id
stringlengths 5
9
| technique
stringlengths 3
43
| subtechniqueid
stringlengths 3
60
⌀ | sentences
stringlengths 1
871
|
---|---|---|---|
t1016 | system network configuration discovery | null | adversaries may look for details about the network configuration and settings such as ip andor mac addresses of systems they access or through information discovery of remote systems |
t1016 | system network configuration discovery | null | data and events should not be viewed in isolation but as part of a chain of behavior that could lead to other activities such as lateral movement based on the information obtained |
t1016 | system network configuration discovery | null | information may also be acquired through windows system management tools such as windows management instrumentation |
t1016 | system network configuration discovery | null | monitor processes and command line arguments for actions that could be taken to gather system and network information |
t1016 | system network configuration discovery | null | process process creation script script execution command command execution process os api execution |
t1016 | system network configuration discovery | null | remote access tools with built in features may interact directly with the windows api to gather information |
t1016 | system network configuration discovery | null | several operating system administration utilities exist that can be used to gather this information |
t1016 | system network configuration discovery | null | system and network discovery techniques normally occur throughout an operation as an adversary learns the environment |
t1018 | remote system discovery | null | adversaries may attempt to get a listing of other systems by ip address hostname or other logical identifier on a network that may be used for lateral movement from the current system |
t1018 | remote system discovery | null | citation elastic koadiac detection with eql |
t1018 | remote system discovery | null | data and events should not be viewed in isolation but as part of a chain of behavior that could lead to other activities such as lateral movement based on the information obtained |
t1018 | remote system discovery | null | exe especially when executed in quick succession |
t1018 | remote system discovery | null | functionality could exist within remote access tools to enable this but utilities available on the operating system could also be used such as pings0097 or net view using nets0039 |
t1018 | remote system discovery | null | information may also be acquired through windows system management tools such as windows management instrumentationt1047 and powershellt1059 |
t1018 | remote system discovery | null | monitor for processes that can be used to discover remote systems such as ping |
t1018 | remote system discovery | null | monitor processes and command line arguments for actions that could be taken to gather system and network information |
t1018 | remote system discovery | null | normal benign system and network events related to legitimate remote system discovery may be uncommon depending on the environment and how they are used |
t1018 | remote system discovery | null | process process creation command command execution network traffic network connection creation file file access |
t1018 | remote system discovery | null | remote access tools with built in features may interact directly with the windows api to gather information |
t1018 | remote system discovery | null | system and network discovery techniques normally occur throughout an operation as an adversary learns the environment |
t1020 | automated exfiltration | null | adversaries may exfiltrate data such as sensitive documents through the use of automated processing after being gathered during collection |
t1020 | automated exfiltration | null | command command execution script script execution network traffic network connection creation network traffic network traffic flow network traffic network traffic content file file access |
t1020 | automated exfiltration | null | monitor process file access patterns and network behavior |
t1020 | automated exfiltration | null | unrecognized processes or scripts that appear to be traversing file systems and sending network traffic may be suspicious |
t1020 | automated exfiltration | null | when automated exfiltration is used other exfiltration techniques likely apply as well to transfer the information out of the network such as exfiltration over c2 channelt1041 and exfiltration over alternative protocolt1048 |
t1021 | remote services | null | adversaries may use valid accountst1078 to log into a service specifically designed to accept remote connections such as telnet ssh and vnc |
t1021 | remote services | null | adversaries will likely need to learn about an environment and the relationships between systems through discovery techniques prior to attempting lateral movement |
t1021 | remote services | null | citation lockboxx ard 2019citation apple unified log analysis remote login and screen sharing |
t1021 | remote services | null | correlate use of login activity related to remote services with unusual behavior or other malicious or suspicious activity |
t1021 | remote services | null | in mac os you can review logs for screensharingd and authentication event messages |
t1021 | remote services | null | monitor for user accounts logged into systems they would not normally access or access patterns to multiple systems over a relatively short period of time |
t1021 | remote services | null | monitor network connections regarding remote management ports tcp3283 and tcp5900 and for remote login port tcp22 |
