id
stringlengths
5
9
technique
stringlengths
3
43
subtechniqueid
stringlengths
3
60
sentences
stringlengths
1
871
t1211
exploitation for defense evasion
null
this could include suspicious files written to disk evidence of process injectiont1055 for attempts to hide execution or evidence of discovery
t1212
exploitation for credential access
null
adversaries may exploit software vulnerabilities in an attempt to collect credentials
t1212
exploitation for credential access
null
also look for behavior on the system that might indicate successful compromise such as abnormal behavior of processes
t1212
exploitation for credential access
null
credential resources obtained through exploitation may be detectable in use if they are not normally used or seen
t1212
exploitation for credential access
null
detecting software exploitation may be difficult depending on the tools available
t1212
exploitation for credential access
null
exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program service or within the operating system software or kernel itself to execute adversary controlled code
t1212
exploitation for credential access
null
software exploits may not always succeed or may cause the exploited process to become unstable or crash
t1213
data from information repositories
null
adversaries may leverage information repositories to mine valuable information
t1213
data from information repositories
null
as information repositories generally have a considerably large user base detection of malicious use can be non trivial
t1213
data from information repositories
null
at minimum access to information repositories performed by privileged users for example active directory domain enterprise or schema administrators should be closely monitored and alerted upon as these types of accounts should generally not be used to access information repositories
t1213
data from information repositories
null
citation atlassian confluence logging additional log storage and analysis infrastructure will likely be required for more robust detection capabilities
t1213
data from information repositories
null
citation microsoft sharepoint logging sharepoint audit logging can also be configured to report when a user shares a resource
t1213
data from information repositories
null
citation sharepoint sharing events the user access logging within atlassians confluence can also be configured to report access to certain pages and documents through accesslogfilter
t1213
data from information repositories
null
if the capability exists it may be of value to monitor and alert on users that are retrieving and viewing a large number of documents and pages; this behavior may be indicative of programmatic means being used to retrieve all data within the repository
t1213
data from information repositories
null
in environments with high maturity it may be possible to leverage user behavioral analytics uba platforms to detect and alert on user based anomalies
t1213
data from information repositories
null
information repositories are tools that allow for storage of information typically to facilitate collaboration or information sharing between users and can store a wide variety of data that may aid adversaries in further objectives or direct access to the target information
t1213
data from information repositories
null
logon session logon session creation application log application log content
t1213
data from information repositories
null
the user access logging within microsofts sharepoint can be configured to report access to certain pages and documents
t1216
signed script proxy execution
null
adversaries may use scripts signed with trusted certificates to proxy execution of malicious files
t1216
signed script proxy execution
null
monitor script processes such as cscript and command line parameters for scripts like pubprn
t1216
signed script proxy execution
null
process process creation command command execution script script execution
t1216
signed script proxy execution
null
several microsoft signed scripts that are default on windows installations can be used to proxy execution of other files
t1216
signed script proxy execution
null
vbs that may be used to proxy execution of malicious files
t1217
browser bookmark discovery
null
adversaries may enumerate browser bookmarks to learn more about compromised hosts
t1217
browser bookmark discovery
null
browser bookmarks may reveal personal information about users ex banking sites interests social media etc
t1217
browser bookmark discovery
null
data and events should not be viewed in isolation but as part of a chain of behavior that could lead to other activities such as collection and exfiltration based on the information obtained
t1217
browser bookmark discovery
null
information may also be acquired through system management tools such as windows management instrumentationt1047 and powershellt1059
t1217
browser bookmark discovery
null
monitor processes and command line arguments for actions that could be taken to gather browser bookmark information
t1217
browser bookmark discovery
null
process process creation command command execution file file access
t1217
browser bookmark discovery
null
remote access tools with built in features may interact directly using apis to gather information
t1217
browser bookmark discovery
null
system and network discovery techniques normally occur throughout an operation as an adversary learns the environment
t1218
signed binary proxy execution
null
especially for file types that are not typical within an environment and may be indicative of adversary activity
