Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Generate script improvements and runs #166

Merged
merged 9 commits into from
Feb 27, 2023
3 changes: 1 addition & 2 deletions docs/analytics/CAR-2013-01-002/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,8 +8,7 @@ analytic_type: Situational Awareness, TTP
contributors: MITRE
applicable_platforms: Windows
---

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please confirm if the double break is what is desired over the newlines that were here - this is a change from the template file that's now been consistently applied.


<br><br>
The Sysinternals tool [Autoruns](../sensors/autoruns) checks the registry and file system for known identify persistence mechanisms. It will output any tools identified, including built-in or added-on Microsoft functionality and third party software. Many of these locations are known by adversaries and used to obtain [Persistence](https://attack.mitre.org/tactics/TA0003). Running Autoruns periodically in an environment makes it possible to collect and monitor its output for differences, which may include the removal or addition of persistent tools. Depending on the persistence mechanism and location, legitimate software may be more likely to make changes than an adversary tool. Thus, this analytic may result in significant noise in a highly dynamic environment. While Autoruns is a convenient method to scan for programs using persistence mechanisms its scanning nature does not conform well to streaming based analytics. This analytic could be replaced with one that draws from sensors that collect registry and file information if streaming analytics are desired.

Utilizes the Sysinternals autoruns tool (ignoring validated Microsoft entries). Primarily not a detection analytic by itself but through analysis of results by an analyst can be used for such. Building another analytic on top of this one identifying unusual entries would likely be a beneficial alternative.
Expand Down
3 changes: 1 addition & 2 deletions docs/analytics/CAR-2013-01-003/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,8 +8,7 @@ analytic_type: Situational Awareness
contributors: MITRE
applicable_platforms: N/A
---


<br><br>
[Server Message Block](https://en.wikipedia.org/wiki/Server_Message Block) (SMB) is used by Windows to allow for file, pipe, and printer sharing over port 445/tcp. It allows for enumerating, and reading from and writing to file shares for a remote computer. Although it is heavily used by Windows servers for legitimate purposes and by users for file and printer sharing, many adversaries also use SMB to achieve [Lateral Movement](https://attack.mitre.org/tactics/TA0008). Looking at this activity more closely to obtain an adequate sense of situational awareness may make it possible to detect adversaries moving between hosts in a way that deviates from normal activity. Because SMB traffic is heavy in many environments, this analytic may be difficult to turn into something that can be used to quickly detect an APT. In some cases, it may make more sense to run this analytic in a forensic fashion. Looking through and filtering its output after an intrusion has been discovered may be helpful in identifying the scope of compromise.

### Output Description
Expand Down
3 changes: 1 addition & 2 deletions docs/analytics/CAR-2013-02-003/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,8 +8,7 @@ analytic_type: Situational Awareness
contributors: MITRE
applicable_platforms: Windows
---


<br><br>
The Windows [Command Prompt](https://en.wikipedia.org/wiki/cmd.exe) (`cmd.exe`) is a utility that provides a command line interface to Windows operating systems. It provides the ability to run additional programs and also has several built-in commands such as `dir`, `copy`, `mkdir`, and `type`, as well as batch scripts (`.bat`). Typically, when a user runs a command prompt, the parent process is `explorer.exe` or another instance of the prompt. There may be automated programs, logon scripts, or administrative tools that launch instances of the command prompt in order to run scripts or other built-in commands. Spawning the process `cmd.exe` from certain parents may be more indicative of malice. For example, if Adobe Reader or Outlook launches a command shell, this may suggest that a malicious document has been loaded and should be investigated. Thus, by looking for abnormal parent processes of `cmd.exe`, it may be possible to detect adversaries.


Expand Down
3 changes: 1 addition & 2 deletions docs/analytics/CAR-2013-02-008/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,8 +8,7 @@ analytic_type: Situational Awareness
contributors: MITRE
applicable_platforms: Windows, Linux, macOS
---


<br><br>
Multiple users logged into a single machine at the same time, or even within the same hour, do not typically occur in networks we have observed.

