@cyclonedx/cdxgen
Version:
Creates CycloneDX Software Bill of Materials (SBOM) from source or container image
258 lines (257 loc) • 13.1 kB
JSON
{
"win_version": {
"query": "select tb1.name, tb1.build_version, (case when (arch like '%-bit') then concat('x', replace(arch,'-bit', '')) else arch end) as arch, 'Microsoft' as publisher, tb2.version from (select name, version as build_version, arch from os_version) tb1,(select data as version from registry where path = 'HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\DisplayVersion') tb2;",
"name": "win_version",
"description": "Retrieves the name, version number, build version, and arch of the target Windows system.",
"purlType": "swid",
"componentType": "operating-system"
},
"kernel_info": {
"query": "select * from kernel_info;",
"name": "os-image",
"description": "Retrieves information from the current kernel in the target system.",
"purlType": "swid"
},
"chrome_extensions": {
"query": "select chrome_extensions.* from users join chrome_extensions using (uid);",
"description": "Retrieves the list of extensions for Chrome in the target system.",
"purlType": "chrome-extension",
"componentType": "application"
},
"firefox_addons": {
"query": "select firefox_addons.* from users join firefox_addons using (uid);",
"description": "Retrieves the list of addons for Firefox in the target system.",
"purlType": "swid",
"componentType": "application"
},
"vscode_extensions": {
"query": "select vscode_extensions.* from users join vscode_extensions using (uid);",
"description": "Lists all vscode extensions.",
"purlType": "vscode-extension",
"componentType": "application"
},
"browser_plugins": {
"query": "select browser_plugins.* from users join browser_plugins using (uid);",
"description": "Retrieves the list of C/NPAPI browser plugin in the target system.",
"purlType": "swid"
},
"ie_extensions": {
"query": "select * from ie_extensions;",
"description": "Retrieves the list of extensions for IE in the target system.",
"purlType": "swid"
},
"opera_extensions": {
"query": "select opera_extensions.* from users join opera_extensions using (uid);",
"description": "Retrieves the list of extensions for opera in the target system.",
"purlType": "swid"
},
"safari_extensions": {
"query": "select safari_extensions.* from users join safari_extensions using (uid);",
"description": "Retrieves the list of extensions for safari in the target system.",
"purlType": "swid"
},
"python_packages": {
"query": "select * from python_packages;",
"description": "Python packages installed on system.",
"purlType": "pypi"
},
"windows_programs": {
"query": "select * from programs;",
"description": "Retrieves the list of products as they are installed by Windows Installer in the target Windows system.",
"purlType": "swid"
},
"windows_patches": {
"query": "select * from patches;",
"description": "Retrieves all the information for the current windows drivers in the target Windows system.",
"purlType": "swid"
},
"windows_drivers": {
"query": "select * from drivers;",
"description": "Retrieves all the information for the current windows drivers in the target Windows system.",
"purlType": "swid"
},
"windows_shared_resources": {
"query": "select * from shared_resources;",
"description": "Retrieves the list of shared resources in the target Windows system.",
"purlType": "swid",
"componentType": "data"
},
"appcompat_shims": {
"query": "SELECT * FROM appcompat_shims WHERE description!='EMET_Database' AND executable NOT IN ('setuphost.exe','setupprep.exe','iisexpress.exe');",
"description": "Appcompat shims (.sdb files) installed on Windows hosts.",
"purlType": "swid",
"componentType": "data"
},
"system_info_snapshot": {
"query": "SELECT * FROM system_info;",
"description": "System info snapshot query.",
"purlType": "swid",
"componentType": "data"
},
"users_snapshot": {
"query": "SELECT username as name, uuid as version, description, directory, uid, type, gid FROM users;",
"description": "Local and domain-backed user account inventory on Windows endpoints.",
"purlType": "swid",
"componentType": "data"
},
"logged_in_users_snapshot": {