t1218
signed binary proxy execution
null
adversaries may bypass process andor signature based defenses by proxying execution of malicious content with signed binaries
t1218
signed binary proxy execution
null
binaries signed with trusted digital certificates can execute on windows systems protected by digital signature validation
t1218
signed binary proxy execution
null
compare recent invocations of signed binaries that may be used to proxy execution with prior history of known good arguments and loaded files to determine anomalous and potentially adversarial activity
t1218
signed binary proxy execution
null
correlate activity with other suspicious behavior to reduce false positives that may be due to normal benign use by users and administrators
t1218
signed binary proxy execution
null
exe downloading an msi file from the internet may be indicative of an intrusion
t1218
signed binary proxy execution
null
legitimate programs used in suspicious ways like msiexec
t1218
signed binary proxy execution
null
monitor for file activity creations downloads modifications etc
t1218
signed binary proxy execution
null
monitor processes and command line parameters for signed binaries that may be used to proxy execution of malicious files
t1218
signed binary proxy execution
null
process process creation file file creation module module load process os api execution command command execution windows registry windows registry key modification network traffic network connection creation
t1219
remote access software
null
a client sending significantly more data than it receives from a server
t1219
remote access software
null
004 may be used in conjunction to avoid defenses
t1219
remote access software
null
adversaries will likely need to deploy andor install these remote tools to compromised systems
t1219
remote access software
null
an adversary may use legitimate desktop support and remote access software such as team viewer go2assist logmein ammyy admin etc to establish an interactive command and control channel to target systems within networks
t1219
remote access software
null
analyze network data for uncommon data flows e
t1219
remote access software
null
analyze packet contents to detect application layer protocols that do not follow the expected protocol for the port that is being used
t1219
remote access software
null
correlate activity with other suspicious behavior that may reduce false positives if these tools are used by legitimate users and administrators
t1219
remote access software
null
domain fronting
t1219
remote access software
null
it may be possible to detect or prevent the installation of these tools with host based solutions
t1219
remote access software
null
monitor for applications and processes related to remote admin tools
t1219
remote access software
null
process process creation network traffic network traffic flow network traffic network connection creation network traffic network traffic content
t1219
remote access software
null
processes utilizing the network that do not normally have network communication or have never been seen before are suspicious
t1219
remote access software
null
these services are commonly used as legitimate technical support software and may be allowed by application control within a target environment
t1220
xsl script processing
null
adversaries may bypass application control and obscure execution of code by embedding scripts inside xsl files
t1220
xsl script processing
null
citation lolbas wmic citation twitter squiblytwo detection apr 2018 command arguments used before and after the script invocation may also be useful in determining the origin and purpose of the payload being loaded
t1220
xsl script processing
null
compare recent invocations of these utilities with prior history of known good arguments and loaded files to determine anomalous and potentially adversarial activity ex url command line arguments creation of external network connections loading of dlls associated with scripting
t1220
xsl script processing
null
exe or other utilities that enable proxy execution that are typically used for development debugging and reverse engineering on a system that is not used for these purposes may be suspicious
t1220
xsl script processing
null
extensible stylesheet language xsl files are commonly used to describe the processing and rendering of data within xml files
t1220
xsl script processing
null
process process creation module module load
t1220
xsl script processing
null
the presence of msxsl
t1220
xsl script processing
null
use process monitoring to monitor the execution and arguments of msxsl
t1221
template injection
null
001 or other suspicious actions that could relate to post compromise behavior
t1221
template injection
null
adversaries may create or modify references in office document templates to conceal malicious code or force authentication attempts
t1221
template injection
null
analyze process behavior to determine if an office application is performing actions such as opening network connections reading files spawning abnormal child processes ex powershellt1059
t1221
template injection
null
microsoft office open xml ooxml specification defines an xml based format for office documents
t1221
template injection
null
process process creation network traffic network connection creation network traffic network traffic content
t1222
file and directory permissions modification
null
adversaries may modify file or directory permissionsattributes to evade access control lists acls and access protected files
t1222
