id
stringlengths 5
9
| technique
stringlengths 3
43
| subtechniqueid
stringlengths 3
60
⌀ | sentences
stringlengths 1
871
|
---|---|---|---|
t1498
|
network denial of service
| null |
sensor health host status network traffic network traffic flow
|
t1498
|
network denial of service
| null |
the analysis tools mentioned can then be used to determine the type of dos causing the outage and help with remediation
|
t1498
|
network denial of service
| null |
typical network throughput monitoring tools such as netflowcitation cisco dosdetect netflow snmp and custom scripts can be used to detect sudden increases in network or service utilization
|
t1499
|
endpoint denial of service
| null |
adversaries may perform endpoint denial of service dos attacks to degrade or block the availability of services to users
|
t1499
|
endpoint denial of service
| null |
attacks targeting web applications may generate logs in the web server application server andor database server that can be used to identify the type of attack possibly before the impact is felt
|
t1499
|
endpoint denial of service
| null |
citation cisco dosdetect netflow real time automated and qualitative study of the network traffic can identify a sudden surge in one type of protocol can be used to detect an attack as it starts
|
t1499
|
endpoint denial of service
| null |
detection of endpoint dos can sometimes be achieved before the effect is sufficient to cause significant impact to the availability of the service but such response time typically requires very aggressive monitoring and responsiveness
|
t1499
|
endpoint denial of service
| null |
endpoint dos can be performed by exhausting the system resources those services are hosted on or exploiting the system to cause a persistent crash condition
|
t1499
|
endpoint denial of service
| null |
externally monitor the availability of services that may be targeted by an endpoint dos
|
t1499
|
endpoint denial of service
| null |
in addition to network level detections endpoint logging and instrumentation can be useful for detection
|
t1499
|
endpoint denial of service
| null |
sensor health host status application log application log content network traffic network traffic content network traffic network traffic flow
|
t1499
|
endpoint denial of service
| null |
typical network throughput monitoring tools such as netflow snmp and custom scripts can be used to detect sudden increases in circuit utilization
|
t1505
|
server software component
| null |
adversaries may abuse legitimate extensible development features of servers to establish persistent access to systems
|
t1505
|
server software component
| null |
citation us cert alert ta15 314a web shells
|
t1505
|
server software component
| null |
consider monitoring application logs for abnormal behavior that may indicate suspicious installation of application software components
|
t1505
|
server software component
| null |
consider monitoring file locations associated with the installation of new application software components such as paths from which applications typically load such extensible components
|
t1505
|
server software component
| null |
enterprise server applications may include features that allow developers to write and install software or scripts to extend the functionality of the main application
|
t1505
|
server software component
| null |
exe or accessing files
|
t1505
|
server software component
| null |
file file creation file file modification process process creation network traffic network traffic content network traffic network traffic flow application log application log content
|
t1505
|
server software component
| null |
log authentication attempts to the server and any unusual traffic patterns to or from the server and internal network
|
t1505
|
server software component
| null |
process monitoring may be used to detect servers components that perform suspicious actions such as running cmd
|
t1518
|
software discovery
| null |
adversaries may attempt to get a listing of software and software versions that are installed on a system or in a cloud environment
|
t1518
|
software discovery
| null |
adversaries may use the information from software discoveryt1518 during automated discovery to shape follow on behaviors including whether or not the adversary fully infects the target andor attempts specific actions
|
t1518
|
software discovery
| null |
data and events should not be viewed in isolation but as part of a chain of behavior that could lead to other activities such as lateral movement based on the information obtained
|
t1518
|
software discovery
| null |
firewall firewall metadata firewall firewall enumeration process process creation command command execution process os api execution
|
t1518
|
software discovery
| null |
information may also be acquired through windows system management tools such as windows management instrumentationt1047 and powershellt1059
|
t1518
|
software discovery
| null |
monitor processes and command line arguments for actions that could be taken to gather system and network information
|
t1518
|
software discovery
| null |
remote access tools with built in features may interact directly with the windows api to gather information
|
t1518
|
software discovery
| null |
system and network discovery techniques normally occur throughout an operation as an adversary learns the environment
|
t1525
|
implant internal image
| null |
adversaries may implant cloud or container images with malicious code to establish persistence after gaining access to an environment
|
t1525
|
implant internal image
| null |
amazon web services aws amazon machine images amis google cloud platform gcp images and azure images as well as popular container runtimes such as docker can be implanted or backdoored
|
t1525
|
implant internal image
| null |
image image creation image image modification
|
t1525
|
implant internal image
