id
stringlengths 5
9
| technique
stringlengths 3
43
| subtechniqueid
stringlengths 3
60
⌀ | sentences
stringlengths 1
871
|
---|---|---|---|
t1071 | application layer protocol | null | analyze network data for uncommon data flows e |
t1071 | application layer protocol | null | analyze packet contents to detect application layer protocols that do not follow the expected protocol standards regarding syntax structure or any other variable adversaries could leverage to conceal data |
t1071 | application layer protocol | null | citation university of birmingham c2 |
t1071 | application layer protocol | null | commands to the remote system and often the results of those commands will be embedded within the protocol traffic between the client and server |
t1071 | application layer protocol | null | network traffic network traffic flow network traffic network traffic content |
t1071 | application layer protocol | null | processes utilizing the network that do not normally have network communication or have never been seen before are suspicious |
t1072 | software deployment tools | null | a system not typically used to push software to clients that suddenly is used for such a task outside of a known admin function may be suspicious |
t1072 | software deployment tools | null | adversaries may gain access to and use third party software suites installed within an enterprise network such as administration monitoring and deployment systems to move laterally through the network |
t1072 | software deployment tools | null | analyze the process execution trees historical activities from the third party application such as what types of files are usually pushed and the resulting activities or events from the filebinaryscript pushed to systems |
t1072 | software deployment tools | null | application log application log content process process creation |
t1072 | software deployment tools | null | audit software deployment logs and look for suspicious or unauthorized activity |
t1072 | software deployment tools | null | detection methods will vary depending on the type of third party software or system and how it is typically used |
t1072 | software deployment tools | null | ensure that third party application logs are on boarded to the enterprise logging system and the logs are regularly reviewed |
t1072 | software deployment tools | null | monitor account login activity on the deployment system |
t1072 | software deployment tools | null | monitor account login activity on these applications to detect suspiciousabnormal usage |
t1072 | software deployment tools | null | monitor process activity that does not correlate to known good software |
t1072 | software deployment tools | null | often these third party applications will have logs of their own that can be collected and correlated with other data from the environment |
t1072 | software deployment tools | null | perform application deployment at regular times so that irregular deployment activity stands out |
t1072 | software deployment tools | null | the same investigation process can be applied here as with other potentially malicious activities where the distribution vector is initially unknown but the resulting activity follows a discernible pattern |
t1072 | software deployment tools | null | third party applications and software deployment systems may be in use in the network environment for administration purposes e |
t1074 | data staged | null | to regularly check for compressed or encrypted data that may be indicative of staging |
t1074 | data staged | null | adversaries may stage collected data in a central location or directory prior to exfiltration |
t1074 | data staged | null | data may also be acquired and staged through windows system management tools such as windows management instrumentationt1047 and powershellt1059 |
t1074 | data staged | null | data may be kept in separate files or combined into one file through techniques such as archive collected datat1560 |
t1074 | data staged | null | file file access file file creation command command execution |
t1074 | data staged | null | monitor processes and command line arguments for actions that could be taken to collect and combine files |
t1074 | data staged | null | monitor publicly writable directories central locations and commonly used staging directories recycle bin temp folders etc |
t1074 | data staged | null | processes that appear to be reading files from disparate locations and writing them to the same directory or file may be an indication of data being staged especially if they are suspected of performing encryption or compression on the files such as 7zip rar zip or zlib |
t1074 | data staged | null | remote access tools with built in features may interact directly with the windows api to gather and copy to a location |
t1078 | valid accounts | null | a user has an active login session but has not entered the building or does not have vpn access |
t1078 | valid accounts | null | activity may be from interactive login sessions or process ownership from accounts being used to execute binaries on a remote system as a particular account |
t1078 | valid accounts | null | adversaries may obtain and abuse credentials of existing accounts as a means of gaining initial access persistence privilege escalation or defense evasion |
t1078 | valid accounts | null | checks on these accounts could also include whether default accounts such as guest have been activated |
t1078 | valid accounts | null | citation technet audit policy look for suspicious account behavior across systems that share accounts either user admin or service accounts |