Logon events are Windows Event Code 4624 for Windows Vista and above, 518 for pre-Vista. Logoff events are 4634 for Windows Vista and above, 538 for pre-Vista.
Expand Down
3 changes: 1 addition & 2 deletions docs/analytics/CAR-2013-02-012/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,8 +8,7 @@ analytic_type: Situational Awareness
contributors: MITRE
applicable_platforms: Windows, Linux, macOS
---


<br><br>
Most users use only one or two machines during the normal course of business. User accounts that log in to multiple machines, especially over a short period of time, may be compromised. Remote logins among multiple machines may be an indicator of [Lateral Movement](https://attack.mitre.org/tactics/TA0008).

Certain users will likely appear as being logged into several machines and may need to be "whitelisted." Such users would include network admins or user names that are common to many hosts.
Expand Down
3 changes: 1 addition & 2 deletions docs/analytics/CAR-2013-03-001/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,8 +8,7 @@ analytic_type: TTP
contributors: MITRE
applicable_platforms: Windows
---


<br><br>
Registry modifications are often essential in establishing persistence via known Windows mechanisms. Many legitimate modifications are done graphically via `regedit.exe` or by using the corresponding channels, or even calling the Registry APIs directly. The built-in utility `reg.exe` provides a [command-line interface](https://en.wikipedia.org/wiki/Command-line_interface) to the registry, so that queries and modifications can be performed from a shell, such as `cmd.exe`. When a user is responsible for these actions, the parent of `cmd.exe` will likely be `explorer.exe`. Occasionally, power users and administrators write scripts that do this behavior as well, but likely from a different process tree. These background scripts must be learned so they can be tuned out accordingly.

### Output Description
Expand Down
7 changes: 3 additions & 4 deletions docs/analytics/CAR-2013-04-002/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,8 +8,7 @@ analytic_type: TTP
contributors: MITRE
applicable_platforms: Windows, Linux, macOS
---


<br><br>
Certain commands are frequently used by malicious actors and infrequently used by normal users. By looking for execution of these commands in short periods of time, we can not only see when a malicious user was on the system but also get an idea of what they were doing.

Commands of interest:
Expand Down Expand Up @@ -60,7 +59,7 @@ The host on which the commands were executed, the time of execution, and what co
|[Hijack Execution Flow](https://attack.mitre.org/techniques/T1574/)|[Services Registry Permissions Weakness](https://attack.mitre.org/techniques/T1574/011/)|[Persistence](https://attack.mitre.org/tactics/TA0003/), [Privilege Escalation](https://attack.mitre.org/tactics/TA0004/)|Low|
|[Remote System Discovery](https://attack.mitre.org/techniques/T1018/)|N/A|[Discovery](https://attack.mitre.org/tactics/TA0007/)|Low|
|[System Services](https://attack.mitre.org/techniques/T1569/)|[Service Execution](https://attack.mitre.org/techniques/T1569/002/)|[Execution](https://attack.mitre.org/tactics/TA0002/)|Low|
|[Scheduled Task/Job](https://attack.mitre.org/techniques/T1053/)|[At (Windows)](https://attack.mitre.org/techniques/T1053/002/), [Scheduled Task](https://attack.mitre.org/techniques/T1053/005/)|[Persistence](https://attack.mitre.org/tactics/TA0003/), [Privilege Escalation](https://attack.mitre.org/tactics/TA0004/), [Execution](https://attack.mitre.org/tactics/TA0002/)|Low|
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please confirm if just using 'At', i.e. what's listed in all the source files, is sufficient as opposed to 'At (Windows)'. I'm not sure atm how we would get that information in there - as far as I can tell it seems to have been manually added.