"query": "SELECT user as name, '' as version, type as description, pid, host, tty, time, sid, registry_hive FROM logged_in_users;",
"description": "Interactive and remote user sessions active on the endpoint.",
"purlType": "swid",
"componentType": "data"
},
"logon_sessions": {
"query": "SELECT user as name, logon_type as version, authentication_package as description, logon_id, logon_domain, session_id, logon_sid, logon_time, logon_server, dns_domain_name, upn, profile_path, home_directory, home_directory_drive FROM logon_sessions;",
"description": "Windows logon session inventory for authentication and identity investigations.",
"purlType": "swid",
"componentType": "data"
},
"pipes_snapshot": {
"query": "SELECT processes.path, processes.cmdline, processes.uid, processes.on_disk, pipes.name, pid FROM pipes JOIN processes USING (pid);",
"description": "Pipes snapshot query.",
"purlType": "swid",
"componentType": "data"
},
"process_open_handles_snapshot": {
"query": "SELECT processes.name, process_open_handles.type as version, process_open_handles.name as description, processes.path, processes.cmdline, processes.pid, process_open_handles.value, process_open_handles.type, process_open_handles.name as handle_name, process_open_handles.access, process_open_handles.attributes, process_open_handles.count, process_open_handles.raw_pointer_count, process_open_handles.error_stage, process_open_handles.error_code FROM processes JOIN process_open_handles USING (pid) WHERE process_open_handles.name != '' AND processes.name IN ('powershell.exe', 'pwsh.exe', 'cmd.exe', 'wscript.exe', 'cscript.exe', 'mshta.exe', 'rundll32.exe', 'regsvr32.exe', 'wmic.exe', 'certutil.exe', 'bitsadmin.exe') AND ((process_open_handles.type = 'File' AND (lower(process_open_handles.name) LIKE '%\\appdata\\local\\temp\\%' OR lower(process_open_handles.name) LIKE '%\\appdata\\roaming\\microsoft\\windows\\start menu\\programs\\startup\\%' OR lower(process_open_handles.name) LIKE '%\\programdata\\microsoft\\windows\\start menu\\programs\\startup\\%' OR lower(process_open_handles.name) LIKE '%\\windows\\tasks\\%' OR lower(process_open_handles.name) LIKE '%\\system32\\tasks\\%' OR lower(process_open_handles.name) LIKE '%\\wbem\\repository\\%')) OR (process_open_handles.type = 'Key' AND (lower(process_open_handles.name) LIKE '%\\software\\microsoft\\windows\\currentversion\\run%' OR lower(process_open_handles.name) LIKE '%\\software\\microsoft\\windows\\currentversion\\runonce%' OR lower(process_open_handles.name) LIKE '%\\software\\microsoft\\windows nt\\currentversion\\winlogon%' OR lower(process_open_handles.name) LIKE '%\\system\\currentcontrolset\\services\\%' OR lower(process_open_handles.name) LIKE '%\\software\\microsoft\\windows nt\\currentversion\\schedule\\taskcache\\%' OR lower(process_open_handles.name) LIKE '%\\software\\microsoft\\wbem\\cimom%')));",
"description": "Open handles owned by high-signal scripting and proxy-execution processes, filtered to persistence-oriented file and registry locations on Windows endpoints.",
"purlType": "swid",
"componentType": "data"
},
"services_snapshot": {
"query": "SELECT * FROM services;",
"description": "Services snapshot query.",
"purlType": "swid",
"componentType": "data"
},
"wmi_cli_event_consumers": {
"query": "SELECT * FROM wmi_cli_event_consumers;",
"description": "WMI CommandLineEventConsumer, which can be used for persistence on Windows. See https://www.blackhat.com/docs/us-15/materials/us-15-Graeber-Abusing-Windows-Management-Instrumentation-WMI-To-Build-A-Persistent%20Asynchronous-And-Fileless-Backdoor-wp.pdf for more details.",
"purlType": "swid",
"componentType": "data"
},
"wmi_filter_consumer_binding": {
"query": "SELECT * FROM wmi_filter_consumer_binding;",
"description": "Lists the relationship between event consumers and filters.",
"purlType": "swid",
"componentType": "data"
},
"wmi_cli_event_consumers_snapshot": {
"query": "SELECT * FROM wmi_cli_event_consumers;",
"description": "Snapshot query for WMI event consumers.",
"purlType": "swid",
"componentType": "data"
},
"certificates": {
"query": "SELECT * FROM certificates WHERE path != 'Other People';",