t1078 | valid accounts | null | compromised credentials may be used to bypass access controls placed on various resources on systems within the network and may even be used for persistent access to remote systems and externally available services such as vpns outlook web access and remote desktop |
t1078 | valid accounts | null | configure robust consistent account activity audit policies across the enterprise and with externally accessible services |
t1078 | valid accounts | null | correlate other security systems with login information e |
t1078 | valid accounts | null | examples one account logged into multiple systems simultaneously; multiple accounts logged into the same machine simultaneously; accounts logged in at odd times or outside of business hours |
t1078 | valid accounts | null | logon session logon session metadata user account user account authentication logon session logon session creation |
t1078 | valid accounts | null | perform regular audits of domain and local system accounts to detect accounts that may have been created by an adversary for persistence |
t1078 | valid accounts | null | these audits should also include checks on any appliances and applications for default credentials or ssh keys and if any are discovered they should be updated immediately |
t1080 | taint shared content | null | adversaries may deliver payloads to remote systems by adding content to shared storage locations such as network drives or internal code repositories |
t1080 | taint shared content | null | content stored on network drives or in other shared locations may be tainted by adding malicious programs scripts or exploit code to otherwise valid files |
t1080 | taint shared content | null | frequently scan shared network directories for malicious files hidden files |
t1080 | taint shared content | null | lnk files and other file types that may not typical exist in directories used to share specific types of content |
t1080 | taint shared content | null | monitor processes that are executed from removable media for malicious or abnormal activity such as network connections due to command and control and possible network discovery techniques |
t1080 | taint shared content | null | process process creation file file creation file file modification network share network share access |
t1080 | taint shared content | null | processes that write or overwrite many files to a network shared directory may be suspicious |
t1082 | system information discovery | null | adversaries may use the information from system information discoveryt1082 during automated discovery to shape follow on behaviors including whether or not the adversary fully infects the target andor attempts specific actions |
t1082 | system information discovery | null | an adversary may attempt to get detailed information about the operating system and hardware including version patches hotfixes service packs and architecture |
t1082 | system information discovery | null | data and events should not be viewed in isolation but as part of a chain of behavior that could lead to other activities based on the information obtained |
t1082 | system information discovery | null | depending on how the environment is used that data alone may not be useful due to benign use during normal operations |
t1082 | system information discovery | null | in cloud based systems native logging can be used to identify access to certain apis and dashboards that may contain system information |
t1082 | system information discovery | null | information may also be acquired through windows system management tools such as windows management instrumentationt1047 and powershellt1059 |
t1082 | system information discovery | null | instance instance metadata process process creation command command execution process os api execution |
t1082 | system information discovery | null | monitor processes and command line arguments for actions that could be taken to gather system and network information |
t1082 | system information discovery | null | remote access tools with built in features may interact directly with the windows api to gather information |
t1082 | system information discovery | null | system and network discovery techniques normally occur throughout an operation as an adversary learns the environment |
t1083 | file and directory discovery | null | adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system |
t1083 | file and directory discovery | null | adversaries may use the information from file and directory discoveryt1083 during automated discovery to shape follow on behaviors including whether or not the adversary fully infects the target andor attempts specific actions |
t1083 | file and directory discovery | null | data and events should not be viewed in isolation but as part of a chain of behavior that could lead to other activities such as collection and exfiltration based on the information obtained |
t1083 | file and directory discovery | null | information may also be acquired through windows system management tools such as windows management instrumentationt1047 and powershellt1059 |
t1083 | file and directory discovery | null | monitor processes and command line arguments for actions that could be taken to gather system and network information |
t1083 | file and directory discovery | null | process process creation command command execution process os api execution |
t1083 | file and directory discovery | null | remote access tools with built in features may interact directly with the windows api to gather information |
t1083 | file and directory discovery | null | system and network discovery techniques normally occur throughout an operation as an adversary learns the environment |
t1104 | multi stage channels | null | adversaries may create multiple stages for command and control that are employed under different conditions or for certain functions |