|[Scheduled Task/Job](https://attack.mitre.org/techniques/T1053/)|[At](https://attack.mitre.org/techniques/T1053/002/), [Scheduled Task](https://attack.mitre.org/techniques/T1053/005/)|[Persistence](https://attack.mitre.org/tactics/TA0003/), [Privilege Escalation](https://attack.mitre.org/tactics/TA0004/), [Execution](https://attack.mitre.org/tactics/TA0002/)|Low|
|[Scheduled Transfer](https://attack.mitre.org/techniques/T1029/)|N/A|[Exfiltration](https://attack.mitre.org/tactics/TA0010/)|Low|
|[System Owner/User Discovery](https://attack.mitre.org/techniques/T1033/)|N/A|[Discovery](https://attack.mitre.org/tactics/TA0007/)|Low|
|[System Service Discovery](https://attack.mitre.org/techniques/T1007/)|N/A|[Discovery](https://attack.mitre.org/tactics/TA0007/)|Low|
Expand All @@ -69,7 +68,7 @@ The host on which the commands were executed, the time of execution, and what co
|[System Network Configuration Discovery](https://attack.mitre.org/techniques/T1016/)|N/A|[Discovery](https://attack.mitre.org/tactics/TA0007/)|Low|
|[Application Window Discovery](https://attack.mitre.org/techniques/T1010/)|N/A|[Discovery](https://attack.mitre.org/tactics/TA0007/)|Low|
|[Software Discovery](https://attack.mitre.org/techniques/T1518/)|[Security Software Discovery](https://attack.mitre.org/techniques/T1518/001/)|[Discovery](https://attack.mitre.org/tactics/TA0007/)|Low|
|[Network Service Scanning](https://attack.mitre.org/techniques/T1046/)|N/A|[Discovery](https://attack.mitre.org/tactics/TA0007/)|Low|
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please confirm that changes to strings like this are correct (Scanning -> Discovery). There are many other CAR files with similar changes.

|[Network Service Discovery](https://attack.mitre.org/techniques/T1046/)|N/A|[Discovery](https://attack.mitre.org/tactics/TA0007/)|Low|
|[Impair Defenses](https://attack.mitre.org/techniques/T1562/)|[Disable or Modify Tools](https://attack.mitre.org/techniques/T1562/001/), [Indicator Blocking](https://attack.mitre.org/techniques/T1562/006/)|[Defense Evasion](https://attack.mitre.org/tactics/TA0005/)|Low|
|[Account Manipulation](https://attack.mitre.org/techniques/T1098/)|N/A|[Credential Access](https://attack.mitre.org/tactics/TA0006/)|Low|
|[Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059/)|[Visual Basic](https://attack.mitre.org/techniques/T1059/005/)|[Execution](https://attack.mitre.org/tactics/TA0002/)|Moderate|
Expand Down
3 changes: 1 addition & 2 deletions docs/analytics/CAR-2013-05-002/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,8 +8,7 @@ analytic_type: TTP
contributors: MITRE
applicable_platforms: Windows
---


<br><br>
In Windows, files should never execute out of certain directory locations. Any of these locations may exist for a variety of reasons, and executables may be present in the directory but should not execute. As a result, some defenders make the mistake of ignoring these directories and assuming that a process will never run from one. There are known TTPs that have taken advantage of this fact to go undetected. This fact should inform defenders to monitor these directories more closely, knowing that they should never contain running processes.

Monitors the directories
Expand Down
3 changes: 1 addition & 2 deletions docs/analytics/CAR-2013-05-003/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,8 +8,7 @@ analytic_type: Situational Awareness, TTP
contributors: MITRE
applicable_platforms: Windows, Linux, macOS
---


<br><br>
As described in [CAR-2013-01-003](../CAR-2013-01-003), SMB provides a means of remotely managing a file system. Adversaries often use SMB to move laterally to a host. SMB is commonly used to upload files. It may be used for staging in [Exfiltration](https://attack.mitre.org/tactics/TA0010) or as a [Lateral Movement](https://attack.mitre.org/tactics/TA0008) technique. Unlike SMB Reads, SMB Write requests typically require an additional level of access, resulting in less activity. Focusing on SMB Write activity narrows the field to find techniques that actively change remote hosts, instead of passively reading files.