| null |
in containerized environments changes may be detectable by monitoring the docker daemon logs or setting up and monitoring kubernetes audit logs depending on registry configuration
|
t1525
|
implant internal image
| null |
monitor interactions with images and containers by users to identify ones that are added or modified anomalously
|
t1526
|
cloud service discovery
| null |
an adversary may attempt to enumerate the cloud services running on a system after gaining access
|
t1526
|
cloud service discovery
| null |
cloud service cloud service metadata cloud service cloud service enumeration
|
t1526
|
cloud service discovery
| null |
cloud service discovery techniques will likely occur throughout an operation where an adversary is targeting cloud based systems and services
|
t1526
|
cloud service discovery
| null |
data and events should not be viewed in isolation but as part of a chain of behavior that could lead to other activities based on the information obtained
|
t1526
|
cloud service discovery
| null |
monitor cloud service usage for anomalous behavior that may indicate adversarial presence within the environment
|
t1526
|
cloud service discovery
| null |
normal benign system and network events that look like cloud service discovery may be uncommon depending on the environment and how they are used
|
t1526
|
cloud service discovery
| null |
these methods can differ from platform as a service paas to infrastructure as a service iaas or software as a service saas
|
t1528
|
steal application access token
| null |
for example they can filter for apps that are authorized by a small number of users apps requesting high risk permissions permissions incongruous with the apps purpose or apps with old œlast authorized fields
|
t1528
|
steal application access token
| null |
0 access
|
t1528
|
steal application access token
| null |
a specific app can be investigated using an activity log displaying activities the app has performed although some activities may be mis logged as being performed by the user
|
t1528
|
steal application access token
| null |
administrators can set up a variety of logs and leverage audit tools to monitor actions that can be conducted as a result of oauth 2
|
t1528
|
steal application access token
| null |
administrators should set up monitoring to trigger automatic alerts when policy criteria are met
|
t1528
|
steal application access token
| null |
adversaries can steal user application access tokens as a means of acquiring credentials to access remote systems and resources
|
t1528
|
steal application access token
| null |
app stores can be useful resources to further investigate suspicious apps
|
t1528
|
steal application access token
| null |
for example using a cloud access security broker casb admins can create a high severity app permissions polic y that generates alerts if apps request high severity permissions or send permissions requests for too many users
|
t1528
|
steal application access token
| null |
for instance audit reports enable admins to identify privilege escalation actions such as role creations or policy modifications which could be actions performed after initial access
|
t1528
|
steal application access token
| null |
security analysts can hunt for malicious apps using the tools available in their casb identity provider or resource provider depending on platform
|
t1528
|
steal application access token
| null |
this can occur through social engineering and typically requires user action to grant access
|
t1528
|
steal application access token
| null |
user account user account modification
|
t1529
|
system shutdownreboot
| null |
adversaries may shutdownreboot systems to interrupt access to or aid in the destruction of those systems
|
t1529
|
system shutdownreboot
| null |
event id 1074 and 6006
|
t1529
|
system shutdownreboot
| null |
operating systems may contain commands to initiate a shutdownreboot of a machine
|
t1529
|
system shutdownreboot
| null |
process process creation command command execution sensor health host status
|
t1529
|
system shutdownreboot
| null |
use process monitoring to monitor the execution and command line parameters of binaries involved in shutting down or rebooting systems
|
t1529
|
system shutdownreboot
| null |
windows event logs may also designate activity associated with a shutdownreboot ex
|
t1530
|
data from cloud storage object
| null |
activity originating from unexpected sources may indicate improper permissions are set that is allowing access to data
|
t1530
|
data from cloud storage object
| null |
additionally detecting failed attempts by a user for a certain object followed by escalation of privileges by the same user and access to the same object may be an indication of suspicious activity
|
t1530
|
data from cloud storage object
| null |
adversaries may access data objects from improperly secured cloud storage
|
t1530
|
data from cloud storage object
| null |
cloud storage cloud storage access
|
t1530
|
data from cloud storage object
| null |
many cloud service providers offer solutions for online data storage such as amazon s3 azure storage and google cloud storage
|
t1530
|
data from cloud storage object
| null |
monitor for unusual queries to the cloud providers storage service
|
t1531
|
account access removal
| null |
accounts may be deleted locked or manipulated ex changed credentials to remove access to accounts
|
t1531
|
account access removal
| null |
adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users
|
t1531
|
account access removal
| null |
use process monitoring to monitor the execution and command line parameters of binaries involved in deleting accounts or changing passwords such as use of nets0039
|
t1531
|
account access removal
| null |
user account user account deletion user account user account modification active directory active directory object modification
|
