverage": "Moderate"}]}, {"shortName": "AppInit DLLs", "name": "CAR-2020-09-005", "fields": ["registry/add/key", "registry/remove/key", "registry/edit/key"], "attack": [{"tactics": ["Persistence", "Privilege Escalation"], "technique": "Technique/T1546", "coverage": "Moderate"}]}, {"shortName": "CertUtil Download With VerifyCtl and Split Arguments", "name": "CAR-2021-05-007", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Command and Control"], "technique": "Technique/T1105", "coverage": "Moderate"}]}, {"shortName": "Create Remote Thread into LSASS", "name": "CAR-2021-05-011", "fields": ["thread/remote_create"], "attack": [{"tactics": ["Credential Access"], "technique": "Technique/T1003", "coverage": "Moderate"}]}, {"shortName": "RDP Connection Detection", "name": "CAR-2013-07-002", "fields": ["flow/end/dest_port", "flow/start/dest_ip", "flow/start/dest_port", "flow/start/src_ip"], "attack": [{"tactics": ["Lateral Movement"], "technique": "Technique/T1021", "coverage": "Medium"}]}, {"shortName": "Service Search Path Interception", "name": "CAR-2014-07-001", "fields": ["process/create/command_line", "process/create/image_path", "process/create/parent_exe"], "attack": [{"tactics": ["Privilege Escalation", "Persistence"], "technique": "Technique/T1574", "coverage": "High"}]}, {"shortName": "Remotely Scheduled Tasks via AT", "name": "CAR-2015-04-001", "fields": ["flow/message/proto_info"], "attack": [{"tactics": ["Execution"], "technique": "Technique/T1053", "coverage": "Moderate"}]}, {"shortName": "Local Permission Group Discovery", "name": "CAR-2020-11-006", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Discovery"], "technique": "Technique/T1069", "coverage": "Moderate"}]}, {"shortName": "CMSTP", "name": "CAR-2020-11-010", "fields": ["process/create/exe", "process/create/src_ip"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1218", "coverage": "High"}]}]}
\ No newline at end of file
+{"analytics": [{"shortName": "Shadow Copy Deletion", "name": "CAR-2020-04-001", "fields": [], "attack": []}, {"shortName": "MiniDump of LSASS", "name": "CAR-2020-05-001", "fields": [], "attack": [{"tactics": ["Credential Access"], "technique": "Technique/T1003", "coverage": "Low"}]}, {"shortName": "Suspicious Arguments", "name": "CAR-2013-07-001", "fields": ["process/create/command_line", "process/create/exe"], "attack": [{"tactics": ["Credential Access"], "technique": "Technique/T1003", "coverage": "Low"}, {"tactics": ["Lateral Movement"], "technique": "Technique/T1021", "coverage": "Moderate"}, {"tactics": ["Command and Control", "Lateral Movement"], "technique": "Technique/T1105", "coverage": "Moderate"}]}, {"shortName": "Unusual Child Process spawned using DDE exploit", "name": "CAR-2021-01-006", "fields": ["process/create/command_line"], "attack": [{"tactics": ["Execution"], "technique": "Technique/T1559", "coverage": "Low"}]}, {"shortName": "Certutil exe certificate extraction", "name": "CAR-2021-05-008", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Credential Access"], "technique": "Technique/T1606", "coverage": "Moderate"}]}, {"shortName": "SMB Session Setups", "name": "CAR-2013-09-003", "fields": ["flow/message/dest_port", "flow/message/proto_info", "flow/message/protocol"], "attack": [{"tactics": ["Credential Access"], "technique": "Technique/T1187", "coverage": "Low"}]}, {"shortName": "Remotely Scheduled Tasks via Schtasks", "name": "CAR-2015-04-002", "fields": ["flow/message/dest_port", "flow/message/src_port", "flow/message/proto_info"], "attack": [{"tactics": ["Execution"], "technique": "Technique/T1053", "coverage": "Moderate"}]}, {"shortName": "Clear Powershell Console Command History", "name": "CAR-2020-11-005", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1070", "coverage": "Low"}]}, {"shortName": "Squiblydoo", "name": "CAR-2019-04-003", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1218", "coverage": "Moderate"}]}, {"shortName": "Execution with AT", "name": "CAR-2013-05-004", "fields": ["process/create/command_line", "process/create/exe"], "attack": [{"tactics": ["Execution", "Persistence", "Privilege Escalation"], "technique": "Technique/T1053", "coverage": "Moderate"}]}, {"shortName": "Create Remote Process via WMIC", "name": "CAR-2016-03-002", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Execution"], "technique": "Technique/T1047", "coverage": "Low"}]}, {"shortName": "BITS Job Persistence", "name": "CAR-2021-05-004", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Defense Evasion", "Persistence"], "technique": "Technique/T1197", "coverage": "Moderate"}]}, {"shortName": "Debuggers for Accessibility Applications", "name": "CAR-2014-11-003", "fields": ["process/create/command_line", "process/create/exe"], "attack": [{"tactics": ["Privilege Escalation", "Persistence"], "technique": "Technique/T1546", "coverage": "Moderate"}]}, {"shortName": "Compiled HTML Access", "name": "CAR-2020-11-009", "fields": ["process/create/exe"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1218", "coverage": "High"}]}, {"shortName": "Remote Desktop Logon", "name": "CAR-2016-04-005", "fields": [], "attack": [{"tactics": ["Lateral Movement"], "technique": "Technique/T1021", "coverage": "Moderate"}]}, {"shortName": "Processes Spawning cmd.exe", "name": "CAR-2013-02-003", "fields": ["process/create/exe", "process/create/parent_exe"], "attack": [{"tactics": ["Execution"], "technique": "Technique/T1059", "coverage": "Moderate"}]}, {"shortName": "Create Service In Suspicious File Path", "name": "CAR-2021-05-012", "fields": ["service/create/image_path"], "attack": [{"tactics": ["Execution"], "technique": "Technique/T1569", "coverage": "Moderate"}]}, {"shortName": "SMB Write Request - NamedPipes", "name": "CAR-2014-03-001", "fields": ["flow/message/proto_info", "flow/start/dest_port"], "attack": [{"tactics": ["Lateral Movement"], "technique": "Technique/T1570", "coverage": "Low"}]}, {"shortName": "Service Binary Modifications", "name": "CAR-2014-02-001", "fields": ["file/create/file_path", "file/create/image_path", "process/create/image_path", "process/create/parent_exe"], "attack": [{"tactics": ["Persistence", "Privilege Escalation"], "technique": "Technique/T1543", "coverage": "Moderate"}, {"tactics": ["Persistence", "Privilege Escalation"], "technique": "Technique/T1574", "coverage": "Moderate"}, {"tactics": ["Execution"], "technique": "Technique/T1569", "coverage": "Moderate"}]}, {"shortName": "MSBuild and msxsl", "name": "CAR-2020-11-008", "fields": ["process/create/exe", "process/create/image_path"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1127", "coverage": "High"}]}, {"shortName": "User Login Activity Monitoring", "name": "CAR-2013-10-001", "fields": [], "attack": [{"tactics": ["Lateral Movement"], "technique": "Technique/T1021", "coverage": "Moderate"}, {"tactics": ["Defense Evasion"], "technique": "Technique/T1078", "coverage": "Moderate"}]}, {"shortName": "Successful Local Account Login", "name": "CAR-2016-04-004", "fields": [], "attack": [{"tactics": ["Lateral Movement"], "technique": "Technique/T1550", "coverage": "Moderate"}]}, {"shortName": "Outlier Parents of Cmd", "name": "CAR-2014-11-002", "fields": ["process/create/exe", "process/create/parent_exe"], "attack": [{"tactics": ["Execution"], "technique": "Technique/T1059", "coverage": "Moderate"}]}, {"shortName": "BITSAdmin Download File", "name": "CAR-2021-05-005", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Defense Evasion", "Persistence"], "technique": "Technique/T1197", "coverage": "Moderate"}, {"tactics": ["Command and Control"], "technique": "Technique/T1105", "coverage": "Moderate"}]}, {"shortName": "Get System Elevation", "name": "CAR-2021-02-002", "fields": ["process/create/exe", "process/create/parent_exe", "process/create/command_line", "service/create/command_line"], "attack": [{"tactics": ["Privilege Escalation", "Defense Evasion"], "technique": "Technique/T1548", "coverage": "Moderate"}]}, {"shortName": "SMB Copy and Execution", "name": "CAR-2013-05-005", "fields": ["process/create/image_path", "process/create/proto_info", "process/create/hostname"], "attack": [{"tactics": ["Lateral Movement"], "technique": "Technique/T1021", "coverage": "Moderate"}, {"tactics": ["Defense Evasion"], "technique": "Technique/T1078", "coverage": "Moderate"}, {"tactics": ["Lateral Movement"], "technique": "Technique/T1570", "coverage": "Moderate"}]}, {"shortName": "Generic Regsvr32", "name": "CAR-2019-04-002", "fields": ["process/create/exe", "process/create/parent_exe", "process/create/command_line", "process/create/image", "process/create/parent_image"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1218", "coverage": "Low"}]}, {"shortName": "Registry Edit with Creation of SafeDllSearchMode Key Set to 0", "name": "CAR-2021-11-001", "fields": ["process/create/command_line", "registry/add/key"], "attack": [{"tactics": ["Persistence", "Privilege Escalation", "Defense Evasion"], "technique": "Technique/T1574", "coverage": "Medium"}, {"tactics": ["Defense Evasion"], "technique": "Technique/T1112", "coverage": "Medium"}]}, {"shortName": "Processes Started From Irregular Parent", "name": "CAR-2020-11-004", "fields": ["process/create/exe", "process/create/parent_exe"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1055", "coverage": "Low"}]}, {"shortName": "CertUtil With Decode Argument", "name": "CAR-2021-05-009", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1140", "coverage": "Moderate"}]}, {"shortName": "Detecting Tampering of Windows Defender Command Prompt", "name": "CAR-2021-01-007", "fields": ["process/create/command_line"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1562", "coverage": "Medium"}]}, {"shortName": "Running executables with same hash and different names", "name": "CAR-2013-05-009", "fields": ["process/create/exe", "process/create/md5_hash"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1036", "coverage": "Moderate"}]}, {"shortName": "RPC Activity", "name": "CAR-2014-05-001", "fields": ["flow/start/dest_port", "flow/start/src_port"], "attack": [{"tactics": ["Lateral Movement"], "technique": "Technique/T1021", "coverage": "Moderate"}]}, {"shortName": "Quick execution of a series of suspicious commands", "name": "CAR-2013-04-002", "fields": ["process/create/hostname", "process/create/ppid", "process/create/exe"], "attack": [{"tactics": ["Discovery"], "technique": "Technique/T1087", "coverage": "Low"}, {"tactics": ["Credential Access"], "technique": "Technique/T1003", "coverage": "Low"}, {"tactics": ["Discovery"], "technique": "Technique/T1069", "coverage": "Low"}, {"tactics": ["Discovery"], "technique": "Technique/T1057", "coverage": "Low"}, {"tactics": ["Lateral Movement"], "technique": "Technique/T1021", "coverage": "Low"}, {"tactics": ["Persistence", "Privilege Escalation"], "technique": "Technique/T1543", "coverage": "Low"}, {"tactics": ["Defense Evasion"], "technique": "Technique/T1112", "coverage": "Low"}, {"tactics": ["Persistence", "Privilege