Expand Down
5 changes: 2 additions & 3 deletions docs/analytics/CAR-2013-05-004/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,8 +8,7 @@ analytic_type: TTP
contributors: MITRE
applicable_platforms: Windows
---


<br><br>
In order to gain [persistence](https://attack.mitre.org/tactics/TA0003/), [privilege escalation](https://attack.mitre.org/tactics/TA0004/), or [remote execution](https://attack.mitre.org/tactics/TA0002/), an adversary may use the Windows built-in command AT (at.exe) to [schedule a command](https://attack.mitre.org/techniques/T1053/002) to be run at a specified time, date, and even host. This method has been used by adversaries and administrators alike. Its use may lead to detection of compromised hosts and compromised users if it is used to move laterally.
The built-in Windows tool schtasks.exe ([CAR-2013-08-001](../CAR-2013-08-001)) offers greater flexibility when creating, modifying, and enumerating tasks. For these reasons, schtasks.exe is more commonly used by administrators, tools/scripts, and power users.

Expand All @@ -18,7 +17,7 @@ The built-in Windows tool schtasks.exe ([CAR-2013-08-001](../CAR-2013-08-001)) o

|Technique|Subtechnique(s)|Tactic(s)|Level of Coverage|
|---|---|---|---|
|[Scheduled Task/Job](https://attack.mitre.org/techniques/T1053/)|[At (Windows)](https://attack.mitre.org/techniques/T1053/002/)|[Execution](https://attack.mitre.org/tactics/TA0002/), [Persistence](https://attack.mitre.org/tactics/TA0003/), [Privilege Escalation](https://attack.mitre.org/tactics/TA0004/)|Moderate|
|[Scheduled Task/Job](https://attack.mitre.org/techniques/T1053/)|[At](https://attack.mitre.org/techniques/T1053/002/)|[Execution](https://attack.mitre.org/tactics/TA0002/), [Persistence](https://attack.mitre.org/tactics/TA0003/), [Privilege Escalation](https://attack.mitre.org/tactics/TA0004/)|Moderate|


### D3FEND Techniques
Expand Down
3 changes: 1 addition & 2 deletions docs/analytics/CAR-2013-05-005/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,8 +8,7 @@ analytic_type: TTP
contributors: MITRE
applicable_platforms: Windows, Linux, macOS
---


<br><br>
An adversary needs to gain access to other hosts to move throughout an environment. In many cases, this is a twofold process. First, a file is remotely written to a host via an SMB share (detected by [CAR-2013-05-003](../CAR-2013-05-003)). Then, a variety of [Execution](https://attack.mitre.org/tactics/TA0002) techniques can be used to remotely establish execution of the file or script. To detect this behavior, look for files that are written to a host over SMB and then later run directly as a process or in the command line arguments. SMB File Writes and Remote Execution may happen normally in an environment, but the combination of the two behaviors is less frequent and more likely to indicate adversarial activity.

This can possibly extend to more copy protocols in order to widen its reach, or it could be tuned more finely to focus on specific program run locations (e.g. `%SYSTEMROOT%\system32`) to gain a higher detection rate.
Expand Down
3 changes: 1 addition & 2 deletions docs/analytics/CAR-2013-05-009/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,8 +8,7 @@ analytic_type: TTP
contributors: MITRE
applicable_platforms: Windows, Linux, macOS
---


<br><br>
Executables are generally not renamed, thus a given hash of an executable should only have ever one name. Identifying instances where multiple process names share the same hash may find cases where tools are copied by attackers to different folders or hosts to [avoid detection](https://attack.mitre.org/tactics/TA0005).

Although this analytic was initially based on MD5 hashes, it is equally applicable to any hashing convention.
Expand Down
3 changes: 1 addition & 2 deletions docs/analytics/CAR-2013-07-001/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,8 +8,7 @@ analytic_type: TTP
contributors: MITRE
applicable_platforms: Windows, Linux, macOS
---


<br><br>
Malicious actors may rename built-in commands or external tools, such as those provided by SysInternals, to better [blend in](https://attack.mitre.org/tactics/TA0005) with the environment. In those cases, the file path name is arbitrary and may blend in well with the background. If the arguments are closely inspected, it may be possible to infer what tools are running and understand what an adversary is doing. When any legitimate software shares the same command lines, it must be whitelisted according to the expected parameters.