t1021 | remote services | null | other factors such as access patterns and activity that occurs after a remote login may indicate suspicious or malicious behavior using these applications |
t1021 | remote services | null | process process creation network traffic network connection creation network traffic network traffic flow logon session logon session creation command command execution network share network share access module module load |
t1021 | remote services | null | the adversary may then perform actions as the logged on user |
t1021 | remote services | null | use of applications such as ard may be legitimate depending on the environment and how its used |
t1025 | data from removable media | null | adversaries may search connected removable media on computers they have compromised to find files of interest |
t1025 | data from removable media | null | data may also be acquired through windows system management tools such as windows management instrumentationt1047 and powershellt1059 |
t1025 | data from removable media | null | file file access command command execution |
t1025 | data from removable media | null | monitor processes and command line arguments for actions that could be taken to collect files from a systems connected removable media |
t1025 | data from removable media | null | remote access tools with built in features may interact directly with the windows api to gather data |
t1025 | data from removable media | null | sensitive data can be collected from any removable media optical disk drive usb memory etc |
t1027 | obfuscated files or information | null | adversaries may attempt to make an executable or file difficult to discover or analyze by encrypting encoding or otherwise obfuscating its contents on the system or in transit |
t1027 | obfuscated files or information | null | adversaries may continue with an operation assuming that individual events like an antivirus detect will not be investigated or that an analyst will not be able to conclusively link that event to other activity occurring on the network |
t1027 | obfuscated files or information | null | citation github revoke obfuscation citation fireeye revoke obfuscation july 2017 citation github office crackros aug 2016 obfuscation used in payloads for initial access can be detected at the network |
t1027 | obfuscated files or information | null | command command execution file file metadata file file creation process process creation |
t1027 | obfuscated files or information | null | deobfuscation tools can be used to detect these indicators in filespayloads |
t1027 | obfuscated files or information | null | detection of file obfuscation is difficult unless artifacts are left behind by the obfuscation process that are uniquely detectable with a signature |
t1027 | obfuscated files or information | null | flag and analyze commands containing indicators of obfuscation and known suspicious syntax such as uninterpreted escape characters like |
t1027 | obfuscated files or information | null | if detection of the obfuscation itself is not possible it may be possible to detect the malicious activity that caused the obfuscated file for example the method that was used to write read or modify the file on the file system |
t1027 | obfuscated files or information | null | payloads delivered over an encrypted connection from a website require encrypted network traffic inspection |
t1027 | obfuscated files or information | null | similar events may also occur at the boundary through network ids email scanning appliance etc |
t1027 | obfuscated files or information | null | some email attachment detonation systems can open compressed and encrypted attachments |
t1027 | obfuscated files or information | null | the alerting system should be thoroughly investigated beyond that initial alert for activity that was not detected |
t1027 | obfuscated files or information | null | the first detection of a malicious tool may trigger an anti virus or other security tool alert |
t1027 | obfuscated files or information | null | the initial detection should be treated as an indication of a potentially more invasive intrusion |
t1027 | obfuscated files or information | null | this is common behavior that can be used across different platforms and the network to evade defenses |
t1027 | obfuscated files or information | null | use network intrusion detection systems and email gateway filtering to identify compressed and encrypted attachments and scripts |
t1027 | obfuscated files or information | null | windows sysmon and event id 4688 displays command line arguments for processes |
t1029 | scheduled transfer | null | adversaries may schedule data exfiltration to be performed only at certain times of day or at certain intervals |
t1029 | scheduled transfer | null | monitor process file access patterns and network behavior |
t1029 | scheduled transfer | null | network connections to the same destination that occur at the same time of day for multiple days are suspicious |
t1029 | scheduled transfer | null | network traffic network connection creation network traffic network traffic flow |
t1029 | scheduled transfer | null | this could be done to blend traffic patterns with normal activity or availability |
t1029 | scheduled transfer | null | unrecognized processes or scripts that appear to be traversing file systems and sending network traffic may be suspicious |
t1030 | data transfer size limits | null | a client sending significantly more data than it receives from a server |
t1030 | data transfer size limits | null | an adversary may exfiltrate data in fixed size chunks instead of whole files or limit packet sizes below certain thresholds |