Escalation"], "technique": "Technique/T1574", "coverage": "Low"}, {"tactics": ["Discovery"], "technique": "Technique/T1018", "coverage": "Low"}, {"tactics": ["Execution"], "technique": "Technique/T1569", "coverage": "Low"}, {"tactics": ["Persistence", "Privilege Escalation", "Execution"], "technique": "Technique/T1053", "coverage": "Low"}, {"tactics": ["Exfiltration"], "technique": "Technique/T1029", "coverage": "Low"}, {"tactics": ["Discovery"], "technique": "Technique/T1033", "coverage": "Low"}, {"tactics": ["Discovery"], "technique": "Technique/T1007", "coverage": "Low"}, {"tactics": ["Discovery"], "technique": "Technique/T1082", "coverage": "Low"}, {"tactics": ["Discovery"], "technique": "Technique/T1049", "coverage": "Low"}, {"tactics": ["Discovery"], "technique": "Technique/T1016", "coverage": "Low"}, {"tactics": ["Discovery"], "technique": "Technique/T1010", "coverage": "Low"}, {"tactics": ["Discovery"], "technique": "Technique/T1518", "coverage": "Low"}, {"tactics": ["Discovery"], "technique": "Technique/T1046", "coverage": "Low"}, {"tactics": ["Defense Evasion"], "technique": "Technique/T1562", "coverage": "Low"}, {"tactics": ["Credential Access"], "technique": "Technique/T1098", "coverage": "Low"}, {"tactics": ["Execution"], "technique": "Technique/T1059", "coverage": "Moderate"}, {"tactics": ["Discovery"], "technique": "Technique/T1012", "coverage": "Low"}]}, {"shortName": "Suspicious Run Locations", "name": "CAR-2013-05-002", "fields": ["process/create/image_path"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1036", "coverage": "Low"}]}, {"shortName": "All Logins Since Last Boot", "name": "CAR-2015-07-001", "fields": ["user_session/login/user"], "attack": []}, {"shortName": "Batch File Write to System32", "name": "CAR-2021-05-002", "fields": ["file/create/extension", "file/create/file_path"], "attack": [{"tactics": ["Execution"], "technique": "Technique/T1204", "coverage": "Moderate"}]}, {"shortName": "Remote Registry", "name": "CAR-2014-11-005", "fields": ["flow/message/dest_port", "flow/message/proto_info"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1112", "coverage": "Moderate"}]}, {"shortName": "User Activity from Stopping Windows Defensive Services", "name": "CAR-2016-04-003", "fields": [], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1562", "coverage": "Low"}]}, {"shortName": "RunDLL32.exe monitoring", "name": "CAR-2014-03-006", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1218", "coverage": "Moderate"}]}, {"shortName": "Active Directory Dumping via NTDSUtil", "name": "CAR-2019-08-002", "fields": ["file/create/file_name", "file/create/image_path"], "attack": [{"tactics": ["Credential Access"], "technique": "Technique/T1003", "coverage": "Low"}]}, {"shortName": "Service Outlier Executables", "name": "CAR-2013-09-005", "fields": ["process/create/parent_image_path"], "attack": [{"tactics": ["Persistence"], "technique": "Technique/T1543", "coverage": "Moderate"}]}, {"shortName": "DLL Injection with Mavinject", "name": "CAR-2020-11-003", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Privilege Escalation", "Defense Evasion"], "technique": "Technique/T1055", "coverage": "Low"}]}, {"shortName": "Simultaneous Logins on a Host", "name": "CAR-2013-02-008", "fields": ["user_session/login/user", "user_session/login/hostname"], "attack": [{"tactics": ["Initial Access"], "technique": "Technique/T1078", "coverage": "Low"}]}, {"shortName": "Remotely Launched Executables via WMI", "name": "CAR-2014-12-001", "fields": ["flow/message/dest_port", "flow/message/proto_info", "flow/message/src_port", "process/create/command_line", "process/create/exe", "process/create/parent_exe"], "attack": [{"tactics": ["Execution"], "technique": "Technique/T1047", "coverage": "High"}]}, {"shortName": "Command Launched from WinLogon", "name": "CAR-2014-11-008", "fields": ["process/create/exe", "process/create/parent_exe"], "attack": [{"tactics": ["Privilege Escalation", "Persistence"], "technique": "Technique/T1546", "coverage": "Moderate"}]}, {"shortName": "Local Network Sniffing", "name": "CAR-2020-11-002", "fields": ["process/create/exe", "process/create/parent_exe"], "attack": [{"tactics": ["Credential Access", "Discovery"], "technique": "Technique/T1040", "coverage": "Moderate"}]}, {"shortName": "Identifying Port Scanning Activity", "name": "CAR-2021-01-001", "fields": ["flow/start/dest_ip"], "attack": [{"tactics": ["Discovery"], "technique": "Technique/T1046", "coverage": "Moderate"}]}, {"shortName": "Access Permission Modification", "name": "CAR-2019-07-001", "fields": [], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1222", "coverage": "Moderate"}]}, {"shortName": "Modification of Default Startup Folder in the Registry Key 'Common Startup'", "name": "CAR-2021-12-002", "fields": ["process/create/command_line", "registry/add/key"], "attack": [{"tactics": ["Persistence", "Privilege Escalation"], "technique": "Technique/T1547", "coverage": "Medium"}, {"tactics": ["Defense Evasion"], "technique": "Technique/T1112", "coverage": "Medium"}]}, {"shortName": "User Activity from Clearing Event Logs", "name": "CAR-2016-04-002", "fields": ["process/create/command_line"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1070", "coverage": "Moderate"}]}, {"shortName": "Remote PowerShell Sessions", "name": "CAR-2014-11-004", "fields": ["process/create/exe", "process/create/parent_exe"], "attack": [{"tactics": ["Execution"], "technique": "Technique/T1059", "coverage": "Moderate"}, {"tactics": ["Lateral Movement"], "technique": "Technique/T1021", "coverage": "Moderate"}]}, {"shortName": "BCDEdit Failure Recovery Modification", "name": "CAR-2021-05-003", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Impact"], "technique": "Technique/T1490", "coverage": "Moderate"}]}, {"shortName": "Scheduled Task - FileAccess", "name": "CAR-2020-09-001", "fields": ["file/create/file_path", "file/create/image_path"], "attack": [{"tactics": ["Execution", "Persistence", "Privilege Escalation"], "technique": "Technique/T1053", "coverage": "Low"}]}, {"shortName": "NTFS Alternate Data Stream Execution - System Utilities", "name": "CAR-2020-08-001", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1564", "coverage": "Low"}]}, {"shortName": "User Logged in to Multiple Hosts", "name": "CAR-2013-02-012", "fields": [], "attack": [{"tactics": ["Lateral Movement"], "technique": "Technique/T1078", "coverage": "Moderate"}]}, {"shortName": "SMB Write Request", "name": "CAR-2013-05-003", "fields": ["flow/message/proto_info", "flow/message/dest_port"], "attack": [{"tactics": ["Lateral Movement"], "technique": "Technique/T1570", "coverage": "Moderate"}, {"tactics": ["Lateral Movement"], "technique": "Technique/T1021", "coverage": "Moderate"}, {"tactics": ["Defense Evasion"], "technique": "Technique/T1078", "coverage": "Moderate"}]}, {"shortName": "Credential Dumping via Mimikatz", "name": "CAR-2019-04-004", "fields": [], "attack": [{"tactics": ["Credential Access"], "technique": "Technique/T1003", "coverage": "Low"}]}, {"shortName": "Remote Windows Management Instrumentation (WMI) over RPC", "name": "CAR-2014-11-007", "fields": ["flow/message/proto_info"], "attack": [{"tactics": ["Execution"], "technique": "Technique/T1047", "coverage": "Moderate"}]}, {"shortName": "NTFS Alternate Data Stream Execution - LOLBAS", "name": "CAR-2020-08-002", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1564", "coverage": "Low"}]}, {"shortName": "Component Object Model Hijacking", "name": "CAR-2020-09-002", "fields": ["registry/add/key", "registry/remove/key", "registry/edit/key"], "attack": [{"tactics": ["Persistence", "Privilege Escalation"], "technique": "Technique/T1546", "coverage": "Moderate"}]}, {"shortName": "Powershell Execution", "name": "CAR-2014-04-003", "fields": ["process/create/exe", "process/create/parent_exe"], "attack": [{"tactics": ["Execution"], "technique": "Technique/T1059", "coverage": "High"}, {"tactics": ["Defense Evasion"], "technique": "Technique/T1059", "coverage": "Moderate"}]}, {"shortName": "Autorun Differences", "name": "CAR-2013-01-002", "fields": [], "attack": [{"tactics": ["Persistence"], "technique": "Technique/T1543", "coverage": "Moderate"}, {"tactics": ["Persistence"], "technique": "Technique/T1053", "coverage": "Moderate"}, {"tactics": ["Persistence"], "technique": "Technique/T1547", "coverage": "Moderate"}, {"tactics": ["Persistence", "Privilege Escalation"], "technique": "Technique/T1574", "coverage": "Moderate"}, {"tactics": ["Privilege Escalation", "Persistence"], "technique": "Technique/T1546", "coverage": "Moderate"}, {"tactics": ["Persistence", "Execution"], "technique": "Technique/T1112", "coverage": "Moderate"}, {"tactics": ["Persistence"], "technique": "Technique/T1037", "coverage": "Moderate"}]}, {"shortName": "Boot or Logon Initialization Scripts", "name": "CAR-2020-11-001", "fields": ["process/create/command_line", "process/create/exe", "registry/add/key", "registry/edit/key"], "attack": [{"tactics": ["Persistence", "Lateral Movement"], "technique": "Technique/T1037", "coverage": "Moderate"}]}, {"shortName": "Unusually Long Command Line Strings", "name": "CAR-2021-01-002", "fields": ["process/create/command_line"], "attack": [{"tactics": ["Execution"], "technique": "Technique/T1059", "coverage": "Low"}]}, {"shortName": "Lsass Process Dump via Procdump", "name": "CAR-2019-07-002", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Credential Access"], "technique": "Technique/T1003", "coverage": "Low"}]}, {"shortName": "Command Line Usage of Archiving Software", "name": "CAR-2013-07-005", "fields": ["process/create/command_line"], "attack": [{"tactics": ["Exfiltration"], "technique": "Technique/T1560", "coverage": "Moderate"}]}, {"shortName": "Scheduled Task Creation or Modification Containing Suspicious Scripts, Extensions or User Writable Paths", "name": "CAR-2021-12-001", "fields": ["process/create/command_line"], "attack": [{"tactics": ["Execution", "Persistence", "Privilege Escalation"], "technique": "Technique/T1053", "coverage": "Medium"}]}, {"shortName": "Clearing Windows Logs with Wevtutil", "name": "CAR-2021-01-003", "fields": ["process/create/command_line"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1070", "coverage": "Low"}]}, {"shortName": "Disable Windows Event Logging", "name": "CAR-2022-03-001", "fields": ["registry/value_edit/value", "process/create/command_line"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1562", "coverage": "Moderate"}]}, {"shortName": "Credential Dumping via Windows Task Manager", "name": "CAR-2019-08-001", "fields": ["file/create/file_name", "file/create/image_path"], "attack": [{"tactics": ["Credential Access"], "technique": "Technique/T1003", "coverage": "Low"}]}, {"shortName": "SMB Events Monitoring", "name": "CAR-2013-01-003", "fields": ["flow/message/dest_port", "flow/message/proto_info"], "attack": [{"tactics": ["Collection"], "technique": "Technique/T1039", "coverage": "Moderate"}, {"tactics": ["Lateral