file and directory permissions modification
null
citation eventtracker file permissions feb 2014
t1222
file and directory permissions modification
null
citation hybrid analysis icacls 1 june 2018 citation hybrid analysis icacls 2 may 2018 file and directory permissions are commonly managed by acls configured by the file or directory owner or users with the appropriate permissions
t1222
file and directory permissions modification
null
consider enabling filedirectory permission change auditing on folders containing key binaryconfiguration files
t1222
file and directory permissions modification
null
for example windows security log events event id 4670 are created when dacls are modified
t1222
file and directory permissions modification
null
many of the commands used to modify acls and filedirectory ownership are built in system utilities and may generate a high false positive alert rate so compare against baseline knowledge for how systems are typically used and correlate modification events with other indications of malicious activity where possible
t1222
file and directory permissions modification
null
monitor and investigate attempts to modify acls and filedirectory ownership
t1222
file and directory permissions modification
null
process process creation command command execution active directory active directory object modification file file metadata
t1480
execution guardrails
null
adversaries may use execution guardrails to constrain execution or actions based on adversary supplied and environment specific conditions that are expected to be present on the target
t1480
execution guardrails
null
detecting the use of guardrails may be difficult depending on the implementation
t1480
execution guardrails
null
guardrails ensure that a payload only executes against an intended target and reduces collateral damage from an adversarys campaign
t1480
execution guardrails
null
monitoring for suspicious processes being spawned that gather a variety of system information or perform other forms of discoveryta0007 especially in a short period of time may aid in detection
t1480
execution guardrails
null
process process creation command command execution
t1482
domain trust discovery
null
adversaries may attempt to gather information on domain trust relationships that may be used to identify lateral movement opportunities in windows multi domainforest environments
t1482
domain trust discovery
null
citation harmj0y domain trusts information may also be acquired through windows system management tools such as powershellt1059
t1482
domain trust discovery
null
citation microsoft getalltrustrelationships
t1482
domain trust discovery
null
data and events should not be viewed in isolation but as part of a chain of behavior that could lead to other activities based on the information obtained
t1482
domain trust discovery
null
domain trusts provide a mechanism for a domain to allow access to resources based on the authentication procedures of another domain
t1482
domain trust discovery
null
look for the dsenumeratedomaintrusts win32 api call to spot activity associated with domain trust discoveryt1482
t1482
domain trust discovery
null
monitor processes and command line arguments for actions that could be taken to gather system and network information such as nltest domain_trusts
t1482
domain trust discovery
null
net method getall trust relationships can be an indicator of domain trust discovery
t1482
domain trust discovery
null
process process creation command command execution process os api execution script script execution
t1482
domain trust discovery
null
remote access tools with built in features may interact directly with the windows api to gather information
t1482
domain trust discovery
null
system and network discovery techniques normally occur throughout an operation as an adversary learns the environment
t1484
domain policy modification
null
active directory active directory object creation active directory active directory object deletion active directory active directory object modification command command execution
t1484
domain policy modification
null
adversaries may modify the configuration settings of a domain to evade defenses andor escalate privileges in domain environments
t1484
domain policy modification
null
citation microsoft azure sentinel adfs domain trust modscitation microsoft 365 defender solorigate this may also include monitoring for event id 307 which can be correlated to relevant event id 510 with the same instance id for change details
t1484
domain policy modification
null
citation microsoft update or repair federated domain some domain policy modifications such as changes to federation settings are likely to be rare
t1484
domain policy modification
null
citation microsoft 365 defender solorigate
t1484
domain policy modification
null
citation sygnia golden saml citation cisa solarwinds cloud detection consider monitoring for commandscmdlets and command line arguments that may be leveraged to modify domain policy settings
t1484
domain policy modification
null
domains provide a centralized means of managing how computer resources ex computers user accounts can act and interact with each other on a network
t1484
domain policy modification
null
group policy modifications for example may be logged under a variety of windows event ids for modifying creating undeleting moving and deleting directory service objects event id 5136 5137 5138 5139 5141 respectively
t1484
domain policy modification
null
it may be possible to detect domain policy modifications using windows event logs