id
stringlengths
5
9
technique
stringlengths
3
43
subtechniqueid
stringlengths
3
60
sentences
stringlengths
1
871
t1498
network denial of service
null
sensor health host status network traffic network traffic flow
t1498
network denial of service
null
the analysis tools mentioned can then be used to determine the type of dos causing the outage and help with remediation
t1498
network denial of service
null
typical network throughput monitoring tools such as netflowcitation cisco dosdetect netflow snmp and custom scripts can be used to detect sudden increases in network or service utilization
t1499
endpoint denial of service
null
adversaries may perform endpoint denial of service dos attacks to degrade or block the availability of services to users
t1499
endpoint denial of service
null
attacks targeting web applications may generate logs in the web server application server andor database server that can be used to identify the type of attack possibly before the impact is felt
t1499
endpoint denial of service
null
citation cisco dosdetect netflow real time automated and qualitative study of the network traffic can identify a sudden surge in one type of protocol can be used to detect an attack as it starts
t1499
endpoint denial of service
null
detection of endpoint dos can sometimes be achieved before the effect is sufficient to cause significant impact to the availability of the service but such response time typically requires very aggressive monitoring and responsiveness
t1499
endpoint denial of service
null
endpoint dos can be performed by exhausting the system resources those services are hosted on or exploiting the system to cause a persistent crash condition
t1499
endpoint denial of service
null
externally monitor the availability of services that may be targeted by an endpoint dos
t1499
endpoint denial of service
null
in addition to network level detections endpoint logging and instrumentation can be useful for detection
t1499
endpoint denial of service
null
sensor health host status application log application log content network traffic network traffic content network traffic network traffic flow
t1499
endpoint denial of service
null
typical network throughput monitoring tools such as netflow snmp and custom scripts can be used to detect sudden increases in circuit utilization
t1505
server software component
null
adversaries may abuse legitimate extensible development features of servers to establish persistent access to systems
t1505
server software component
null
citation us cert alert ta15 314a web shells
t1505
server software component
null
consider monitoring application logs for abnormal behavior that may indicate suspicious installation of application software components
t1505
server software component
null
consider monitoring file locations associated with the installation of new application software components such as paths from which applications typically load such extensible components
t1505
server software component
null
enterprise server applications may include features that allow developers to write and install software or scripts to extend the functionality of the main application
t1505
server software component
null
exe or accessing files
t1505
server software component
null
file file creation file file modification process process creation network traffic network traffic content network traffic network traffic flow application log application log content
t1505
server software component
null
log authentication attempts to the server and any unusual traffic patterns to or from the server and internal network
t1505
server software component
null
process monitoring may be used to detect servers components that perform suspicious actions such as running cmd
t1518
software discovery
null
adversaries may attempt to get a listing of software and software versions that are installed on a system or in a cloud environment
t1518
software discovery
null
adversaries may use the information from software discoveryt1518 during automated discovery to shape follow on behaviors including whether or not the adversary fully infects the target andor attempts specific actions
t1518
software discovery
null
data and events should not be viewed in isolation but as part of a chain of behavior that could lead to other activities such as lateral movement based on the information obtained
t1518
software discovery
null
firewall firewall metadata firewall firewall enumeration process process creation command command execution process os api execution
t1518
software discovery
null
information may also be acquired through windows system management tools such as windows management instrumentationt1047 and powershellt1059
t1518
software discovery
null
monitor processes and command line arguments for actions that could be taken to gather system and network information
t1518
software discovery
null
remote access tools with built in features may interact directly with the windows api to gather information
t1518
software discovery
null
system and network discovery techniques normally occur throughout an operation as an adversary learns the environment
t1525
implant internal image
null
adversaries may implant cloud or container images with malicious code to establish persistence after gaining access to an environment
t1525
implant internal image
null
amazon web services aws amazon machine images amis google cloud platform gcp images and azure images as well as popular container runtimes such as docker can be implanted or backdoored
t1525
implant internal image
null
image image creation image image modification
t1525