Movement"], "technique": "Technique/T1021", "coverage": "Moderate"}]}, {"shortName": "Services launching Cmd", "name": "CAR-2014-05-002", "fields": ["process/create/exe", "process/create/parent_exe"], "attack": [{"tactics": ["Persistence", "Privilege Escalation"], "technique": "Technique/T1543", "coverage": "Moderate"}]}, {"shortName": "Indicator Blocking - Driver Unloaded", "name": "CAR-2020-09-003", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1562", "coverage": "Low"}]}, {"shortName": "Attempt To Add Certificate To Untrusted Store", "name": "CAR-2021-05-001", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1553", "coverage": "Moderate"}]}, {"shortName": "Common Windows Process Masquerading", "name": "CAR-2021-04-001", "fields": ["process/create/exe", "process/create/image_path", "process/access/exe", "process/access/image_path", "process/terminate/exe", "process/terminate/image_path"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1036", "coverage": "Moderate"}]}, {"shortName": "Windows Remote Management (WinRM)", "name": "CAR-2014-11-006", "fields": ["flow/start/dest_port"], "attack": [{"tactics": ["Lateral Movement"], "technique": "Technique/T1021", "coverage": "Moderate"}]}, {"shortName": "Remotely Launched Executables via Services", "name": "CAR-2014-03-005", "fields": ["flow/start/pid", "process/create/parent_exe", "process/create/pid"], "attack": [{"tactics": ["Persistence"], "technique": "Technique/T1543", "coverage": "Moderate"}, {"tactics": ["Execution"], "technique": "Technique/T1569", "coverage": "Moderate"}]}, {"shortName": "Registry Edit from Screensaver", "name": "CAR-2020-11-011", "fields": ["registry/edit/key", "registry/add/key"], "attack": [{"tactics": ["Persistence", "Privilege Escalation"], "technique": "Technique/T1546", "coverage": "High"}]}, {"shortName": "Network Share Connection Removal", "name": "CAR-2020-11-007", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1070", "coverage": "High"}]}, {"shortName": "Execution with schtasks", "name": "CAR-2013-08-001", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Persistence"], "technique": "Technique/T1053", "coverage": "Moderate"}]}, {"shortName": "Unusual Child Process for Spoolsv.Exe or Connhost.Exe", "name": "CAR-2021-01-004", "fields": ["process/create/command_line"], "attack": [{"tactics": ["Privilege Escalation"], "technique": "Technique/T1068", "coverage": "Low"}]}, {"shortName": "Rare LolBAS Command Lines", "name": "CAR-2020-05-003", "fields": [], "attack": [{"tactics": ["Discovery"], "technique": "Technique/T1012", "coverage": "Low"}, {"tactics": ["Defense Evasion"], "technique": "Technique/T1112", "coverage": "Low"}, {"tactics": ["Persistence"], "technique": "Technique/T1547", "coverage": "Low"}, {"tactics": ["Persistence", "Privilege Escalation"], "technique": "Technique/T1574", "coverage": "Low"}]}, {"shortName": "Create local admin accounts using net exe", "name": "CAR-2021-05-010", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Persistence"], "technique": "Technique/T1136", "coverage": "Moderate"}]}, {"shortName": "Reg.exe called from Command Shell", "name": "CAR-2013-03-001", "fields": ["process/create/command_line", "process/create/hostname", "process/create/exe", "process/create/parent_exe", "process/create/pid", "process/create/ppid"], "attack": [{"tactics": ["Discovery"], "technique": "Technique/T1012", "coverage": "Moderate"}, {"tactics": ["Defense Evasion"], "technique": "Technique/T1112", "coverage": "Moderate"}, {"tactics": ["Persistence"], "technique": "Technique/T1547", "coverage": "Moderate"}, {"tactics": ["Persistence", "Privilege Escalation"], "technique": "Technique/T1574", "coverage": "Moderate"}]}, {"shortName": "DLL Injection via Load Library", "name": "CAR-2013-10-002", "fields": ["thread/remote_create/src_pid", "thread/remote_create/start_function"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1055", "coverage": "Moderate"}, {"tactics": ["Privilege Escalation"], "technique": "Technique/T1548", "coverage": "Moderate"}]}, {"shortName": "CertUtil Download With URLCache and Split Arguments", "name": "CAR-2021-05-006", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Command and Control"], "technique": "Technique/T1105", "coverage": "Moderate"}]}, {"shortName": "Credentials in Files & Registry", "name": "CAR-2020-09-004", "fields": ["process/create/command_line"], "attack": [{"tactics": ["Credential Access"], "technique": "Technique/T1552", "coverage": "Low"}]}, {"shortName": "Disable UAC", "name": "CAR-2021-01-008", "fields": ["process/create/image_path", "process/create/command_line"], "attack": [{"tactics": ["Privilege Escalation"], "technique": "Technique/T1548", "coverage": "Medium"}]}, {"shortName": "Webshell-Indicative Process Tree", "name": "CAR-2021-02-001", "fields": ["process/create/exe", "process/create/parent_exe"], "attack": [{"tactics": ["Persistence"], "technique": "Technique/T1505", "coverage": "Moderate"}]}, {"shortName": "UAC Bypass", "name": "CAR-2019-04-001", "fields": ["process/create/image_path", "process/create/parent_image_path", "process/create/integrity_level", "process/create/user", "process/create/parent_command_line"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1548", "coverage": "Low"}]}, {"shortName": "Registry Edit with Modification of Userinit, Shell or Notify", "name": "CAR-2021-11-002", "fields": ["process/create/command_line", "registry/add/key"], "attack": [{"tactics": ["Persistence", "Privilege Escalation"], "technique": "Technique/T1547", "coverage": "Medium"}, {"tactics": ["Defense Evasion"], "technique": "Technique/T1112", "coverage": "Medium"}]}, {"shortName": "Detecting Shadow Copy Deletion or Resize", "name": "CAR-2021-01-009", "fields": ["process/create/command_line"], "attack": [{"tactics": ["Impact"], "technique": "Technique/T1490", "coverage": "Low"}]}, {"shortName": "Host Discovery Commands", "name": "CAR-2016-03-001", "fields": ["process/create/command_line", "process/create/exe"], "attack": [{"tactics": ["Discovery"], "technique": "Technique/T1087", "coverage": "Moderate"}, {"tactics": ["Discovery"], "technique": "Technique/T1069", "coverage": "Moderate"}, {"tactics": ["Discovery"], "technique": "Technique/T1016", "coverage": "Moderate"}, {"tactics": ["Discovery"], "technique": "Technique/T1082", "coverage": "Moderate"}, {"tactics": ["Discovery"], "technique": "Technique/T1033", "coverage": "Moderate"}, {"tactics": ["Discovery"], "technique": "Technique/T1057", "coverage": "Moderate"}, {"tactics": ["Discovery"], "technique": "Technique/T1007", "coverage": "Moderate"}]}, {"shortName": "AppInit DLLs", "name": "CAR-2020-09-005", "fields": ["registry/add/key", "registry/remove/key", "registry/edit/key"], "attack": [{"tactics": ["Persistence", "Privilege Escalation"], "technique": "Technique/T1546", "coverage": "Moderate"}]}, {"shortName": "CertUtil Download With VerifyCtl and Split Arguments", "name": "CAR-2021-05-007", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Command and Control"], "technique": "Technique/T1105", "coverage": "Moderate"}]}, {"shortName": "Create Remote Thread into LSASS", "name": "CAR-2021-05-011", "fields": ["thread/remote_create"], "attack": [{"tactics": ["Credential Access"], "technique": "Technique/T1003", "coverage": "Moderate"}]}, {"shortName": "RDP Connection Detection", "name": "CAR-2013-07-002", "fields": ["flow/end/dest_port", "flow/start/dest_ip", "flow/start/dest_port", "flow/start/src_ip"], "attack": [{"tactics": ["Lateral Movement"], "technique": "Technique/T1021", "coverage": "Medium"}]}, {"shortName": "Service Search Path Interception", "name": "CAR-2014-07-001", "fields": ["process/create/command_line", "process/create/image_path", "process/create/parent_exe"], "attack": [{"tactics": ["Privilege Escalation", "Persistence"], "technique": "Technique/T1574", "coverage": "High"}]}, {"shortName": "Remotely Scheduled Tasks via AT", "name": "CAR-2015-04-001", "fields": ["flow/message/proto_info"], "attack": [{"tactics": ["Execution"], "technique": "Technique/T1053", "coverage": "Moderate"}]}, {"shortName": "Local Permission Group Discovery", "name": "CAR-2020-11-006", "fields": ["process/create/exe", "process/create/command_line"], "attack": [{"tactics": ["Discovery"], "technique": "Technique/T1069", "coverage": "Moderate"}]}, {"shortName": "CMSTP", "name": "CAR-2020-11-010", "fields": ["process/create/exe", "process/create/src_ip"], "attack": [{"tactics": ["Defense Evasion"], "technique": "Technique/T1218", "coverage": "High"}]}]}
\ No newline at end of file
diff --git a/docs/sensors/auditd_2.8.md b/docs/sensors/auditd_2.8.md
new file mode 100644
index 00000000..de2e70bd
--- /dev/null
+++ b/docs/sensors/auditd_2.8.md
@@ -0,0 +1,136 @@
+---
+title: "auditd (2.8)"
+---
+
+- Manufacturer: Red Hat
+- Version: 2.8
+- Website: https://people.redhat.com/sgrubb/audit/
+
+
+## Description
+auditd is the userspace component to the Linux Auditing System. It's responsible for writing audit records to the disk
+
+
+
+
+## Data Model Coverage
+
+### [file](../data_model/file)
+
+| | `company` | `content` | `creation_time` | `extension` | `file_name` | `file_path` | `fqdn` | `gid` | `group` | `hostname` | `image_path` | `link_target` | `md5_hash` | `mime_type` | `mode` | `owner` | `owner_uid` | `pid` | `ppid` | `previous_creation_time` | `sha1_hash` | `sha256_hash` | `signature_valid` | `signer` | `uid` | `user` |
+|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
+| `acl_modify` | | | | | | | | | | | | | | | | | | | | | | | | | | |
+| `create` | | |✓| |✓|✓| | | | |✓| |✓| | | | |✓|✓| |✓|✓| | | |✓|
+| `delete` | | |✓| |✓|✓| | | | |✓| |✓| | | | |✓|✓| |✓|✓| | | |✓|
+| `modify` | | |✓| |✓|✓| | | | |✓| |✓| | | | |✓|✓| |✓|✓| | | |✓|
+| `read` | | | | | | | | | | | | | | | | | | | | | | | | | | |
+| `timestomp` | | |✓| |✓|✓| | | | |✓| |✓| | | | |✓|✓| |✓|✓| | | |✓|
+| `write` | | |✓| |✓|✓| | | | |✓| |✓| | | | |✓|✓| |✓|✓| | | |✓|
+
+### [driver](../data_model/driver)
+
+| | `base_address` | `fqdn` | `hostname` | `image_path` | `md5_hash` | `module_name` | `pid` | `sha1_hash` | `sha256_hash` | `signature_valid` | `signer` |
+|---|---|---|---|---|---|---|---|---|---|---|
+| `load` | | | |✓|✓|✓| |✓|✓| | |
+| `unload` | | | | | | | | | | | |
+
+### [flow](../data_model/flow)
+
+| | `application_protocol` | `content` | `dest_fqdn` | `dest_hostname` | `dest_ip` | `dest_port` | `end_time` | `exe` | `fqdn` | `hostname` | `image_path` | `in_bytes` | `network_direction` | `out_bytes` | `packet_count` | `pid` | `ppid` | `proto_info` | `src_fqdn` | `src_hostname` | `src_ip` | `src_port` | `start_time` | `tcp_flags` | `transport_protocol` | `uid` | `user` |
+|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
+| `end` | | | | |✓|✓| | | | |✓| | | | |✓| | | | |✓|✓|✓| | | |✓|
+| `message` | | | | | | | | | | | | | | | | | | | | | | | | | | | |
+| `start` | | | | |✓|✓| | | | |✓| | | | |✓| | | | |✓|✓|✓| | | |✓|
+
+### [process](../data_model/process)
+