"description": "List all certificates in the trust store.",
"purlType": "swid",
"componentType": "data"
},
"wmi_event_filters": {
"query": "SELECT * FROM wmi_event_filters;",
"description": "Lists WMI event filters.",
"purlType": "swid",
"componentType": "data"
},
"windows_security_products": {
"query": "SELECT * FROM windows_security_products;",
"description": "Registered endpoint security products and signature posture.",
"purlType": "swid",
"componentType": "data"
},
"windows_security_center": {
"query": "SELECT antivirus as name, firewall as version, autoupdate as description, internet_settings, windows_security_center_service, user_account_control FROM windows_security_center;",
"description": "Windows Security Center overall protection health indicators.",
"purlType": "swid",
"componentType": "data"
},
"windows_bitlocker_info": {
"query": "SELECT device_id as name, drive_letter as version, encryption_method as description, persistent_volume_id, conversion_status, protection_status, percentage_encrypted, lock_status FROM bitlocker_info;",
"description": "BitLocker protection and encryption state for local drives.",
"purlType": "swid",
"componentType": "data"
},
"windows_run_keys": {
"query": "SELECT path as name, mtime as version, data as description, key, type FROM registry WHERE (key LIKE 'HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\%' OR key LIKE 'HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\\%' OR key LIKE 'HKEY_USERS\\%\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\%' OR key LIKE 'HKEY_USERS\\%\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\\%') AND type != 'subkey';",
"description": "Registry Run/RunOnce autostart entries commonly abused for persistence.",
"purlType": "swid",
"componentType": "data"
},
"etc_hosts": {
"query": "SELECT * FROM etc_hosts;",
"description": "List the contents of the Windows hosts file.",
"purlType": "swid",
"componentType": "data"
},
"scheduled_tasks": {
"query": "SELECT * FROM scheduled_tasks;",
"description": "List all scheduled_tasks.",
"purlType": "swid",
"componentType": "data"
},
"chocolatey_packages": {
"query": "SELECT * FROM chocolatey_packages;",
"description": "List all chocolatey_packages.",
"purlType": "chocolatey"
},
"npm_packages": {
"query": "SELECT * FROM npm_packages;",
"description": "List all npm_packages.",
"purlType": "npm"
},
"startup_items": {
"query": "SELECT * FROM startup_items;",
"description": "List all startup_items.",
"purlType": "swid",
"componentType": "data"
},
"routes": {
"query": "SELECT * FROM routes;",
"description": "List all routes.",
"purlType": "swid",
"componentType": "data"
},
"listening_ports": {
"query": "SELECT DISTINCT process.name, listening.port, listening.protocol, listening.family, listening.address, process.pid, process.path, process.cmdline, process.cwd, process.uid, process.on_disk, process.parent, process.start_time FROM processes AS process JOIN listening_ports AS listening ON process.pid = listening.pid;",
"description": "List all processes and their listening_ports.",
"purlType": "swid",
"componentType": "application"
},
"processes": {
"query": "SELECT * FROM processes;",
"description": "List all processes.",
"purlType": "swid",
"componentType": "data"
},
"process_open_sockets": {
"query": "SELECT * FROM process_open_sockets;",
"description": "List all process_open_sockets.",
"purlType": "swid",
"componentType": "data"
},
"windows_update_history": {
"query": "SELECT * FROM windows_update_history;",
"description": "List all windows_update_history.",
"purlType": "swid",
"componentType": "data"
},
"windows_optional_features": {
"query": "SELECT * FROM windows_optional_features;",
"description": "List all windows_optional_features.",
"purlType": "swid",
"componentType": "data"
},
"windows_firewall_rules": {
"query": "SELECT * FROM windows_firewall_rules;",
"description": "List all windows_firewall_rules.",
"purlType": "swid",
"componentType": "data"
},
"logical_drives": {
"query": "SELECT * FROM logical_drives;",
"description": "List all logical_drives.",
"purlType": "swid",
"componentType": "device"
}
}