id
stringlengths 5
9
| technique
stringlengths 3
43
| subtechniqueid
stringlengths 3
60
⌀ | sentences
stringlengths 1
871
|
---|---|---|---|
t1211
|
exploitation for defense evasion
| null |
this could include suspicious files written to disk evidence of process injectiont1055 for attempts to hide execution or evidence of discovery
|
t1212
|
exploitation for credential access
| null |
adversaries may exploit software vulnerabilities in an attempt to collect credentials
|
t1212
|
exploitation for credential access
| null |
also look for behavior on the system that might indicate successful compromise such as abnormal behavior of processes
|
t1212
|
exploitation for credential access
| null |
credential resources obtained through exploitation may be detectable in use if they are not normally used or seen
|
t1212
|
exploitation for credential access
| null |
detecting software exploitation may be difficult depending on the tools available
|
t1212
|
exploitation for credential access
| null |
exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program service or within the operating system software or kernel itself to execute adversary controlled code
|
t1212
|
exploitation for credential access
| null |
software exploits may not always succeed or may cause the exploited process to become unstable or crash
|
t1213
|
data from information repositories
| null |
adversaries may leverage information repositories to mine valuable information
|
t1213
|
data from information repositories
| null |
as information repositories generally have a considerably large user base detection of malicious use can be non trivial
|
t1213
|
data from information repositories
| null |
at minimum access to information repositories performed by privileged users for example active directory domain enterprise or schema administrators should be closely monitored and alerted upon as these types of accounts should generally not be used to access information repositories
|
t1213
|
data from information repositories
| null |
citation atlassian confluence logging additional log storage and analysis infrastructure will likely be required for more robust detection capabilities
|
t1213
|
data from information repositories
| null |
citation microsoft sharepoint logging sharepoint audit logging can also be configured to report when a user shares a resource
|
t1213
|
data from information repositories
| null |
citation sharepoint sharing events the user access logging within atlassians confluence can also be configured to report access to certain pages and documents through accesslogfilter
|
t1213
|
data from information repositories
| null |
if the capability exists it may be of value to monitor and alert on users that are retrieving and viewing a large number of documents and pages; this behavior may be indicative of programmatic means being used to retrieve all data within the repository
|
t1213
|
data from information repositories
| null |
in environments with high maturity it may be possible to leverage user behavioral analytics uba platforms to detect and alert on user based anomalies
|
t1213
|
data from information repositories
| null |
information repositories are tools that allow for storage of information typically to facilitate collaboration or information sharing between users and can store a wide variety of data that may aid adversaries in further objectives or direct access to the target information
|
t1213
|
data from information repositories
| null |
logon session logon session creation application log application log content
|
t1213
|
data from information repositories
| null |
the user access logging within microsofts sharepoint can be configured to report access to certain pages and documents
|
t1216
|
signed script proxy execution
| null |
adversaries may use scripts signed with trusted certificates to proxy execution of malicious files
|
t1216
|
signed script proxy execution
| null |
monitor script processes such as cscript and command line parameters for scripts like pubprn
|
t1216
|
signed script proxy execution
| null |
process process creation command command execution script script execution
|
t1216
|
signed script proxy execution
| null |
several microsoft signed scripts that are default on windows installations can be used to proxy execution of other files
|
t1216
|
signed script proxy execution
| null |
vbs that may be used to proxy execution of malicious files
|
t1217
|
browser bookmark discovery
| null |
adversaries may enumerate browser bookmarks to learn more about compromised hosts
|
t1217
|
browser bookmark discovery
| null |
browser bookmarks may reveal personal information about users ex banking sites interests social media etc
|
t1217
|
browser bookmark discovery
| null |
data and events should not be viewed in isolation but as part of a chain of behavior that could lead to other activities such as collection and exfiltration based on the information obtained
|
t1217
|
browser bookmark discovery
| null |
information may also be acquired through system management tools such as windows management instrumentationt1047 and powershellt1059
|
t1217
|
browser bookmark discovery
| null |
monitor processes and command line arguments for actions that could be taken to gather browser bookmark information