t1104 | multi stage channels | null | host data that can relate unknown or suspicious process activity using a network connection is important to supplement any existing indicators of compromise based on malware command and control signatures and infrastructure |
t1104 | multi stage channels | null | network traffic network traffic flow network traffic network connection creation |
t1104 | multi stage channels | null | relating subsequent actions that may result from discovery of the system and network information or lateral movement to the originating process may also yield useful data |
t1104 | multi stage channels | null | use of multiple stages may obfuscate the command and control channel to make detection more difficult |
t1105 | ingress tool transfer | null | a client sending significantly more data than it receives from a server |
t1105 | ingress tool transfer | null | adversaries may transfer tools or other files from an external system into a compromised environment |
t1105 | ingress tool transfer | null | analyze network data for uncommon data flows e |
t1105 | ingress tool transfer | null | analyze packet contents to detect communications that do not follow the expected protocol behavior for the port that is being used |
t1105 | ingress tool transfer | null | citation university of birmingham c2 |
t1105 | ingress tool transfer | null | files may be copied from an external adversary controlled system through the command and control channel to bring tools into the victim network or through alternate protocols with another tool such as ftp |
t1105 | ingress tool transfer | null | monitor for file creation and files transferred into the network |
t1105 | ingress tool transfer | null | network traffic network traffic flow network traffic network connection creation network traffic network traffic content file file creation |
t1105 | ingress tool transfer | null | processes utilizing the network that do not normally have network communication or have never been seen before are suspicious |
t1105 | ingress tool transfer | null | unusual processes with external network connections creating files on system may be suspicious |
t1105 | ingress tool transfer | null | use of utilities such as ftp that does not normally occur may also be suspicious |
t1110.001 | brute force | password Technique guessing | apt28 has used a brute-force password-spray tooling that operated in two modes: in brute-force mode it typically sent over 300 authentication attempts per hour per targeted account over the course of several hours or days. |
t1110.001 | brute force | password Technique guessing | china chopper's server component can perform brute force password guessing against authentication portals. |
t1110.001 | brute force | password Technique guessing | crackmapexec can brute force passwords for a specified user on a single target system or across an entire network. |
t1110.001 | brute force | password Technique guessing | emotet has been observed using a hard coded list of passwords to brute force user accounts. |
t1110.001 | brute force | password Technique guessing | lucifer has attempted to brute force tcp ports 135 rpc and 1433 mssql with the default username or list of usernames and passwords. |
t1110.001 | brute force | password Technique guessing | p.a.s. webshell can use predefined users and passwords to execute brute force attacks against ssh ftp pop3 mysql mssql and postgresql services. |
t1110.001 | brute force | password Technique guessing | pony has used a small dictionary of common passwords against a collected list of local accounts. |
t1110.001 | brute force | password Technique guessing | speakup can perform brute forcing using a predefined list of usernames and passwords in an attempt to log in to administrative panels. |
t1110.001 | brute force | password Technique guessing | xbash can obtain a list of weak passwords from the c2 server to use for brute forcing as well as attempt to brute force services with open ports. |
t1125 | video capture | null | an adversary can leverage a computers peripheral devices e |
t1125 | video capture | null | behavior that could indicate technique use include an unknown or unusual process accessing apis associated with devices or software that interact with the video camera recording devices or recording software and a process periodically writing files to disk that contain video or camera image data |
t1125 | video capture | null | detection of this technique may be difficult due to the various apis that may be used |
t1125 | video capture | null | process os api execution command command execution |
t1125 | video capture | null | telemetry data regarding api use may not be useful depending on how a system is normally used but may provide context to other potentially malicious activity occurring on a system |
t1127 | trusted developer utilities proxy execution | null | adversaries may take advantage of trusted developer utilities to proxy execution of malicious payloads |
t1127 | trusted developer utilities proxy execution | null | command arguments used before and after invocation of the utilities may also be useful in determining the origin and purpose of the binary being executed |
t1127 | trusted developer utilities proxy execution | null | compare recent invocations of those binaries with prior history of known good arguments and executed binaries to determine anomalous and potentially adversarial activity |
t1127 | trusted developer utilities proxy execution | null | it is likely that these utilities will be used by software developers or for other software development related tasks so if it exists and is used outside of that context then the event may be suspicious |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.