+| | `access_level` | `call_trace` | `command_line` | `current_working_directory` | `env_vars` | `exe` | `fqdn` | `guid` | `hostname` | `image_path` | `integrity_level` | `md5_hash` | `parent_command_line` | `parent_exe` | `parent_guid` | `parent_image_path` | `pid` | `ppid` | `sha1_hash` | `sha256_hash` | `sid` | `signature_valid` | `signer` | `target_address` | `target_guid` | `target_name` | `target_pid` | `uid` | `user` |
+|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
+| `access` | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
+| `create` | | |✓|✓| |✓| | | |✓| |✓| | | | |✓|✓|✓|✓| | | | | | | | |✓|
+| `terminate` | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
+
+
+
+
+## Analytic Coverage
+
+ - [CAR-2013-02-003: Processes Spawning cmd.exe](../analytics/CAR-2013-02-003)
+ - [CAR-2013-03-001: Reg.exe called from Command Shell](../analytics/CAR-2013-03-001)
+ - [CAR-2013-04-002: Quick execution of a series of suspicious commands](../analytics/CAR-2013-04-002)
+ - [CAR-2013-05-002: Suspicious Run Locations](../analytics/CAR-2013-05-002)
+ - [CAR-2013-05-004: Execution with AT](../analytics/CAR-2013-05-004)
+ - [CAR-2013-05-005: SMB Copy and Execution](../analytics/CAR-2013-05-005)
+ - [CAR-2013-05-009: Running executables with same hash and different names](../analytics/CAR-2013-05-009)
+ - [CAR-2013-07-001: Suspicious Arguments](../analytics/CAR-2013-07-001)
+ - [CAR-2013-07-002: RDP Connection Detection](../analytics/CAR-2013-07-002)
+ - [CAR-2013-07-005: Command Line Usage of Archiving Software](../analytics/CAR-2013-07-005)
+ - [CAR-2013-08-001: Execution with schtasks](../analytics/CAR-2013-08-001)
+ - [CAR-2014-02-001: Service Binary Modifications](../analytics/CAR-2014-02-001)
+ - [CAR-2014-03-001: SMB Write Request - NamedPipes](../analytics/CAR-2014-03-001)
+ - [CAR-2014-03-005: Remotely Launched Executables via Services](../analytics/CAR-2014-03-005)
+ - [CAR-2014-03-006: RunDLL32.exe monitoring](../analytics/CAR-2014-03-006)
+ - [CAR-2014-04-003: Powershell Execution](../analytics/CAR-2014-04-003)
+ - [CAR-2014-05-001: RPC Activity](../analytics/CAR-2014-05-001)
+ - [CAR-2014-05-002: Services launching Cmd](../analytics/CAR-2014-05-002)
+ - [CAR-2014-07-001: Service Search Path Interception](../analytics/CAR-2014-07-001)
+ - [CAR-2014-11-002: Outlier Parents of Cmd](../analytics/CAR-2014-11-002)
+ - [CAR-2014-11-003: Debuggers for Accessibility Applications](../analytics/CAR-2014-11-003)
+ - [CAR-2014-11-004: Remote PowerShell Sessions](../analytics/CAR-2014-11-004)
+ - [CAR-2014-11-006: Windows Remote Management (WinRM)](../analytics/CAR-2014-11-006)
+ - [CAR-2014-11-008: Command Launched from WinLogon](../analytics/CAR-2014-11-008)
+ - [CAR-2014-12-001: Remotely Launched Executables via WMI](../analytics/CAR-2014-12-001)
+ - [CAR-2016-03-001: Host Discovery Commands](../analytics/CAR-2016-03-001)
+ - [CAR-2016-03-002: Create Remote Process via WMIC](../analytics/CAR-2016-03-002)
+ - [CAR-2016-04-002: User Activity from Clearing Event Logs](../analytics/CAR-2016-04-002)
+ - [CAR-2019-04-001: UAC Bypass](../analytics/CAR-2019-04-001)
+ - [CAR-2019-04-002: Generic Regsvr32](../analytics/CAR-2019-04-002)
+ - [CAR-2019-04-003: Squiblydoo](../analytics/CAR-2019-04-003)
+ - [CAR-2019-07-002: Lsass Process Dump via Procdump](../analytics/CAR-2019-07-002)
+ - [CAR-2019-08-001: Credential Dumping via Windows Task Manager](../analytics/CAR-2019-08-001)
+ - [CAR-2019-08-002: Active Directory Dumping via NTDSUtil](../analytics/CAR-2019-08-002)
+ - [CAR-2020-08-001: NTFS Alternate Data Stream Execution - System Utilities](../analytics/CAR-2020-08-001)
+ - [CAR-2020-08-002: NTFS Alternate Data Stream Execution - LOLBAS](../analytics/CAR-2020-08-002)
+ - [CAR-2020-09-001: Scheduled Task - FileAccess](../analytics/CAR-2020-09-001)
+ - [CAR-2020-09-002: Component Object Model Hijacking](../analytics/CAR-2020-09-002)
+ - [CAR-2020-09-003: Indicator Blocking - Driver Unloaded](../analytics/CAR-2020-09-003)
+ - [CAR-2020-09-004: Credentials in Files & Registry](../analytics/CAR-2020-09-004)
+ - [CAR-2020-09-005: AppInit DLLs](../analytics/CAR-2020-09-005)
+ - [CAR-2020-11-001: Boot or Logon Initialization Scripts](../analytics/CAR-2020-11-001)
+ - [CAR-2020-11-002: Local Network Sniffing](../analytics/CAR-2020-11-002)
+ - [CAR-2020-11-003: DLL Injection with Mavinject](../analytics/CAR-2020-11-003)
+ - [CAR-2020-11-004: Processes Started From Irregular Parent](../analytics/CAR-2020-11-004)
+ - [CAR-2020-11-005: Clear Powershell Console Command History](../analytics/CAR-2020-11-005)
+ - [CAR-2020-11-006: Local Permission Group Discovery](../analytics/CAR-2020-11-006)
+ - [CAR-2020-11-007: Network Share Connection Removal](../analytics/CAR-2020-11-007)
+ - [CAR-2020-11-008: MSBuild and msxsl](../analytics/CAR-2020-11-008)
+ - [CAR-2020-11-009: Compiled HTML Access](../analytics/CAR-2020-11-009)
+ - [CAR-2020-11-010: CMSTP](../analytics/CAR-2020-11-010)
+ - [CAR-2020-11-011: Registry Edit from Screensaver](../analytics/CAR-2020-11-011)
+ - [CAR-2021-01-001: Identifying Port Scanning Activity](../analytics/CAR-2021-01-001)
+ - [CAR-2021-01-002: Unusually Long Command Line Strings](../analytics/CAR-2021-01-002)
+ - [CAR-2021-01-003: Clearing Windows Logs with Wevtutil](../analytics/CAR-2021-01-003)
+ - [CAR-2021-01-004: Unusual Child Process for Spoolsv.Exe or Connhost.Exe](../analytics/CAR-2021-01-004)
+ - [CAR-2021-01-006: Unusual Child Process spawned using DDE exploit](../analytics/CAR-2021-01-006)
+ - [CAR-2021-01-007: Detecting Tampering of Windows Defender Command Prompt](../analytics/CAR-2021-01-007)
+ - [CAR-2021-01-008: Disable UAC](../analytics/CAR-2021-01-008)
+ - [CAR-2021-01-009: Detecting Shadow Copy Deletion or Resize](../analytics/CAR-2021-01-009)
+ - [CAR-2021-02-001: Webshell-Indicative Process Tree](../analytics/CAR-2021-02-001)
+ - [CAR-2021-02-002: Get System Elevation](../analytics/CAR-2021-02-002)
+ - [CAR-2021-04-001: Common Windows Process Masquerading](../analytics/CAR-2021-04-001)
+ - [CAR-2021-05-001: Attempt To Add Certificate To Untrusted Store](../analytics/CAR-2021-05-001)
+ - [CAR-2021-05-002: Batch File Write to System32](../analytics/CAR-2021-05-002)
+ - [CAR-2021-05-003: BCDEdit Failure Recovery Modification](../analytics/CAR-2021-05-003)
+ - [CAR-2021-05-004: BITS Job Persistence](../analytics/CAR-2021-05-004)
+ - [CAR-2021-05-005: BITSAdmin Download File](../analytics/CAR-2021-05-005)
+ - [CAR-2021-05-006: CertUtil Download With URLCache and Split Arguments](../analytics/CAR-2021-05-006)
+ - [CAR-2021-05-007: CertUtil Download With VerifyCtl and Split Arguments](../analytics/CAR-2021-05-007)
+ - [CAR-2021-05-008: Certutil exe certificate extraction](../analytics/CAR-2021-05-008)
+ - [CAR-2021-05-009: CertUtil With Decode Argument](../analytics/CAR-2021-05-009)
+ - [CAR-2021-05-010: Create local admin accounts using net exe](../analytics/CAR-2021-05-010)
+ - [CAR-2021-11-001: Registry Edit with Creation of SafeDllSearchMode Key Set to 0](../analytics/CAR-2021-11-001)
+ - [CAR-2021-11-002: Registry Edit with Modification of Userinit, Shell or Notify](../analytics/CAR-2021-11-002)
+ - [CAR-2021-12-001: Scheduled Task Creation or Modification Containing Suspicious Scripts, Extensions or User Writable Paths](../analytics/CAR-2021-12-001)
+ - [CAR-2021-12-002: Modification of Default Startup Folder in the Registry Key 'Common Startup'](../analytics/CAR-2021-12-002)
+ - [CAR-2022-03-001: Disable Windows Event Logging](../analytics/CAR-2022-03-001)
+ - [N/A](../analytics/N/A)
diff --git a/docs/sensors/autoruns_13.98.md b/docs/sensors/autoruns_13.98.md
index 81338f9d..2cf2b3de 100644
--- a/docs/sensors/autoruns_13.98.md
+++ b/docs/sensors/autoruns_13.98.md
@@ -14,18 +14,6 @@ Autoruns reports Explorer shell extensions, toolbars, browser helper objects, Wi
## Data Model Coverage
-### [file](../data_model/file)
-
-| | `company` | `content` | `creation_time` | `extension` | `file_name` | `file_path` | `fqdn` | `gid` | `group` | `hostname` | `image_path` | `link_target` | `md5_hash` | `mime_type` | `mode` | `owner` | `owner_uid` | `pid` | `ppid` | `previous_creation_time` | `sha1_hash` | `sha256_hash` | `signature_valid` | `signer` | `uid` | `user` |
-|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
-| `acl_modify` | | | | | | | | | | | | | | | | | | | | | | | | | | |
-| `create` | ✓| |✓| |✓|✓|✓| | |✓|✓| |✓| | | | | | | |✓|✓| |✓| | |
-| `delete` | | | | | | | | | | | | | | | | | | | | | | | | | | |
-| `modify` | ✓| |✓| |✓|✓|✓| | |✓|✓| |✓| | | | | | | |✓|✓| |✓| | |
-| `read` | | | | | | | | | | | | | | | | | | | | | | | | | | |
-| `timestomp` | | | | | | | | | | | | | | | | | | | | | | | | | | |
-| `write` | | | | | | | | | | | | | | | | | | | | | | | | | | |
-
### [registry](../data_model/registry)
| | `data` | `fqdn` | `hive` | `hostname` | `image_path` | `key` | `new_content` | `pid` | `type` | `user` | `value` |
@@ -45,6 +33,18 @@ Autoruns reports Explorer shell extensions, toolbars, browser helper objects, Wi
| `start` | | | | | | | | | | |
| `stop` | | | | | | | | | | |
+### [file](../data_model/file)
+
+| | `company` | `content` | `creation_time` | `extension` | `file_name` | `file_path` | `fqdn` | `gid` | `group` | `hostname` | `image_path` | `link_target` | `md5_hash` | `mime_type` | `mode` | `owner` | `owner_uid` | `pid` | `ppid` | `previous_creation_time` | `sha1_hash` | `sha256_hash` | `signature_valid` | `signer` | `uid` | `user` |
+|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
+| `acl_modify` | | | | | | | | | | | | | | | | | | | | | | | | | | |
+| `create` | ✓| |✓| |✓|✓|✓| | |✓|✓| |✓| | | | | | | |✓|✓| |✓| | |
+| `delete` | | | | | | | | | | | | | | | | | | | | | | | | | | |
+| `modify` | ✓| |✓| |✓|✓|✓| | |✓|✓| |✓| | | | | | | |✓|✓| |✓| | |
+| `read` | | | | | | | | | | | | | | | | | | | | | | | | | | |
+| `timestomp` | | | | | | | | | | | | | | | | | | | | | | | | | | |
+| `write` | | | | | | | | | | | | | | | | | | | | | | | | | | |
+
@@ -62,3 +62,7 @@ Autoruns reports Explorer shell extensions, toolbars, browser helper objects, Wi
- [CAR-2021-02-002: Get System Elevation](../analytics/CAR-2021-02-002)
- [CAR-2021-05-002: Batch File Write to System32](../analytics/CAR-2021-05-002)
- [CAR-2021-05-012: Create Service In Suspicious File Path](../analytics/CAR-2021-05-012)
+ - [CAR-2021-11-001: Registry Edit with Creation of SafeDllSearchMode Key Set to 0](../analytics/CAR-2021-11-001)
+ - [CAR-2021-11-002: Registry Edit with Modification of Userinit, Shell or Notify](../analytics/CAR-2021-11-002)
+ - [CAR-2021-12-002: Modification of Default Startup Folder in the Registry Key 'Common Startup'](../analytics/CAR-2021-12-002)
+ - [CAR-2022-03-001: Disable Windows Event Logging](../analytics/CAR-2022-03-001)
diff --git a/docs/sensors/index.md b/docs/sensors/index.md
index 6f183ead..c8d34e09 100755
--- a/docs/sensors/index.md
+++ b/docs/sensors/index.md
@@ -5,9 +5,10 @@ title: "Sensors"
Sensors are tools that collect data that can be used to run analytics.