|
t1217
|
browser bookmark discovery
| null |
process process creation command command execution file file access
|
t1217
|
browser bookmark discovery
| null |
remote access tools with built in features may interact directly using apis to gather information
|
t1217
|
browser bookmark discovery
| null |
system and network discovery techniques normally occur throughout an operation as an adversary learns the environment
|
t1218
|
signed binary proxy execution
| null |
especially for file types that are not typical within an environment and may be indicative of adversary activity
|
t1218
|
signed binary proxy execution
| null |
adversaries may bypass process andor signature based defenses by proxying execution of malicious content with signed binaries
|
t1218
|
signed binary proxy execution
| null |
binaries signed with trusted digital certificates can execute on windows systems protected by digital signature validation
|
t1218
|
signed binary proxy execution
| null |
compare recent invocations of signed binaries that may be used to proxy execution with prior history of known good arguments and loaded files to determine anomalous and potentially adversarial activity
|
t1218
|
signed binary proxy execution
| null |
correlate activity with other suspicious behavior to reduce false positives that may be due to normal benign use by users and administrators
|
t1218
|
signed binary proxy execution
| null |
exe downloading an msi file from the internet may be indicative of an intrusion
|
t1218
|
signed binary proxy execution
| null |
legitimate programs used in suspicious ways like msiexec
|
t1218
|
signed binary proxy execution
| null |
monitor for file activity creations downloads modifications etc
|
t1218
|
signed binary proxy execution
| null |
monitor processes and command line parameters for signed binaries that may be used to proxy execution of malicious files
|
t1218
|
signed binary proxy execution
| null |
process process creation file file creation module module load process os api execution command command execution windows registry windows registry key modification network traffic network connection creation
|
t1219
|
remote access software
| null |
a client sending significantly more data than it receives from a server
|
t1219
|
remote access software
| null |
004 may be used in conjunction to avoid defenses
|
t1219
|
remote access software
| null |
adversaries will likely need to deploy andor install these remote tools to compromised systems
|
t1219
|
remote access software
| null |
an adversary may use legitimate desktop support and remote access software such as team viewer go2assist logmein ammyy admin etc to establish an interactive command and control channel to target systems within networks
|
t1219
|
remote access software
| null |
analyze network data for uncommon data flows e
|
t1219
|
remote access software
| null |
analyze packet contents to detect application layer protocols that do not follow the expected protocol for the port that is being used
|
t1219
|
remote access software
| null |
correlate activity with other suspicious behavior that may reduce false positives if these tools are used by legitimate users and administrators
|
t1219
|
remote access software
| null |
domain fronting
|
t1219
|
remote access software
| null |
it may be possible to detect or prevent the installation of these tools with host based solutions
|
t1219
|
remote access software
| null |
monitor for applications and processes related to remote admin tools
|
t1219
|
remote access software
| null |
process process creation network traffic network traffic flow network traffic network connection creation network traffic network traffic content
|
t1219
|
remote access software
| null |
processes utilizing the network that do not normally have network communication or have never been seen before are suspicious
|
t1219
|
remote access software
| null |
these services are commonly used as legitimate technical support software and may be allowed by application control within a target environment
|
t1220
|
xsl script processing
| null |
adversaries may bypass application control and obscure execution of code by embedding scripts inside xsl files
|
t1220
|
xsl script processing
| null |
citation lolbas wmic citation twitter squiblytwo detection apr 2018 command arguments used before and after the script invocation may also be useful in determining the origin and purpose of the payload being loaded
|
t1220
|
xsl script processing
| null |
compare recent invocations of these utilities with prior history of known good arguments and loaded files to determine anomalous and potentially adversarial activity ex url command line arguments creation of external network connections loading of dlls associated with scripting
|
t1220
|
xsl script processing
| null |
exe or other utilities that enable proxy execution that are typically used for development debugging and reverse engineering on a system that is not used for these purposes may be suspicious
|
t1220
|
xsl script processing
| null |
extensible stylesheet language xsl files are commonly used to describe the processing and rendering of data within xml files
|
t1220
|
xsl script processing
| null |
process process creation module module load