t1531
|
account access removal
| null |
windows event logs may also designate activity associated with an adversarys attempt to remove access to an account * event id 4723 an attempt was made to change an accounts password * event id 4724 an attempt was made to reset an accounts password * event id 4726 a user account was deleted * event id 4740 a user account was locked out alerting on nets0039 and these event ids may generate a high degree of false positives so compare against baseline knowledge for how systems are typically used and correlate modification events with other indications of malicious activity where possible
|
t1534
|
internal spear phishing
| null |
adversaries may use internal spear phishing to gain access to additional information or exploit other users within the same organization after they already have access to accounts or systems within the environment
|
t1534
|
internal spear phishing
| null |
application log application log content network traffic network traffic flow network traffic network traffic content
|
t1534
|
internal spear phishing
| null |
citation trend micro when phishing starts from the inside 2017
|
t1534
|
internal spear phishing
| null |
internal spear phishing is multi staged attack where an email account is owned either by controlling the users device with previously installed malware or by compromising the account credentials of the user
|
t1534
|
internal spear phishing
| null |
network intrusion detection systems and email gateways usually do not scan internal email but an organization can leverage the journaling based solution which sends a copy of emails to a security service for offline analysis or incorporate service integrated solutions using on premise or api based integrations to help detect internal spear phishing attacks
|
t1535
|
unusedunsupported cloud regions
| null |
access is usually obtained through compromising accounts used to manage cloud infrastructure
|
t1535
|
unusedunsupported cloud regions
| null |
adversaries may create cloud instances in unused geographic service regions in order to evade detection
|
t1535
|
unusedunsupported cloud regions
| null |
citation cloudsploit unused aws regions
|
t1535
|
unusedunsupported cloud regions
| null |
configure alerting to notify of activity in normally unused regions or if the number of instances active in a region goes above a certain threshold
|
t1535
|
unusedunsupported cloud regions
| null |
instance instance creation
|
t1535
|
unusedunsupported cloud regions
| null |
monitor system logs to review activities occurring across all cloud environments and regions
|
t1537
|
transfer data to cloud account
| null |
a defender who is monitoring for large transfers to outside the cloud environment through normal file transfers or over command and control channels may not be watching for data transfers to another account within the same cloud provider
|
t1537
|
transfer data to cloud account
| null |
adversaries may exfiltrate data by transferring the data including backups of cloud environments to another cloud account they control on the same service to avoid typical file transfersdownloads and network based exfiltration detection
|
t1537
|
transfer data to cloud account
| null |
monitor account activity for attempts to share data snapshots or backups with untrusted or unusual accounts on the same cloud service provider
|
t1537
|
transfer data to cloud account
| null |
monitor for anomalous file transfer activity between accounts and to untrusted vpcs
|
t1537
|
transfer data to cloud account
| null |
snapshot snapshot creation snapshot snapshot modification cloud storage cloud storage modification cloud storage cloud storage creation
|
t1538
|
cloud service dashboard
| null |
an adversary may use a cloud service dashboard gui with stolen credentials to gain useful information from an operational cloud environment such as specific services resources and features
|
t1538
|
cloud service dashboard
| null |
citation aws console sign in events
|
t1538
|
cloud service dashboard
| null |
for example the gcp command center can be used to view all assets findings of potential security risks and to run additional queries such as finding public ip addresses and open ports
|
t1538
|
cloud service dashboard
| null |
monitor account activity logs to see actions performed and activity associated with the cloud service management console
|
t1538
|
cloud service dashboard
| null |
some cloud providers such as aws provide distinct log events for login attempts to the management console
|
t1538
|
cloud service dashboard
| null |
user account user account authentication logon session logon session creation
|
t1539
|
steal web session cookie
| null |
an adversary may steal web application or service session cookies and use them to gain access to web applications or internet services as an authenticated user without needing credentials
|
t1539
|
steal web session cookie
| null |
file file access process process access
|
t1539
|
steal web session cookie
| null |
monitor for attempts by programs to inject into or dump browser process memory
|
t1539
|
steal web session cookie
| null |
monitor for attempts to access files and repositories on a local system that are used to store browser session cookies
|
t1539
|
steal web session cookie
| null |
web applications and services often use session cookies as an authentication token after a user has authenticated to a website
|
t1542
|
pre os boot
| null |
adversaries may abuse pre os boot mechanisms as a way to establish persistence on a system
|
t1542
|
pre os boot
| null |
citation itworld hard disk health dec 2014
|
t1542
|
pre os boot
| null |
command command execution network traffic network connection creation firmware firmware modification driver driver metadata process os api execution drive drive modification
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.