t1030 | data transfer size limits | null | analyze network data for uncommon data flows e |
t1030 | data transfer size limits | null | analyze packet contents to detect communications that do not follow the expected protocol behavior for the port that is being used |
t1030 | data transfer size limits | null | citation university of birmingham c2 |
t1030 | data transfer size limits | null | if a process maintains a long connection during which it consistently sends fixed size data packets or a process opens connections and sends fixed sized data packets at regular intervals it may be performing an aggregate data transfer |
t1030 | data transfer size limits | null | network traffic network connection creation network traffic network traffic flow |
t1030 | data transfer size limits | null | processes utilizing the network that do not normally have network communication or have never been seen before are suspicious |
t1030 | data transfer size limits | null | this approach may be used to avoid triggering network data transfer threshold alerts |
t1033 | system owneruser discovery | null | adversaries may attempt to identify the primary user currently logged in user set of users that commonly uses a system or whether a user is actively using the system |
t1033 | system owneruser discovery | null | data and events should not be viewed in isolation but as part of a chain of behavior that could lead to other activities based on the information obtained |
t1033 | system owneruser discovery | null | information may also be acquired through windows system management tools such as windows management instrumentationt1047 and powershellt1059 |
t1033 | system owneruser discovery | null | monitor processes and command line arguments for actions that could be taken to gather system and network information |
t1033 | system owneruser discovery | null | process process creation command command execution |
t1033 | system owneruser discovery | null | remote access tools with built in features may interact directly with the windows api to gather information |
t1033 | system owneruser discovery | null | system and network discovery techniques normally occur throughout an operation as an adversary learns the environment |
t1033 | system owneruser discovery | null | they may do this for example by retrieving account usernames or by using os credential dumpingt1003 |
t1036 | masquerading | null | adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users andor security tools |
t1036 | masquerading | null | citation elastic masquerade ball do not focus on the possible names a file could have but instead on the command line arguments that are known to be used and are distinct because it will have a better rate of detection |
t1036 | masquerading | null | citation twitter itsreallynick masquerading update look for indications of common characters that may indicate an attempt to trick users into misidentifying the file type such as a space as the last character of a file name or the right to left override characters u202e u+202e and %e2%80%ae |
t1036 | masquerading | null | collect file hashes; file names that do not match their expected hash are suspect |
t1036 | masquerading | null | collecting and comparing disk and resource filenames for binaries by looking to see if the internalname originalfilename andor productname match what is expected could provide useful leads but may not always be indicative of malicious activity |
t1036 | masquerading | null | if file names are mismatched between the file name on disk and that of the binarys pe metadata this is a likely indicator that a binary was renamed after it was compiled |
t1036 | masquerading | null | image image metadata command command execution service service metadata service service creation scheduled job scheduled job metadata scheduled job scheduled job modification file file metadata process process metadata file file modification |
t1036 | masquerading | null | likewise files that are modified outside of an update or patch are suspect |
t1036 | masquerading | null | masquerading occurs when the name or location of an object legitimate or malicious is manipulated or abused for the sake of evading defenses and observation |
t1036 | masquerading | null | perform file monitoring; files with known names but in unusual locations are suspect |
t1036.004 | masquerading | TechniqueorTechniqueservice | apt-c-36 has disguised its scheduled tasks as those used by google. |
t1036.004 | masquerading | techniqueservice | apt29 named tasks microsoftwindowssoftwareprotectionplatformeventcachemanager in order to appear legitimate. |
t1036.004 | masquerading | techniqueservice | apt32 has used hidden or non-printing characters to help masquerade service names such as appending a unicode no-break space character to a legitimate service name. apt32 has also impersonated the legitimate flash installer filename install_flashplayer.exe. |
t1036.004 | masquerading | techniqueservice | attor's dispatcher disguises itself as a legitimate task i.e. the task name and description appear legitimate. |
t1036.004 | masquerading | techniqueservice | bazar can create a task named to appear benign. |
t1036.004 | masquerading | techniqueservice | build_downer has added itself to the registry run key as nvidia to appear legitimate. |
t1036.004 | masquerading | techniqueservice | carbanak has copied legitimate service names to use for malicious services. |
t1036.004 | masquerading | techniqueservice | catchamas adds a new service named netadapter in an apparent attempt to masquerade as a legitimate service. |