implant internal image
null
in containerized environments changes may be detectable by monitoring the docker daemon logs or setting up and monitoring kubernetes audit logs depending on registry configuration
t1525
implant internal image
null
monitor interactions with images and containers by users to identify ones that are added or modified anomalously
t1526
cloud service discovery
null
an adversary may attempt to enumerate the cloud services running on a system after gaining access
t1526
cloud service discovery
null
cloud service cloud service metadata cloud service cloud service enumeration
t1526
cloud service discovery
null
cloud service discovery techniques will likely occur throughout an operation where an adversary is targeting cloud based systems and services
t1526
cloud service discovery
null
data and events should not be viewed in isolation but as part of a chain of behavior that could lead to other activities based on the information obtained
t1526
cloud service discovery
null
monitor cloud service usage for anomalous behavior that may indicate adversarial presence within the environment
t1526
cloud service discovery
null
normal benign system and network events that look like cloud service discovery may be uncommon depending on the environment and how they are used
t1526
cloud service discovery
null
these methods can differ from platform as a service paas to infrastructure as a service iaas or software as a service saas
t1528
steal application access token
null
for example they can filter for apps that are authorized by a small number of users apps requesting high risk permissions permissions incongruous with the apps purpose or apps with old œlast authorized fields
t1528
steal application access token
null
0 access
t1528
steal application access token
null
a specific app can be investigated using an activity log displaying activities the app has performed although some activities may be mis logged as being performed by the user
t1528
steal application access token
null
administrators can set up a variety of logs and leverage audit tools to monitor actions that can be conducted as a result of oauth 2
t1528
steal application access token
null
administrators should set up monitoring to trigger automatic alerts when policy criteria are met
t1528
steal application access token
null
adversaries can steal user application access tokens as a means of acquiring credentials to access remote systems and resources
t1528
steal application access token
null
app stores can be useful resources to further investigate suspicious apps
t1528
steal application access token
null
for example using a cloud access security broker casb admins can create a high severity app permissions polic y that generates alerts if apps request high severity permissions or send permissions requests for too many users
t1528
steal application access token
null
for instance audit reports enable admins to identify privilege escalation actions such as role creations or policy modifications which could be actions performed after initial access
t1528
steal application access token
null
security analysts can hunt for malicious apps using the tools available in their casb identity provider or resource provider depending on platform
t1528
steal application access token
null
this can occur through social engineering and typically requires user action to grant access
t1528
steal application access token
null
user account user account modification
t1529
system shutdownreboot
null
adversaries may shutdownreboot systems to interrupt access to or aid in the destruction of those systems
t1529
system shutdownreboot
null
event id 1074 and 6006
t1529
system shutdownreboot
null
operating systems may contain commands to initiate a shutdownreboot of a machine
t1529
system shutdownreboot
null
process process creation command command execution sensor health host status
t1529
system shutdownreboot
null
use process monitoring to monitor the execution and command line parameters of binaries involved in shutting down or rebooting systems
t1529
system shutdownreboot
null
windows event logs may also designate activity associated with a shutdownreboot ex
t1530
data from cloud storage object
null
activity originating from unexpected sources may indicate improper permissions are set that is allowing access to data
t1530
data from cloud storage object
null
additionally detecting failed attempts by a user for a certain object followed by escalation of privileges by the same user and access to the same object may be an indication of suspicious activity
t1530
data from cloud storage object
null
adversaries may access data objects from improperly secured cloud storage
t1530
data from cloud storage object
null
cloud storage cloud storage access
t1530
data from cloud storage object
null
many cloud service providers offer solutions for online data storage such as amazon s3 azure storage and google cloud storage
t1530
data from cloud storage object
null
monitor for unusual queries to the cloud providers storage service
t1531
account access removal
null
accounts may be deleted locked or manipulated ex changed credentials to remove access to accounts
t1531
account access removal
null
adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users
t1531
account access removal
null
use process monitoring to monitor the execution and command line parameters of binaries involved in deleting accounts or changing passwords such as use of nets0039
t1531
account access removal
null
user account user account deletion user account user account modification active directory active directory object modification
