id
stringlengths
5
9
technique
stringlengths
3
43
subtechniqueid
stringlengths
3
60
sentences
stringlengths
1
871
t1016
system network configuration discovery
null
adversaries may look for details about the network configuration and settings such as ip andor mac addresses of systems they access or through information discovery of remote systems
t1016
system network configuration discovery
null
data and events should not be viewed in isolation but as part of a chain of behavior that could lead to other activities such as lateral movement based on the information obtained
t1016
system network configuration discovery
null
information may also be acquired through windows system management tools such as windows management instrumentation
t1016
system network configuration discovery
null
monitor processes and command line arguments for actions that could be taken to gather system and network information
t1016
system network configuration discovery
null
process process creation script script execution command command execution process os api execution
t1016
system network configuration discovery
null
remote access tools with built in features may interact directly with the windows api to gather information
t1016
system network configuration discovery
null
several operating system administration utilities exist that can be used to gather this information
t1016
system network configuration discovery
null
system and network discovery techniques normally occur throughout an operation as an adversary learns the environment
t1018
remote system discovery
null
adversaries may attempt to get a listing of other systems by ip address hostname or other logical identifier on a network that may be used for lateral movement from the current system
t1018
remote system discovery
null
citation elastic koadiac detection with eql
t1018
remote system discovery
null
data and events should not be viewed in isolation but as part of a chain of behavior that could lead to other activities such as lateral movement based on the information obtained
t1018
remote system discovery
null
exe especially when executed in quick succession
t1018
remote system discovery
null
functionality could exist within remote access tools to enable this but utilities available on the operating system could also be used such as pings0097 or net view using nets0039
t1018
remote system discovery
null
information may also be acquired through windows system management tools such as windows management instrumentationt1047 and powershellt1059
t1018
remote system discovery
null
monitor for processes that can be used to discover remote systems such as ping
t1018
remote system discovery
null
monitor processes and command line arguments for actions that could be taken to gather system and network information
t1018
remote system discovery
null
normal benign system and network events related to legitimate remote system discovery may be uncommon depending on the environment and how they are used
t1018
remote system discovery
null
process process creation command command execution network traffic network connection creation file file access
t1018
remote system discovery
null
remote access tools with built in features may interact directly with the windows api to gather information
t1018
remote system discovery
null
system and network discovery techniques normally occur throughout an operation as an adversary learns the environment
t1020
automated exfiltration
null
adversaries may exfiltrate data such as sensitive documents through the use of automated processing after being gathered during collection
t1020
automated exfiltration
null
command command execution script script execution network traffic network connection creation network traffic network traffic flow network traffic network traffic content file file access
t1020
automated exfiltration
null
monitor process file access patterns and network behavior
t1020
automated exfiltration
null
unrecognized processes or scripts that appear to be traversing file systems and sending network traffic may be suspicious
t1020
automated exfiltration
null
when automated exfiltration is used other exfiltration techniques likely apply as well to transfer the information out of the network such as exfiltration over c2 channelt1041 and exfiltration over alternative protocolt1048
t1021
remote services
null
adversaries may use valid accountst1078 to log into a service specifically designed to accept remote connections such as telnet ssh and vnc
t1021
remote services
null
adversaries will likely need to learn about an environment and the relationships between systems through discovery techniques prior to attempting lateral movement
t1021
remote services
null
citation lockboxx ard 2019citation apple unified log analysis remote login and screen sharing
t1021
remote services
null
correlate use of login activity related to remote services with unusual behavior or other malicious or suspicious activity
t1021
remote services
null
in mac os you can review logs for screensharingd and authentication event messages
t1021
remote services
null
monitor for user accounts logged into systems they would not normally access or access patterns to multiple systems over a relatively short period of time
t1021
remote services
null
monitor network connections regarding remote management ports tcp3283 and tcp5900 and for remote login port tcp22