CAR currently has a limited number of sensors mapped to the CAR [Data Model](../data_model). They are:
+* [auditd (2.8)](auditd_2.8)
* [Autoruns (13.98)](autoruns_13.98)
+* [osquery (4.1.2)](osquery_4.1.2)
+* [osquery (4.6.0)](osquery_4.6.0)
* [Sysmon (10.4)](sysmon_10.4)
* [Sysmon (11.0)](sysmon_11.0)
-* [Sysmon (13.0)](sysmon_13)
-* [OSQuery (4.1.2)](osquery_4.1.2)
-* [OSQuery (4.6.0)](osquery_4.6.0)
+* [Sysmon (13)](sysmon_13)
\ No newline at end of file
diff --git a/docs/sensors/osquery_4.1.2.md b/docs/sensors/osquery_4.1.2.md
index bdb46448..9c5d21f5 100755
--- a/docs/sensors/osquery_4.1.2.md
+++ b/docs/sensors/osquery_4.1.2.md
@@ -14,13 +14,6 @@ osquery exposes an operating system as a high-performance relational database. T
## Data Model Coverage
-### [driver](../data_model/driver)
-
-| | `base_address` | `fqdn` | `hostname` | `image_path` | `md5_hash` | `module_name` | `pid` | `sha1_hash` | `sha256_hash` | `signature_valid` | `signer` |
-|---|---|---|---|---|---|---|---|---|---|---|
-| `load` | | | |✓|✓|✓| |✓|✓| | |
-| `unload` | | | | | | | | | | | |
-
### [file](../data_model/file)
| | `company` | `content` | `creation_time` | `extension` | `file_name` | `file_path` | `fqdn` | `gid` | `group` | `hostname` | `image_path` | `link_target` | `md5_hash` | `mime_type` | `mode` | `owner` | `owner_uid` | `pid` | `ppid` | `previous_creation_time` | `sha1_hash` | `sha256_hash` | `signature_valid` | `signer` | `uid` | `user` |
@@ -33,6 +26,13 @@ osquery exposes an operating system as a high-performance relational database. T
| `timestomp` | | |✓| |✓|✓| | | | |✓| |✓| | | | |✓|✓| |✓|✓| | | |✓|
| `write` | | |✓| |✓|✓| | | | |✓| |✓| | | | |✓|✓| |✓|✓| | | |✓|
+### [driver](../data_model/driver)
+
+| | `base_address` | `fqdn` | `hostname` | `image_path` | `md5_hash` | `module_name` | `pid` | `sha1_hash` | `sha256_hash` | `signature_valid` | `signer` |
+|---|---|---|---|---|---|---|---|---|---|---|
+| `load` | | | |✓|✓|✓| |✓|✓| | |
+| `unload` | | | | | | | | | | | |
+
### [flow](../data_model/flow)
| | `application_protocol` | `content` | `dest_fqdn` | `dest_hostname` | `dest_ip` | `dest_port` | `end_time` | `exe` | `fqdn` | `hostname` | `image_path` | `in_bytes` | `network_direction` | `out_bytes` | `packet_count` | `pid` | `ppid` | `proto_info` | `src_fqdn` | `src_hostname` | `src_ip` | `src_port` | `start_time` | `tcp_flags` | `transport_protocol` | `uid` | `user` |
@@ -81,13 +81,13 @@ osquery exposes an operating system as a high-performance relational database. T
- [CAR-2014-12-001: Remotely Launched Executables via WMI](../analytics/CAR-2014-12-001)
- [CAR-2016-03-001: Host Discovery Commands](../analytics/CAR-2016-03-001)
- [CAR-2016-03-002: Create Remote Process via WMIC](../analytics/CAR-2016-03-002)
+ - [CAR-2016-04-002: User Activity from Clearing Event Logs](../analytics/CAR-2016-04-002)
- [CAR-2019-04-001: UAC Bypass](../analytics/CAR-2019-04-001)
- [CAR-2019-04-002: Generic Regsvr32](../analytics/CAR-2019-04-002)
- [CAR-2019-04-003: Squiblydoo](../analytics/CAR-2019-04-003)
- [CAR-2019-07-002: Lsass Process Dump via Procdump](../analytics/CAR-2019-07-002)
- [CAR-2019-08-001: Credential Dumping via Windows Task Manager](../analytics/CAR-2019-08-001)
- [CAR-2019-08-002: Active Directory Dumping via NTDSUtil](../analytics/CAR-2019-08-002)
- - [CAR-2020-04-001: Shadow Copy Deletion](../analytics/CAR-2020-04-001)
- [CAR-2020-08-001: NTFS Alternate Data Stream Execution - System Utilities](../analytics/CAR-2020-08-001)
- [CAR-2020-08-002: NTFS Alternate Data Stream Execution - LOLBAS](../analytics/CAR-2020-08-002)
- [CAR-2020-09-001: Scheduled Task - FileAccess](../analytics/CAR-2020-09-001)
@@ -113,7 +113,7 @@ osquery exposes an operating system as a high-performance relational database. T
- [CAR-2021-01-006: Unusual Child Process spawned using DDE exploit](../analytics/CAR-2021-01-006)
- [CAR-2021-01-007: Detecting Tampering of Windows Defender Command Prompt](../analytics/CAR-2021-01-007)
- [CAR-2021-01-008: Disable UAC](../analytics/CAR-2021-01-008)
- - [CAR-2021-01-009: Detecting Shadow Copy Deletion via Vssadmin.exe](../analytics/CAR-2021-01-009)
+ - [CAR-2021-01-009: Detecting Shadow Copy Deletion or Resize](../analytics/CAR-2021-01-009)
- [CAR-2021-02-001: Webshell-Indicative Process Tree](../analytics/CAR-2021-02-001)
- [CAR-2021-02-002: Get System Elevation](../analytics/CAR-2021-02-002)
- [CAR-2021-04-001: Common Windows Process Masquerading](../analytics/CAR-2021-04-001)
@@ -127,4 +127,9 @@ osquery exposes an operating system as a high-performance relational database. T
- [CAR-2021-05-008: Certutil exe certificate extraction](../analytics/CAR-2021-05-008)
- [CAR-2021-05-009: CertUtil With Decode Argument](../analytics/CAR-2021-05-009)
- [CAR-2021-05-010: Create local admin accounts using net exe](../analytics/CAR-2021-05-010)
+ - [CAR-2021-11-001: Registry Edit with Creation of SafeDllSearchMode Key Set to 0](../analytics/CAR-2021-11-001)
+ - [CAR-2021-11-002: Registry Edit with Modification of Userinit, Shell or Notify](../analytics/CAR-2021-11-002)
+ - [CAR-2021-12-001: Scheduled Task Creation or Modification Containing Suspicious Scripts, Extensions or User Writable Paths](../analytics/CAR-2021-12-001)
+ - [CAR-2021-12-002: Modification of Default Startup Folder in the Registry Key 'Common Startup'](../analytics/CAR-2021-12-002)
+ - [CAR-2022-03-001: Disable Windows Event Logging](../analytics/CAR-2022-03-001)
- [N/A](../analytics/N/A)
diff --git a/docs/sensors/osquery_4.6.0.md b/docs/sensors/osquery_4.6.0.md
index b044a54c..7efe527e 100755
--- a/docs/sensors/osquery_4.6.0.md
+++ b/docs/sensors/osquery_4.6.0.md
@@ -14,13 +14,6 @@ osquery exposes an operating system as a high-performance relational database. T
## Data Model Coverage
-### [driver](../data_model/driver)
-
-| | `base_address` | `fqdn` | `hostname` | `image_path` | `md5_hash` | `module_name` | `pid` | `sha1_hash` | `sha256_hash` | `signature_valid` | `signer` |
-|---|---|---|---|---|---|---|---|---|---|---|
-| `load` | | | |✓|✓|✓| |✓|✓| | |
-| `unload` | | | | | | | | | | | |
-
### [file](../data_model/file)
| | `company` | `content` | `creation_time` | `extension` | `file_name` | `file_path` | `fqdn` | `gid` | `group` | `hostname` | `image_path` | `link_target` | `md5_hash` | `mime_type` | `mode` | `owner` | `owner_uid` | `pid` | `ppid` | `previous_creation_time` | `sha1_hash` | `sha256_hash` | `signature_valid` | `signer` | `uid` | `user` |
@@ -33,6 +26,13 @@ osquery exposes an operating system as a high-performance relational database. T
| `timestomp` | | |✓| |✓|✓| | | | |✓| |✓| |✓| | |✓|✓| |✓|✓| | | |✓|
| `write` | | |✓| |✓|✓| | | | |✓| |✓| |✓| | |✓|✓| |✓|✓| | | |✓|
+### [driver](../data_model/driver)
+
+| | `base_address` | `fqdn` | `hostname` | `image_path` | `md5_hash` | `module_name` | `pid` | `sha1_hash` | `sha256_hash` | `signature_valid` | `signer` |
+|---|---|---|---|---|---|---|---|---|---|---|
+| `load` | | | |✓|✓|✓| |✓|✓| | |
+| `unload` | | | | | | | | | | | |
+
### [flow](../data_model/flow)
| | `application_protocol` | `content` | `dest_fqdn` | `dest_hostname` | `dest_ip` | `dest_port` | `end_time` | `exe` | `fqdn` | `hostname` | `image_path` | `in_bytes` | `network_direction` | `out_bytes` | `packet_count` | `pid` | `ppid` | `proto_info` | `src_fqdn` | `src_hostname` | `src_ip` | `src_port` | `start_time` | `tcp_flags` | `transport_protocol` | `uid` | `user` |
@@ -81,13 +81,13 @@ osquery exposes an operating system as a high-performance relational database. T
- [CAR-2014-12-001: Remotely Launched Executables via WMI](../analytics/CAR-2014-12-001)
- [CAR-2016-03-001: Host Discovery Commands](../analytics/CAR-2016-03-001)
- [CAR-2016-03-002: Create Remote Process via WMIC](../analytics/CAR-2016-03-002)
+ - [CAR-2016-04-002: User Activity from Clearing Event Logs](../analytics/CAR-2016-04-002)
- [CAR-2019-04-001: UAC Bypass](../analytics/CAR-2019-04-001)
- [CAR-2019-04-002: Generic Regsvr32](../analytics/CAR-2019-04-002)
- [CAR-2019-04-003: Squiblydoo](../analytics/CAR-2019-04-003)
- [CAR-2019-07-002: Lsass Process Dump via Procdump](../analytics/CAR-2019-07-002)
- [CAR-2019-08-001: Credential Dumping via Windows Task Manager](../analytics/CAR-2019-08-001)
- [CAR-2019-08-002: Active Directory Dumping via NTDSUtil](../analytics/CAR-2019-08-002)
- - [CAR-2020-04-001: Shadow Copy Deletion](../analytics/CAR-2020-04-001)
- [CAR-2020-08-001: NTFS Alternate Data Stream Execution - System Utilities](../analytics/CAR-2020-08-001)
- [CAR-2020-08-002: NTFS Alternate Data Stream Execution - LOLBAS](../analytics/CAR-2020-08-002)
- [CAR-2020-09-001: Scheduled Task - FileAccess](../analytics/CAR-2020-09-001)
@@ -113,7 +113,7 @@ osquery exposes an operating system as a high-performance relational database. T
- [CAR-2021-01-006: Unusual Child Process spawned using DDE exploit](../analytics/CAR-2021-01-006)