Any tool of interest with commonly known command line usage can be detecting by command line analysis. Known substrings of command lines include
Expand Down
3 changes: 1 addition & 2 deletions docs/analytics/CAR-2013-07-002/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,8 +8,7 @@ analytic_type: Situational Awareness, TTP
contributors: MITRE
applicable_platforms: N/A
---


<br><br>
The [Remote Desktop Protocol](https://attack.mitre.org/techniques/T1021/001) (RDP), built in to Microsoft operating systems, allows a user to remotely log in to the desktop of another host. It allows for interactive access of the running windows, and forwards key presses, mouse clicks, etc. Network administrators, power users, and end-users may use RDP for day-to-day operations. From an adversary's perspective, RDP provides a means to [laterally move](https://attack.mitre.org/tactics/TA0008) to a new host. Determining which RDP connections correspond to adversary activity can be a difficult problem in highly dynamic environments, but will be useful in identifying the scope of a compromise.

Remote Desktop can be detected in several ways
Expand Down
3 changes: 1 addition & 2 deletions docs/analytics/CAR-2013-07-005/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,8 +8,7 @@ analytic_type: TTP
contributors: MITRE
applicable_platforms: Windows, Linux, macOS
---


<br><br>
Before [exfiltrating data](https://attack.mitre.org/tactics/TA0010) that an adversary has [collected](https://attack.mitre.org/tactics/TA0009), it is very likely that a [compressed archive](https://attack.mitre.org/techniques/T1560) will be created, so that transfer times are minimized and fewer files are transmitted. There is variety between the tools used to compress data, but the command line usage and context of archiving tools, such as ZIP, RAR, and 7ZIP, should be monitored.

In addition to looking for RAR or 7z program names, command line usage of 7Zip or RAR can be detected with the flag usage of "`\* a \*`". This is helpful, as adversaries may change program names.
Expand Down
3 changes: 1 addition & 2 deletions docs/analytics/CAR-2013-08-001/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,8 +8,7 @@ analytic_type: TTP
contributors: MITRE
applicable_platforms: Windows
---


<br><br>
The Windows built-in tool `schtasks.exe` provides the creation, modification, and running of [scheduled tasks](https://attack.mitre.org/techniques/T1053) on a local or remote computer. It is provided as a more flexible alternative to `at.exe`, described in [CAR-2013-05-004](../CAR-2013-05-004). Although used by adversaries, the tool is also legitimately used by administrators, scripts, and software configurations. The scheduled tasks tool can be used to gain [Persistence](https://attack.mitre.org/tactics/TA0003) and can be used in combination with a [Lateral Movement](https://attack.mitre.org/tactics/TA0008) technique to remotely gain [execution](https://attack.mitre.org/tactics/TA0002). Additionally, the command has parameters to specify the user and password responsible for creating the task, as well as the user and password combination that the task will run as. The `/s` flag specifies the remote system on which the task should be scheduled, usually indicating [Lateral Movement](https://attack.mitre.org/tactics/TA0008).


Expand Down
3 changes: 1 addition & 2 deletions docs/analytics/CAR-2013-09-003/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,8 +8,7 @@ analytic_type: Situational Awareness
contributors: MITRE
applicable_platforms: N/A
---


<br><br>
Account usage within SMB can be used to identify compromised credentials, and the hosts accessed with them.

This analytic monitors SMB activity that deals with user activity rather than file activity.
Expand Down
3 changes: 1 addition & 2 deletions docs/analytics/CAR-2013-09-005/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,8 +8,7 @@ analytic_type: Detection
contributors: MITRE
applicable_platforms: Windows
---


<br><br>
New executables that are started as a service are suspicious. This analytic looks for anomalous service executables.


Expand Down
3 changes: 1 addition & 2 deletions docs/analytics/CAR-2013-10-001/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,8 +8,7 @@ analytic_type: Situational Awareness
contributors: MITRE
applicable_platforms: Windows, Linux, macOS
---


<br><br>
Monitoring logon and logoff events for hosts on the network is very important for situational awareness. This information can be used as an indicator of unusual activity as well as to corroborate activity seen elsewhere.

Could be applied to a number of different types of monitoring depending on what information is desired. Some use cases include monitoring for all remote connections and building login timelines for users.
Expand Down
Loading