t1021
remote services
null
other factors such as access patterns and activity that occurs after a remote login may indicate suspicious or malicious behavior using these applications
t1021
remote services
null
process process creation network traffic network connection creation network traffic network traffic flow logon session logon session creation command command execution network share network share access module module load
t1021
remote services
null
the adversary may then perform actions as the logged on user
t1021
remote services
null
use of applications such as ard may be legitimate depending on the environment and how its used
t1025
data from removable media
null
adversaries may search connected removable media on computers they have compromised to find files of interest
t1025
data from removable media
null
data may also be acquired through windows system management tools such as windows management instrumentationt1047 and powershellt1059
t1025
data from removable media
null
file file access command command execution
t1025
data from removable media
null
monitor processes and command line arguments for actions that could be taken to collect files from a systems connected removable media
t1025
data from removable media
null
remote access tools with built in features may interact directly with the windows api to gather data
t1025
data from removable media
null
sensitive data can be collected from any removable media optical disk drive usb memory etc
t1027
obfuscated files or information
null
adversaries may attempt to make an executable or file difficult to discover or analyze by encrypting encoding or otherwise obfuscating its contents on the system or in transit
t1027
obfuscated files or information
null
adversaries may continue with an operation assuming that individual events like an antivirus detect will not be investigated or that an analyst will not be able to conclusively link that event to other activity occurring on the network
t1027
obfuscated files or information
null
citation github revoke obfuscation citation fireeye revoke obfuscation july 2017 citation github office crackros aug 2016 obfuscation used in payloads for initial access can be detected at the network
t1027
obfuscated files or information
null
command command execution file file metadata file file creation process process creation
t1027
obfuscated files or information
null
deobfuscation tools can be used to detect these indicators in filespayloads
t1027
obfuscated files or information
null
detection of file obfuscation is difficult unless artifacts are left behind by the obfuscation process that are uniquely detectable with a signature
t1027
obfuscated files or information
null
flag and analyze commands containing indicators of obfuscation and known suspicious syntax such as uninterpreted escape characters like
t1027
obfuscated files or information
null
if detection of the obfuscation itself is not possible it may be possible to detect the malicious activity that caused the obfuscated file for example the method that was used to write read or modify the file on the file system
t1027
obfuscated files or information
null
payloads delivered over an encrypted connection from a website require encrypted network traffic inspection
t1027
obfuscated files or information
null
similar events may also occur at the boundary through network ids email scanning appliance etc
t1027
obfuscated files or information
null
some email attachment detonation systems can open compressed and encrypted attachments
t1027
obfuscated files or information
null
the alerting system should be thoroughly investigated beyond that initial alert for activity that was not detected
t1027
obfuscated files or information
null
the first detection of a malicious tool may trigger an anti virus or other security tool alert
t1027
obfuscated files or information
null
the initial detection should be treated as an indication of a potentially more invasive intrusion
t1027
obfuscated files or information
null
this is common behavior that can be used across different platforms and the network to evade defenses
t1027
obfuscated files or information
null
use network intrusion detection systems and email gateway filtering to identify compressed and encrypted attachments and scripts
t1027
obfuscated files or information
null
windows sysmon and event id 4688 displays command line arguments for processes
t1029
scheduled transfer
null
adversaries may schedule data exfiltration to be performed only at certain times of day or at certain intervals
t1029
scheduled transfer
null
monitor process file access patterns and network behavior
t1029
scheduled transfer
null
network connections to the same destination that occur at the same time of day for multiple days are suspicious
t1029
scheduled transfer
null
network traffic network connection creation network traffic network traffic flow
t1029
scheduled transfer
null
this could be done to blend traffic patterns with normal activity or availability
t1029
scheduled transfer
null
unrecognized processes or scripts that appear to be traversing file systems and sending network traffic may be suspicious
t1030
data transfer size limits
null
a client sending significantly more data than it receives from a server
t1030
data transfer size limits
null
an adversary may exfiltrate data in fixed size chunks instead of whole files or limit packet sizes below certain thresholds