- [CAR-2021-01-007: Detecting Tampering of Windows Defender Command Prompt](../analytics/CAR-2021-01-007)
- [CAR-2021-01-008: Disable UAC](../analytics/CAR-2021-01-008)
- - [CAR-2021-01-009: Detecting Shadow Copy Deletion via Vssadmin.exe](../analytics/CAR-2021-01-009)
+ - [CAR-2021-01-009: Detecting Shadow Copy Deletion or Resize](../analytics/CAR-2021-01-009)
- [CAR-2021-02-001: Webshell-Indicative Process Tree](../analytics/CAR-2021-02-001)
- [CAR-2021-02-002: Get System Elevation](../analytics/CAR-2021-02-002)
- [CAR-2021-04-001: Common Windows Process Masquerading](../analytics/CAR-2021-04-001)
@@ -127,4 +127,9 @@ osquery exposes an operating system as a high-performance relational database. T
- [CAR-2021-05-008: Certutil exe certificate extraction](../analytics/CAR-2021-05-008)
- [CAR-2021-05-009: CertUtil With Decode Argument](../analytics/CAR-2021-05-009)
- [CAR-2021-05-010: Create local admin accounts using net exe](../analytics/CAR-2021-05-010)
+ - [CAR-2021-11-001: Registry Edit with Creation of SafeDllSearchMode Key Set to 0](../analytics/CAR-2021-11-001)
+ - [CAR-2021-11-002: Registry Edit with Modification of Userinit, Shell or Notify](../analytics/CAR-2021-11-002)
+ - [CAR-2021-12-001: Scheduled Task Creation or Modification Containing Suspicious Scripts, Extensions or User Writable Paths](../analytics/CAR-2021-12-001)
+ - [CAR-2021-12-002: Modification of Default Startup Folder in the Registry Key 'Common Startup'](../analytics/CAR-2021-12-002)
+ - [CAR-2022-03-001: Disable Windows Event Logging](../analytics/CAR-2022-03-001)
- [N/A](../analytics/N/A)
diff --git a/docs/sensors/sysmon_10.4.md b/docs/sensors/sysmon_10.4.md
index 088dcab9..0bbcec26 100755
--- a/docs/sensors/sysmon_10.4.md
+++ b/docs/sensors/sysmon_10.4.md
@@ -14,12 +14,23 @@ Sysmon is a freely available program from Microsoft that is provided as part of
## Data Model Coverage
-### [driver](../data_model/driver)
+### [thread](../data_model/thread)
-| | `base_address` | `fqdn` | `hostname` | `image_path` | `md5_hash` | `module_name` | `pid` | `sha1_hash` | `sha256_hash` | `signature_valid` | `signer` |
+| | `hostname` | `src_pid` | `src_tid` | `stack_base` | `stack_limit` | `start_address` | `start_function` | `start_module` | `start_module_name` | `tgt_pid` | `tgt_tid` | `uid` | `user` | `user_stack_base` | `user_stack_limit` |
+|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
+| `create` | ✓|✓| | | |✓|✓|✓| |✓|✓| | | | |
+| `remote_create` | ✓|✓| | | |✓|✓|✓| |✓|✓| | | | |
+| `suspend` | | | | | | | | | | | | | | | |
+| `terminate` | | | | | | | | | | | | | | | |
+
+### [registry](../data_model/registry)
+
+| | `data` | `fqdn` | `hive` | `hostname` | `image_path` | `key` | `new_content` | `pid` | `type` | `user` | `value` |
|---|---|---|---|---|---|---|---|---|---|---|
-| `load` | |✓| |✓|✓| | |✓|✓| |✓|
-| `unload` | | | | | | | | | | | |
+| `add` | |✓|✓| |✓|✓| |✓| | |✓|
+| `key_edit` | | | | | | | | | | | |
+| `remove` | |✓|✓| |✓|✓| |✓| | |✓|
+| `value_edit` | | | | | | | | | | | |
### [file](../data_model/file)
@@ -33,6 +44,13 @@ Sysmon is a freely available program from Microsoft that is provided as part of
| `timestomp` | | |✓| |✓| |✓| | | |✓| | | | | | |✓| |✓| | | | | | |
| `write` | | | | | | | | | | | | | | | | | | | | | | | | | | |
+### [driver](../data_model/driver)
+
+| | `base_address` | `fqdn` | `hostname` | `image_path` | `md5_hash` | `module_name` | `pid` | `sha1_hash` | `sha256_hash` | `signature_valid` | `signer` |
+|---|---|---|---|---|---|---|---|---|---|---|
+| `load` | |✓| |✓|✓| | |✓|✓| |✓|
+| `unload` | | | | | | | | | | | |
+
### [flow](../data_model/flow)
| | `application_protocol` | `content` | `dest_fqdn` | `dest_hostname` | `dest_ip` | `dest_port` | `end_time` | `exe` | `fqdn` | `hostname` | `image_path` | `in_bytes` | `network_direction` | `out_bytes` | `packet_count` | `pid` | `ppid` | `proto_info` | `src_fqdn` | `src_hostname` | `src_ip` | `src_port` | `start_time` | `tcp_flags` | `transport_protocol` | `uid` | `user` |
@@ -49,24 +67,6 @@ Sysmon is a freely available program from Microsoft that is provided as part of
| `create` | | |✓|✓| | |✓| | |✓|✓|✓|✓| | |✓|✓|✓|✓|✓| | | | | | | | |✓|
| `terminate` | | | | | | |✓| | |✓| | | | | | |✓| | | | | | | | | | | | |
-### [registry](../data_model/registry)
-
-| | `data` | `fqdn` | `hive` | `hostname` | `image_path` | `key` | `new_content` | `pid` | `type` | `user` | `value` |
-|---|---|---|---|---|---|---|---|---|---|---|
-| `add` | |✓|✓| |✓|✓| |✓| | |✓|
-| `key_edit` | | | | | | | | | | | |
-| `remove` | |✓|✓| |✓|✓| |✓| | |✓|
-| `value_edit` | | | | | | | | | | | |
-
-### [thread](../data_model/thread)
-
-| | `hostname` | `src_pid` | `src_tid` | `stack_base` | `stack_limit` | `start_address` | `start_function` | `start_module` | `start_module_name` | `tgt_pid` | `tgt_tid` | `uid` | `user` | `user_stack_base` | `user_stack_limit` |
-|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
-| `create` | ✓|✓| | | |✓|✓|✓| |✓|✓| | | | |
-| `remote_create` | ✓|✓| | | |✓|✓|✓| |✓|✓| | | | |
-| `suspend` | | | | | | | | | | | | | | | |
-| `terminate` | | | | | | | | | | | | | | | |
-
@@ -95,6 +95,7 @@ Sysmon is a freely available program from Microsoft that is provided as part of
- [CAR-2014-12-001: Remotely Launched Executables via WMI](../analytics/CAR-2014-12-001)
- [CAR-2016-03-001: Host Discovery Commands](../analytics/CAR-2016-03-001)
- [CAR-2016-03-002: Create Remote Process via WMIC](../analytics/CAR-2016-03-002)
+ - [CAR-2016-04-002: User Activity from Clearing Event Logs](../analytics/CAR-2016-04-002)
- [CAR-2019-04-001: UAC Bypass](../analytics/CAR-2019-04-001)
- [CAR-2019-04-002: Generic Regsvr32](../analytics/CAR-2019-04-002)
- [CAR-2019-04-003: Squiblydoo](../analytics/CAR-2019-04-003)
@@ -102,7 +103,6 @@ Sysmon is a freely available program from Microsoft that is provided as part of
- [CAR-2019-07-002: Lsass Process Dump via Procdump](../analytics/CAR-2019-07-002)
- [CAR-2019-08-001: Credential Dumping via Windows Task Manager](../analytics/CAR-2019-08-001)
- [CAR-2019-08-002: Active Directory Dumping via NTDSUtil](../analytics/CAR-2019-08-002)
- - [CAR-2020-04-001: Shadow Copy Deletion](../analytics/CAR-2020-04-001)
- [CAR-2020-08-001: NTFS Alternate Data Stream Execution - System Utilities](../analytics/CAR-2020-08-001)
- [CAR-2020-08-002: NTFS Alternate Data Stream Execution - LOLBAS](../analytics/CAR-2020-08-002)
- [CAR-2020-09-001: Scheduled Task - FileAccess](../analytics/CAR-2020-09-001)
@@ -124,7 +124,7 @@ Sysmon is a freely available program from Microsoft that is provided as part of
- [CAR-2021-01-006: Unusual Child Process spawned using DDE exploit](../analytics/CAR-2021-01-006)
- [CAR-2021-01-007: Detecting Tampering of Windows Defender Command Prompt](../analytics/CAR-2021-01-007)
- [CAR-2021-01-008: Disable UAC](../analytics/CAR-2021-01-008)
- - [CAR-2021-01-009: Detecting Shadow Copy Deletion via Vssadmin.exe](../analytics/CAR-2021-01-009)
+ - [CAR-2021-01-009: Detecting Shadow Copy Deletion or Resize](../analytics/CAR-2021-01-009)
- [CAR-2021-02-002: Get System Elevation](../analytics/CAR-2021-02-002)
- [CAR-2021-04-001: Common Windows Process Masquerading](../analytics/CAR-2021-04-001)
- [CAR-2021-05-001: Attempt To Add Certificate To Untrusted Store](../analytics/CAR-2021-05-001)
@@ -136,3 +136,8 @@ Sysmon is a freely available program from Microsoft that is provided as part of
- [CAR-2021-05-008: Certutil exe certificate extraction](../analytics/CAR-2021-05-008)
- [CAR-2021-05-009: CertUtil With Decode Argument](../analytics/CAR-2021-05-009)
- [CAR-2021-05-010: Create local admin accounts using net exe](../analytics/CAR-2021-05-010)
+ - [CAR-2021-11-001: Registry Edit with Creation of SafeDllSearchMode Key Set to 0](../analytics/CAR-2021-11-001)
+ - [CAR-2021-11-002: Registry Edit with Modification of Userinit, Shell or Notify](../analytics/CAR-2021-11-002)
+ - [CAR-2021-12-001: Scheduled Task Creation or Modification Containing Suspicious Scripts, Extensions or User Writable Paths](../analytics/CAR-2021-12-001)
+ - [CAR-2021-12-002: Modification of Default Startup Folder in the Registry Key 'Common Startup'](../analytics/CAR-2021-12-002)
+ - [CAR-2022-03-001: Disable Windows Event Logging](../analytics/CAR-2022-03-001)
diff --git a/docs/sensors/sysmon_11.0.md b/docs/sensors/sysmon_11.0.md
index 6d8b7af8..bf5db123 100755
--- a/docs/sensors/sysmon_11.0.md
+++ b/docs/sensors/sysmon_11.0.md
@@ -14,12 +14,23 @@ Sysmon is a freely available program from Microsoft that is provided as part of
## Data Model Coverage
-### [driver](../data_model/driver)
+### [thread](../data_model/thread)
-| | `base_address` | `fqdn` | `hostname` | `image_path` | `md5_hash` | `module_name` | `pid` | `sha1_hash` | `sha256_hash` | `signature_valid` | `signer` |
