Giter Club home page Giter Club logo

center-for-threat-informed-defense / summiting-the-pyramid Goto Github PK

View Code? Open in Web Editor NEW
24.0 24.0 3.0 6.9 MB

Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research includes a scoring model, methodology, and worked examples.

Home Page: https://ctid.io/summiting-the-pyramid

License: Apache License 2.0

Makefile 100.00%
ctid cyber-analytics cybersecurity detection-engineering mitre-attack threat-informed-defense

summiting-the-pyramid's People

Contributors

marvel90120 avatar mehaase avatar michael5486 avatar rdunspellable avatar robertschull avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

summiting-the-pyramid's Issues

Change titles and definitons for levels 2/3

Change levels 2/3 to reflect applications within adversary control and outside adversary control, respectively. Ensure all materials within all pages reflect this change.

Need to redo readme

Need to redo the readme so it points to our materials available for Participant feedback and each new merge should update it if there are new materials to review.

Replace adfind images with table

In the first blog post, several of the ADFind images can be replaced with text. Since we need to add in data sources to the image content anyways (as they weren't originally a part of the methodology), might as well replace the rest of the images at the same time.

Antivirus as Data Source

I try to apply this in relation with my project Avred (related to Antivirus signatures), and it got me thinking.

If an AV has a signature of a tool, it will be Level 2. But is it A, U, or K?

The AV itself will be an userspace application, but its usually protected by the OS, and acting upon OS file write events, so it's "secure" like K.
Same if an AV or EDR is doing disk- or in-memory scanning with yara rules, what exactly is the data source? What if executed on-demand for hunting? What if the yara scanner is downloaded and executed manually and interactive by the user?

Remove "evadability" and "evasiveness" from website

After deliberation, we will be focusing primarily on robustness and how an observable might be more evadable. The terms "evadability" and "evasiveness" should be replaced with robustness or other terms which better explain a behavior.

Add improved analytics

Need to add the existing analytics that have been improved according to the StP methodology

Automate print to pdf

Exploring using the print to pdf functionality to create a PDF deliverable. Latex was giving problems and the output doesn't really match what a user on the website would see.

Upload scoring CSV

Have the scored analytics CSV available for download on the GitHub website

Make new leveling display

The current leveling display is a bit crowded and difficult to read. Looking into a new way to showcase the observables in each level.

[Observable-Submission]: PowerShell 4104: ScriptBlockText

Observable

PowerShell EventID 4104 ScriptBlockText

Observable Placement

Level 2, Column A

Research

When detecting for specific values in ScriptBlockText, we're basically looking for a string representation of another observable. For example, this could be a registry key, config file, file, or process name. However, it is easy for an adversary to alter values in ScriptBlockText...they can mangle strings, split into multiple values, permutate or do operations like XOR so that the output value is as desired, but the actual text in the script is obfuscated.

Additional Notes

See https://github.com/center-for-threat-informed-defense/summiting-the-pyramid/blob/main/docs/analytics/service_registry_permissions_weakness_check.rst for additional information

Contributed By

michael5486, RobertSchull

Update Scored Analytics CSV

LOE2 has scored new analytics and reviewed previous analytics to ensure alignment with methodology and levels updates.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.