Skip to content

Analysis Modules

Scott Sutherland edited this page Mar 29, 2022 · 15 revisions

Analysis modules are used to filter collected data in a way that makes it easier to find known threats, suspicious behavior, and environmental anomalies. Additionally, the .csv files generated from the filtering can be consumed by another tool like Jupyter notebooks.

Adding New Analysis Modules

All analysis modules are automatically loaded from the windows\modules\analysis folder and ran offline against collected data sources based on matching module names. For example, all analysis modules that start with "analysis-tasks" will be ran against the "collect-tasks" data source. It's not very elegant, but it's functional and seems to make adding new modules easy as long as you name them correctly. :)

Analysis modules are broken into two types:

Analysis Type Description Path
Search These are analysis modules that perform detection of artifacts associated with known bad behavior. windows\modules\analysis\search
Stack These are analysis modules that perform anomaly detection via stacking or frequency analysis windows\modules\analysis\stack

By default, all analysis modules will be run. To run a subset of the analysis modules simply remove the modules you dont want to run.

Current Modules

Below is a summary of the currently supported analysis modules.

Module
Name
Data Source Mitre ATT&CK ID
analyze-events-4732-add-user-by-remotecomputer collect-events-4732 T1053.002
analyze-events-4732-add-user-by-workgroup collect-events-4732 T1053.002
analyze-events-4732-add-user-computeraccount collect-events-4732 T1053.002
analyze-events-4732-add-user collect-events-4732 T1053.002
analyze-installed-software-mgmt collect-installed-software T1219
analyze-installed-software-offsec collect-installed-software T1505
analyze-named-pipes-known-bad collect-named-pipes T1570
analyze-services-badpath collect-services T1569.002
analyze-services-dotnet collect-services T1569.002
analyze-services-lolbas collect-services T1569.002
analyze-services-mgmt-software collect-services T1219
analyze-services-offsec-software collect-services T1569.002
analyze-services-outlier-file-owner collect-services T1569.002
analyze-services-unsigned collect-services T1569.002
analyze-startup-files-allusers-dotnet collect-startup-files-allusers T1547.001
analyze-startup-files-allusers-lolbas collect-startup-files-allusers T1547.001
analyze-startup-files-allusers-mgmt-software collect-startup-files-allusers T1219
analyze-startup-files-allusers-offsec-software collect-startup-files-allusers T1547.001
analyze-startup-files-allusers-outlier-file-owner collect-startup-files-allusers T1547.001
analyze-startup-files-allusers-unsigned collect-startup-files-allusers T1547.001
analyze-startup-registry-run-badpath collect-startup-registry-run T1547.001
analyze-startup-registry-run-dotnet collect-startup-registry-run T1547.001
analyze-startup-registry-run-lolbas collect-startup-registry-run T1547.001
analyze-startup-registry-run-mgmt-software collect-startup-registry-run T1219
analyze-startup-registry-run-offsec-software collect-startup-registry-run T1547.001
analyze-startup-registry-run-outlier-file-owner collect-startup-registry-run T1547.001
analyze-startup-registry-run-unsigned collect-startup-registry-run T1547.001
analyze-tasks-dotnet collect-tasks T1053.002
analyze-tasks-lolbas collect-tasks T1053.002
analyze-tasks-mgmt-software collect-tasks T1219
analyze-tasks-offsec-software collect-tasks T1053.002
analyze-tasks-outlier-file-owner collect-tasks T1053.002
analyze-tasks-unsigned collect-tasks T1053.002
analyze-wmi-bindings collect-wmi-bindings T1546.003
analyze-wmi-bindings-creatorsid collect-wmi-bindings T1546.003