+| | `hostname` | `src_pid` | `src_tid` | `stack_base` | `stack_limit` | `start_address` | `start_function` | `start_module` | `start_module_name` | `tgt_pid` | `tgt_tid` | `uid` | `user` | `user_stack_base` | `user_stack_limit` |
+|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
+| `create` | ✓|✓| | | |✓|✓|✓| |✓|✓| | | | |
+| `remote_create` | ✓|✓| | | |✓|✓|✓| |✓|✓| | | | |
+| `suspend` | | | | | | | | | | | | | | | |
+| `terminate` | | | | | | | | | | | | | | | |
+
+### [registry](../data_model/registry)
+
+| | `data` | `fqdn` | `hive` | `hostname` | `image_path` | `key` | `new_content` | `pid` | `type` | `user` | `value` |
|---|---|---|---|---|---|---|---|---|---|---|
-| `load` | |✓| |✓|✓| | |✓|✓| |✓|
-| `unload` | | | | | | | | | | | |
+| `add` | |✓|✓| |✓|✓| |✓| | |✓|
+| `key_edit` | | | | | | | | | | | |
+| `remove` | |✓|✓| |✓|✓| |✓| | |✓|
+| `value_edit` | | | | | | | | | | | |
### [file](../data_model/file)
@@ -33,6 +44,13 @@ Sysmon is a freely available program from Microsoft that is provided as part of
| `timestomp` | | |✓| | |✓|✓| | | |✓| | | | | | |✓| |✓| | | | | | |
| `write` | | | | | | | | | | | | | | | | | | | | | | | | | | |
+### [driver](../data_model/driver)
+
+| | `base_address` | `fqdn` | `hostname` | `image_path` | `md5_hash` | `module_name` | `pid` | `sha1_hash` | `sha256_hash` | `signature_valid` | `signer` |
+|---|---|---|---|---|---|---|---|---|---|---|
+| `load` | |✓| |✓|✓| | |✓|✓| |✓|
+| `unload` | | | | | | | | | | | |
+
### [flow](../data_model/flow)
| | `application_protocol` | `content` | `dest_fqdn` | `dest_hostname` | `dest_ip` | `dest_port` | `end_time` | `exe` | `fqdn` | `hostname` | `image_path` | `in_bytes` | `network_direction` | `out_bytes` | `packet_count` | `pid` | `ppid` | `proto_info` | `src_fqdn` | `src_hostname` | `src_ip` | `src_port` | `start_time` | `tcp_flags` | `transport_protocol` | `uid` | `user` |
@@ -49,24 +67,6 @@ Sysmon is a freely available program from Microsoft that is provided as part of
| `create` | | |✓|✓| | |✓| | |✓|✓|✓|✓| | |✓|✓|✓|✓|✓| | |✓| | | | | |✓|
| `terminate` | | | | | | |✓| | |✓| | | | | | |✓| | | | | | | | | | | | |
-### [registry](../data_model/registry)
-
-| | `data` | `fqdn` | `hive` | `hostname` | `image_path` | `key` | `new_content` | `pid` | `type` | `user` | `value` |
-|---|---|---|---|---|---|---|---|---|---|---|
-| `add` | |✓|✓| |✓|✓| |✓| | |✓|
-| `key_edit` | | | | | | | | | | | |
-| `remove` | |✓|✓| |✓|✓| |✓| | |✓|
-| `value_edit` | | | | | | | | | | | |
-
-### [thread](../data_model/thread)
-
-| | `hostname` | `src_pid` | `src_tid` | `stack_base` | `stack_limit` | `start_address` | `start_function` | `start_module` | `start_module_name` | `tgt_pid` | `tgt_tid` | `uid` | `user` | `user_stack_base` | `user_stack_limit` |
-|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
-| `create` | ✓|✓| | | |✓|✓|✓| |✓|✓| | | | |
-| `remote_create` | ✓|✓| | | |✓|✓|✓| |✓|✓| | | | |
-| `suspend` | | | | | | | | | | | | | | | |
-| `terminate` | | | | | | | | | | | | | | | |
-
@@ -95,6 +95,7 @@ Sysmon is a freely available program from Microsoft that is provided as part of
- [CAR-2014-12-001: Remotely Launched Executables via WMI](../analytics/CAR-2014-12-001)
- [CAR-2016-03-001: Host Discovery Commands](../analytics/CAR-2016-03-001)
- [CAR-2016-03-002: Create Remote Process via WMIC](../analytics/CAR-2016-03-002)
+ - [CAR-2016-04-002: User Activity from Clearing Event Logs](../analytics/CAR-2016-04-002)
- [CAR-2019-04-001: UAC Bypass](../analytics/CAR-2019-04-001)
- [CAR-2019-04-002: Generic Regsvr32](../analytics/CAR-2019-04-002)
- [CAR-2019-04-003: Squiblydoo](../analytics/CAR-2019-04-003)
@@ -102,7 +103,6 @@ Sysmon is a freely available program from Microsoft that is provided as part of
- [CAR-2019-07-002: Lsass Process Dump via Procdump](../analytics/CAR-2019-07-002)
- [CAR-2019-08-001: Credential Dumping via Windows Task Manager](../analytics/CAR-2019-08-001)
- [CAR-2019-08-002: Active Directory Dumping via NTDSUtil](../analytics/CAR-2019-08-002)
- - [CAR-2020-04-001: Shadow Copy Deletion](../analytics/CAR-2020-04-001)
- [CAR-2020-08-001: NTFS Alternate Data Stream Execution - System Utilities](../analytics/CAR-2020-08-001)
- [CAR-2020-08-002: NTFS Alternate Data Stream Execution - LOLBAS](../analytics/CAR-2020-08-002)
- [CAR-2020-09-001: Scheduled Task - FileAccess](../analytics/CAR-2020-09-001)
@@ -124,7 +124,7 @@ Sysmon is a freely available program from Microsoft that is provided as part of
- [CAR-2021-01-006: Unusual Child Process spawned using DDE exploit](../analytics/CAR-2021-01-006)
- [CAR-2021-01-007: Detecting Tampering of Windows Defender Command Prompt](../analytics/CAR-2021-01-007)
- [CAR-2021-01-008: Disable UAC](../analytics/CAR-2021-01-008)
- - [CAR-2021-01-009: Detecting Shadow Copy Deletion via Vssadmin.exe](../analytics/CAR-2021-01-009)
+ - [CAR-2021-01-009: Detecting Shadow Copy Deletion or Resize](../analytics/CAR-2021-01-009)
- [CAR-2021-02-002: Get System Elevation](../analytics/CAR-2021-02-002)
- [CAR-2021-04-001: Common Windows Process Masquerading](../analytics/CAR-2021-04-001)
- [CAR-2021-05-001: Attempt To Add Certificate To Untrusted Store](../analytics/CAR-2021-05-001)
@@ -137,3 +137,8 @@ Sysmon is a freely available program from Microsoft that is provided as part of
- [CAR-2021-05-008: Certutil exe certificate extraction](../analytics/CAR-2021-05-008)
- [CAR-2021-05-009: CertUtil With Decode Argument](../analytics/CAR-2021-05-009)
- [CAR-2021-05-010: Create local admin accounts using net exe](../analytics/CAR-2021-05-010)
+ - [CAR-2021-11-001: Registry Edit with Creation of SafeDllSearchMode Key Set to 0](../analytics/CAR-2021-11-001)
+ - [CAR-2021-11-002: Registry Edit with Modification of Userinit, Shell or Notify](../analytics/CAR-2021-11-002)
+ - [CAR-2021-12-001: Scheduled Task Creation or Modification Containing Suspicious Scripts, Extensions or User Writable Paths](../analytics/CAR-2021-12-001)
+ - [CAR-2021-12-002: Modification of Default Startup Folder in the Registry Key 'Common Startup'](../analytics/CAR-2021-12-002)
+ - [CAR-2022-03-001: Disable Windows Event Logging](../analytics/CAR-2022-03-001)
diff --git a/docs/sensors/sysmon_13.md b/docs/sensors/sysmon_13.md
index 640337b1..40ed48d5 100644
--- a/docs/sensors/sysmon_13.md
+++ b/docs/sensors/sysmon_13.md
@@ -14,12 +14,23 @@ Sysmon is a freely available program from Microsoft that is provided as part of
## Data Model Coverage
-### [driver](../data_model/driver)
+### [thread](../data_model/thread)
-| | `base_address` | `fqdn` | `hostname` | `image_path` | `md5_hash` | `module_name` | `pid` | `sha1_hash` | `sha256_hash` | `signature_valid` | `signer` |
+| | `hostname` | `src_pid` | `src_tid` | `stack_base` | `stack_limit` | `start_address` | `start_function` | `start_module` | `start_module_name` | `tgt_pid` | `tgt_tid` | `uid` | `user` | `user_stack_base` | `user_stack_limit` |
+|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
+| `create` | ✓|✓| | | |✓|✓|✓| |✓|✓|✓| | | |
+| `remote_create` | ✓|✓| | | |✓|✓|✓| |✓|✓|✓| | | |
+| `suspend` | | | | | | | | | | | | | | | |
+| `terminate` | | | | | | | | | | | | | | | |
+
+### [registry](../data_model/registry)
+
+| | `data` | `fqdn` | `hive` | `hostname` | `image_path` | `key` | `new_content` | `pid` | `type` | `user` | `value` |
|---|---|---|---|---|---|---|---|---|---|---|
-| `load` | |✓| |✓|✓| | |✓|✓|✓|✓|
-| `unload` | | | | | | | | | | | |
+| `add` | ✓|✓|✓| |✓|✓| |✓| | |✓|
+| `key_edit` | |✓|✓| |✓|✓|✓|✓| | |✓|
+| `remove` | |✓|✓| |✓|✓| |✓| | |✓|
+| `value_edit` | |✓|✓| |✓|✓|✓|✓| | |✓|
### [file](../data_model/file)
@@ -33,6 +44,13 @@ Sysmon is a freely available program from Microsoft that is provided as part of
| `timestomp` | | |✓| | |✓|✓| | | |✓| | | | | | |✓| |✓| | | | | | |
| `write` | | | | | | | | | | | | | | | | | | | | | | | | | | |
+### [driver](../data_model/driver)
+
+| | `base_address` | `fqdn` | `hostname` | `image_path` | `md5_hash` | `module_name` | `pid` | `sha1_hash` | `sha256_hash` | `signature_valid` | `signer` |
+|---|---|---|---|---|---|---|---|---|---|---|
+| `load` | |✓| |✓|✓| | |✓|✓|✓|✓|
+| `unload` | | | | | | | | | | | |
+
### [flow](../data_model/flow)
| | `application_protocol` | `content` | `dest_fqdn` | `dest_hostname` | `dest_ip` | `dest_port` | `end_time` | `exe` | `fqdn` | `hostname` | `image_path` | `in_bytes` | `network_direction` | `out_bytes` | `packet_count` | `pid` | `ppid` | `proto_info` | `src_fqdn` | `src_hostname` | `src_ip` | `src_port` | `start_time` | `tcp_flags` | `transport_protocol` | `uid` | `user` |
@@ -49,24 +67,6 @@ Sysmon is a freely available program from Microsoft that is provided as part of
| `create` | | |✓|✓| | |✓| | |✓|✓|✓|✓| | |✓|✓|✓| |✓|✓| | | | | | | |✓|
| `terminate` | | | | | | |✓| | |✓| | | | | | |✓| | | | | | | | | | | | |
-### [registry](../data_model/registry)
-