t1531
account access removal
null
windows event logs may also designate activity associated with an adversarys attempt to remove access to an account * event id 4723 an attempt was made to change an accounts password * event id 4724 an attempt was made to reset an accounts password * event id 4726 a user account was deleted * event id 4740 a user account was locked out alerting on nets0039 and these event ids may generate a high degree of false positives so compare against baseline knowledge for how systems are typically used and correlate modification events with other indications of malicious activity where possible
t1534
internal spear phishing
null
adversaries may use internal spear phishing to gain access to additional information or exploit other users within the same organization after they already have access to accounts or systems within the environment
t1534
internal spear phishing
null
application log application log content network traffic network traffic flow network traffic network traffic content
t1534
internal spear phishing
null
citation trend micro when phishing starts from the inside 2017
t1534
internal spear phishing
null
internal spear phishing is multi staged attack where an email account is owned either by controlling the users device with previously installed malware or by compromising the account credentials of the user
t1534
internal spear phishing
null
network intrusion detection systems and email gateways usually do not scan internal email but an organization can leverage the journaling based solution which sends a copy of emails to a security service for offline analysis or incorporate service integrated solutions using on premise or api based integrations to help detect internal spear phishing attacks
t1535
unusedunsupported cloud regions
null
access is usually obtained through compromising accounts used to manage cloud infrastructure
t1535
unusedunsupported cloud regions
null
adversaries may create cloud instances in unused geographic service regions in order to evade detection
t1535
unusedunsupported cloud regions
null
citation cloudsploit unused aws regions
t1535
unusedunsupported cloud regions
null
configure alerting to notify of activity in normally unused regions or if the number of instances active in a region goes above a certain threshold
t1535
unusedunsupported cloud regions
null
instance instance creation
t1535
unusedunsupported cloud regions
null
monitor system logs to review activities occurring across all cloud environments and regions
t1537
transfer data to cloud account
null
a defender who is monitoring for large transfers to outside the cloud environment through normal file transfers or over command and control channels may not be watching for data transfers to another account within the same cloud provider
t1537
transfer data to cloud account
null
adversaries may exfiltrate data by transferring the data including backups of cloud environments to another cloud account they control on the same service to avoid typical file transfersdownloads and network based exfiltration detection
t1537
transfer data to cloud account
null
monitor account activity for attempts to share data snapshots or backups with untrusted or unusual accounts on the same cloud service provider
t1537
transfer data to cloud account
null
monitor for anomalous file transfer activity between accounts and to untrusted vpcs
t1537
transfer data to cloud account
null
snapshot snapshot creation snapshot snapshot modification cloud storage cloud storage modification cloud storage cloud storage creation
t1538
cloud service dashboard
null
an adversary may use a cloud service dashboard gui with stolen credentials to gain useful information from an operational cloud environment such as specific services resources and features
t1538
cloud service dashboard
null
citation aws console sign in events
t1538
cloud service dashboard
null
for example the gcp command center can be used to view all assets findings of potential security risks and to run additional queries such as finding public ip addresses and open ports
t1538
cloud service dashboard
null
monitor account activity logs to see actions performed and activity associated with the cloud service management console
t1538
cloud service dashboard
null
some cloud providers such as aws provide distinct log events for login attempts to the management console
t1538
cloud service dashboard
null
user account user account authentication logon session logon session creation
t1539
steal web session cookie
null
an adversary may steal web application or service session cookies and use them to gain access to web applications or internet services as an authenticated user without needing credentials
t1539
steal web session cookie
null
file file access process process access
t1539
steal web session cookie
null
monitor for attempts by programs to inject into or dump browser process memory
t1539
steal web session cookie
null
monitor for attempts to access files and repositories on a local system that are used to store browser session cookies
t1539
steal web session cookie
null
web applications and services often use session cookies as an authentication token after a user has authenticated to a website
t1542
pre os boot
null
adversaries may abuse pre os boot mechanisms as a way to establish persistence on a system
t1542
pre os boot
null
citation itworld hard disk health dec 2014
t1542
pre os boot
null
command command execution network traffic network connection creation firmware firmware modification driver driver metadata process os api execution drive drive modification