t1030
data transfer size limits
null
analyze network data for uncommon data flows e
t1030
data transfer size limits
null
analyze packet contents to detect communications that do not follow the expected protocol behavior for the port that is being used
t1030
data transfer size limits
null
citation university of birmingham c2
t1030
data transfer size limits
null
if a process maintains a long connection during which it consistently sends fixed size data packets or a process opens connections and sends fixed sized data packets at regular intervals it may be performing an aggregate data transfer
t1030
data transfer size limits
null
network traffic network connection creation network traffic network traffic flow
t1030
data transfer size limits
null
processes utilizing the network that do not normally have network communication or have never been seen before are suspicious
t1030
data transfer size limits
null
this approach may be used to avoid triggering network data transfer threshold alerts
t1033
system owneruser discovery
null
adversaries may attempt to identify the primary user currently logged in user set of users that commonly uses a system or whether a user is actively using the system
t1033
system owneruser discovery
null
data and events should not be viewed in isolation but as part of a chain of behavior that could lead to other activities based on the information obtained
t1033
system owneruser discovery
null
information may also be acquired through windows system management tools such as windows management instrumentationt1047 and powershellt1059
t1033
system owneruser discovery
null
monitor processes and command line arguments for actions that could be taken to gather system and network information
t1033
system owneruser discovery
null
process process creation command command execution
t1033
system owneruser discovery
null
remote access tools with built in features may interact directly with the windows api to gather information
t1033
system owneruser discovery
null
system and network discovery techniques normally occur throughout an operation as an adversary learns the environment
t1033
system owneruser discovery
null
they may do this for example by retrieving account usernames or by using os credential dumpingt1003
t1036
masquerading
null
adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users andor security tools
t1036
masquerading
null
citation elastic masquerade ball do not focus on the possible names a file could have but instead on the command line arguments that are known to be used and are distinct because it will have a better rate of detection
t1036
masquerading
null
citation twitter itsreallynick masquerading update look for indications of common characters that may indicate an attempt to trick users into misidentifying the file type such as a space as the last character of a file name or the right to left override characters u202e u+202e and %e2%80%ae
t1036
masquerading
null
collect file hashes; file names that do not match their expected hash are suspect
t1036
masquerading
null
collecting and comparing disk and resource filenames for binaries by looking to see if the internalname originalfilename andor productname match what is expected could provide useful leads but may not always be indicative of malicious activity
t1036
masquerading
null
if file names are mismatched between the file name on disk and that of the binarys pe metadata this is a likely indicator that a binary was renamed after it was compiled
t1036
masquerading
null
image image metadata command command execution service service metadata service service creation scheduled job scheduled job metadata scheduled job scheduled job modification file file metadata process process metadata file file modification
t1036
masquerading
null
likewise files that are modified outside of an update or patch are suspect
t1036
masquerading
null
masquerading occurs when the name or location of an object legitimate or malicious is manipulated or abused for the sake of evading defenses and observation
t1036
masquerading
null
perform file monitoring; files with known names but in unusual locations are suspect
t1036.004
masquerading
TechniqueorTechniqueservice
apt-c-36 has disguised its scheduled tasks as those used by google.
t1036.004
masquerading
techniqueservice
apt29 named tasks microsoftwindowssoftwareprotectionplatformeventcachemanager in order to appear legitimate.
t1036.004
masquerading
techniqueservice
apt32 has used hidden or non-printing characters to help masquerade service names such as appending a unicode no-break space character to a legitimate service name. apt32 has also impersonated the legitimate flash installer filename install_flashplayer.exe.
t1036.004
masquerading
techniqueservice
attor's dispatcher disguises itself as a legitimate task i.e. the task name and description appear legitimate.
t1036.004
masquerading
techniqueservice
bazar can create a task named to appear benign.
t1036.004
masquerading
techniqueservice
build_downer has added itself to the registry run key as nvidia to appear legitimate.
t1036.004
masquerading
techniqueservice
carbanak has copied legitimate service names to use for malicious services.
t1036.004
masquerading
techniqueservice
catchamas adds a new service named netadapter in an apparent attempt to masquerade as a legitimate service.