-| | `data` | `fqdn` | `hive` | `hostname` | `image_path` | `key` | `new_content` | `pid` | `type` | `user` | `value` |
-|---|---|---|---|---|---|---|---|---|---|---|
-| `add` | ✓|✓|✓| |✓|✓| |✓| | |✓|
-| `key_edit` | |✓|✓| |✓|✓|✓|✓| | |✓|
-| `remove` | |✓|✓| |✓|✓| |✓| | |✓|
-| `value_edit` | |✓|✓| |✓|✓|✓|✓| | |✓|
-
-### [thread](../data_model/thread)
-
-| | `hostname` | `src_pid` | `src_tid` | `stack_base` | `stack_limit` | `start_address` | `start_function` | `start_module` | `start_module_name` | `tgt_pid` | `tgt_tid` | `uid` | `user` | `user_stack_base` | `user_stack_limit` |
-|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
-| `create` | ✓|✓| | | |✓|✓|✓| |✓|✓|✓| | | |
-| `remote_create` | ✓|✓| | | |✓|✓|✓| |✓|✓|✓| | | |
-| `suspend` | | | | | | | | | | | | | | | |
-| `terminate` | | | | | | | | | | | | | | | |
-
@@ -95,6 +95,7 @@ Sysmon is a freely available program from Microsoft that is provided as part of
- [CAR-2014-12-001: Remotely Launched Executables via WMI](../analytics/CAR-2014-12-001)
- [CAR-2016-03-001: Host Discovery Commands](../analytics/CAR-2016-03-001)
- [CAR-2016-03-002: Create Remote Process via WMIC](../analytics/CAR-2016-03-002)
+ - [CAR-2016-04-002: User Activity from Clearing Event Logs](../analytics/CAR-2016-04-002)
- [CAR-2019-04-001: UAC Bypass](../analytics/CAR-2019-04-001)
- [CAR-2019-04-002: Generic Regsvr32](../analytics/CAR-2019-04-002)
- [CAR-2019-04-003: Squiblydoo](../analytics/CAR-2019-04-003)
@@ -102,7 +103,6 @@ Sysmon is a freely available program from Microsoft that is provided as part of
- [CAR-2019-07-002: Lsass Process Dump via Procdump](../analytics/CAR-2019-07-002)
- [CAR-2019-08-001: Credential Dumping via Windows Task Manager](../analytics/CAR-2019-08-001)
- [CAR-2019-08-002: Active Directory Dumping via NTDSUtil](../analytics/CAR-2019-08-002)
- - [CAR-2020-04-001: Shadow Copy Deletion](../analytics/CAR-2020-04-001)
- [CAR-2020-08-001: NTFS Alternate Data Stream Execution - System Utilities](../analytics/CAR-2020-08-001)
- [CAR-2020-08-002: NTFS Alternate Data Stream Execution - LOLBAS](../analytics/CAR-2020-08-002)
- [CAR-2020-09-001: Scheduled Task - FileAccess](../analytics/CAR-2020-09-001)
@@ -124,7 +124,7 @@ Sysmon is a freely available program from Microsoft that is provided as part of
- [CAR-2021-01-006: Unusual Child Process spawned using DDE exploit](../analytics/CAR-2021-01-006)
- [CAR-2021-01-007: Detecting Tampering of Windows Defender Command Prompt](../analytics/CAR-2021-01-007)
- [CAR-2021-01-008: Disable UAC](../analytics/CAR-2021-01-008)
- - [CAR-2021-01-009: Detecting Shadow Copy Deletion via Vssadmin.exe](../analytics/CAR-2021-01-009)
+ - [CAR-2021-01-009: Detecting Shadow Copy Deletion or Resize](../analytics/CAR-2021-01-009)
- [CAR-2021-02-002: Get System Elevation](../analytics/CAR-2021-02-002)
- [CAR-2021-04-001: Common Windows Process Masquerading](../analytics/CAR-2021-04-001)
- [CAR-2021-05-001: Attempt To Add Certificate To Untrusted Store](../analytics/CAR-2021-05-001)
@@ -137,3 +137,8 @@ Sysmon is a freely available program from Microsoft that is provided as part of
- [CAR-2021-05-008: Certutil exe certificate extraction](../analytics/CAR-2021-05-008)
- [CAR-2021-05-009: CertUtil With Decode Argument](../analytics/CAR-2021-05-009)
- [CAR-2021-05-010: Create local admin accounts using net exe](../analytics/CAR-2021-05-010)
+ - [CAR-2021-11-001: Registry Edit with Creation of SafeDllSearchMode Key Set to 0](../analytics/CAR-2021-11-001)
+ - [CAR-2021-11-002: Registry Edit with Modification of Userinit, Shell or Notify](../analytics/CAR-2021-11-002)
+ - [CAR-2021-12-001: Scheduled Task Creation or Modification Containing Suspicious Scripts, Extensions or User Writable Paths](../analytics/CAR-2021-12-001)
+ - [CAR-2021-12-002: Modification of Default Startup Folder in the Registry Key 'Common Startup'](../analytics/CAR-2021-12-002)
+ - [CAR-2022-03-001: Disable Windows Event Logging](../analytics/CAR-2022-03-001)
diff --git a/scripts/generate_analytics.py b/scripts/generate_analytics.py
index f1c8c3c8..31d9d383 100755
--- a/scripts/generate_analytics.py
+++ b/scripts/generate_analytics.py
@@ -184,7 +184,7 @@
none_sub_str = "(N/A - technique only)"
else:
none_str = "(N/A - see below)"
- if len(sub_bucket.keys()) > 1:
+ if len(sub_bucket.keys()) > 1 or len(none_bucket) > 0:
num_rows = len(sub_bucket.keys()) + 1
tid_url = "https://attack.mitre.org/techniques/{0}/".format(tid)
tid_link = '{1}: {2}'.format(tid_url,tid,techniques[tid])
@@ -192,7 +192,7 @@
if none_sub_str == "(N/A - technique only)":
subtechnique_table += tr_template.format(rowspan,tid_link,none_sub_str,none_str)
else:
- subtechnique_table += tr_tech_template.format(rowspan,tid_link)
+ subtechnique_table += tr_tech_template.format(rowspan,tid_link)
# Write the subtechniques to the table
if sub_bucket:
for sub_tid, car_list in sub_bucket.items():
@@ -210,11 +210,9 @@
sub_link = '{1}: {2}'.format(sub_url,sub_tid,techniques[sub_tid])
subtechnique_table += tr_template.format("",tid_link,sub_link,sub_str)
elif len(sub_bucket.keys()) == 1:
- tid_url = "https://attack.mitre.org/techniques/{0}/".format(tid)
sub_url = "https://attack.mitre.org/techniques/{0}/{1}/".format(sub_tid.split(".")[0],sub_tid.split(".")[1])
- tid_link = '{1}: {2}'.format(tid_url,tid,techniques[tid])
sub_link = '{1}: {2}'.format(sub_url,sub_tid,techniques[sub_tid])
- subtechnique_table += tr_template.format("",tid_link,sub_link,sub_str)
+ subtechnique_table += tr_sub_template.format(sub_link,sub_str)
else:
sub_url = "https://attack.mitre.org/techniques/{0}/{1}/".format(sub_tid.split(".")[0],sub_tid.split(".")[1])
sub_link = '{1}: {2}'.format(sub_url,sub_tid,techniques[sub_tid])
diff --git a/scripts/generate_attack_nav_layer.py b/scripts/generate_attack_nav_layer.py
index 0fba73be..4f8cb3d3 100644
--- a/scripts/generate_attack_nav_layer.py
+++ b/scripts/generate_attack_nav_layer.py
@@ -6,7 +6,7 @@
import glob
import yaml
import sys
-from os import path
+from os import path, makedirs
# Static ATT&CK Navigator layer JSON fields
VERSION = "3.0"
@@ -67,6 +67,7 @@ def addMapping(technique, name, attack_mappings):
layer_json["techniques"].append(technique)
# Output JSON to docs directory
+makedirs('../docs/car_attack', exist_ok=True)
outfile = open("../docs/car_attack/car_attack.json","w")
json.dump(layer_json, outfile, indent=4)
outfile.close()
diff --git a/scripts/generate_sensors.py b/scripts/generate_sensors.py
index cc2b38aa..5200fcf7 100755
--- a/scripts/generate_sensors.py
+++ b/scripts/generate_sensors.py
@@ -1,5 +1,7 @@
"""This script generates the sensor portion of the site, including coverage,
for each YAML sensor mapping file.
+NOTE: This script should be run after `generate_analytics.py` as it is
+dependent on files in /docs/analytics existing and being up to date.
"""
import json
@@ -181,9 +183,38 @@ def generateSensorsForAnalytics(analytics, sensor_dict):
sensor_template = Template(open('sensor_template.md').read())
# Generate the sensor page for each sensor
+makedirs('../docs/sensors', exist_ok=True)
for sensor in mappings:
sensor_tag = sensor['sensor_name'] + "_" + str(sensor['sensor_version'])
# Generate the markdown
markdown = sensor_template.render(sensor=sensor)
# Save to the sensors directory
open('../docs/sensors/{}.md'.format(sensor_tag.lower()), 'w').write(markdown)
+
+# Generate index file
+index_content = '''---
+title: "Sensors"
+---
+
+Sensors are tools that collect data that can be used to run analytics.
+
+CAR currently has a limited number of sensors mapped to the CAR [Data Model](../data_model). They are:
+{}'''.format(
+ '\n'.join(
+ (
+ '* [{sensor_name} ({sensor_version})]({sensor_name_lower}_{sensor_version})'.format(
+ sensor_name=sensor['sensor_name'],
+ sensor_name_lower=sensor['sensor_name'].lower(),
+ sensor_version=sensor['sensor_version']
+ ) for sensor in sorted(
+ mappings,
+ key=lambda sensor: (
+ sensor['sensor_name'].lower(),
+ sensor['sensor_version']
+ )
+ )
+ )
+ )
+ )
+with open('../docs/sensors/index.md', 'w') as index_file:
+ index_file.write(index_content)
diff --git a/docs/sensors/auditd_2.8.yaml b/sensors/auditd_2.8.yaml
similarity index 94%
rename from docs/sensors/auditd_2.8.yaml
rename to sensors/auditd_2.8.yaml
index 5e9f50fa..2431fbfe 100755
--- a/docs/sensors/auditd_2.8.yaml
+++ b/sensors/auditd_2.8.yaml
@@ -3,7 +3,8 @@ sensor_name: auditd
sensor_version: 2.8
sensor_developer: Red Hat
sensor_url: 'https://people.redhat.com/sgrubb/audit/'
-sensor_description: 'auditd is the userspace component to the Linux Auditing System. It's responsible for writing audit records to the disk'
+sensor_description: |
+ auditd is the userspace component to the Linux Auditing System. It's responsible for writing audit records to the disk
mappings:
- object: file
action: create
@@ -133,4 +134,4 @@ mappings:
- value
- data
other_coverage:
- - 'N/A'
\ No newline at end of file
+ - 'N/A'