|
t1220
|
xsl script processing
| null |
the presence of msxsl
|
t1220
|
xsl script processing
| null |
use process monitoring to monitor the execution and arguments of msxsl
|
t1221
|
template injection
| null |
001 or other suspicious actions that could relate to post compromise behavior
|
t1221
|
template injection
| null |
adversaries may create or modify references in office document templates to conceal malicious code or force authentication attempts
|
t1221
|
template injection
| null |
analyze process behavior to determine if an office application is performing actions such as opening network connections reading files spawning abnormal child processes ex powershellt1059
|
t1221
|
template injection
| null |
microsoft office open xml ooxml specification defines an xml based format for office documents
|
t1221
|
template injection
| null |
process process creation network traffic network connection creation network traffic network traffic content
|
t1222
|
file and directory permissions modification
| null |
adversaries may modify file or directory permissionsattributes to evade access control lists acls and access protected files
|
t1222
|
file and directory permissions modification
| null |
citation eventtracker file permissions feb 2014
|
t1222
|
file and directory permissions modification
| null |
citation hybrid analysis icacls 1 june 2018 citation hybrid analysis icacls 2 may 2018 file and directory permissions are commonly managed by acls configured by the file or directory owner or users with the appropriate permissions
|
t1222
|
file and directory permissions modification
| null |
consider enabling filedirectory permission change auditing on folders containing key binaryconfiguration files
|
t1222
|
file and directory permissions modification
| null |
for example windows security log events event id 4670 are created when dacls are modified
|
t1222
|
file and directory permissions modification
| null |
many of the commands used to modify acls and filedirectory ownership are built in system utilities and may generate a high false positive alert rate so compare against baseline knowledge for how systems are typically used and correlate modification events with other indications of malicious activity where possible
|
t1222
|
file and directory permissions modification
| null |
monitor and investigate attempts to modify acls and filedirectory ownership
|
t1222
|
file and directory permissions modification
| null |
process process creation command command execution active directory active directory object modification file file metadata
|
t1480
|
execution guardrails
| null |
adversaries may use execution guardrails to constrain execution or actions based on adversary supplied and environment specific conditions that are expected to be present on the target
|
t1480
|
execution guardrails
| null |
detecting the use of guardrails may be difficult depending on the implementation
|
t1480
|
execution guardrails
| null |
guardrails ensure that a payload only executes against an intended target and reduces collateral damage from an adversarys campaign
|
t1480
|
execution guardrails
| null |
monitoring for suspicious processes being spawned that gather a variety of system information or perform other forms of discoveryta0007 especially in a short period of time may aid in detection
|
t1480
|
execution guardrails
| null |
process process creation command command execution
|
t1482
|
domain trust discovery
| null |
adversaries may attempt to gather information on domain trust relationships that may be used to identify lateral movement opportunities in windows multi domainforest environments
|
t1482
|
domain trust discovery
| null |
citation harmj0y domain trusts information may also be acquired through windows system management tools such as powershellt1059
|
t1482
|
domain trust discovery
| null |
citation microsoft getalltrustrelationships
|
t1482
|
domain trust discovery
| null |
data and events should not be viewed in isolation but as part of a chain of behavior that could lead to other activities based on the information obtained
|
t1482
|
domain trust discovery
| null |
domain trusts provide a mechanism for a domain to allow access to resources based on the authentication procedures of another domain
|
t1482
|
domain trust discovery
| null |
look for the dsenumeratedomaintrusts win32 api call to spot activity associated with domain trust discoveryt1482
|
t1482
|
domain trust discovery
| null |
monitor processes and command line arguments for actions that could be taken to gather system and network information such as nltest domain_trusts
|
t1482
|
domain trust discovery
| null |
net method getall trust relationships can be an indicator of domain trust discovery
|
t1482
|
domain trust discovery
| null |
process process creation command command execution process os api execution script script execution
|
t1482
|
domain trust discovery
| null |
remote access tools with built in features may interact directly with the windows api to gather information
|
t1482
|
domain trust discovery
| null |
system and network discovery techniques normally occur throughout an operation as an adversary learns the environment
|
t1484
|
domain policy modification
| null |
active directory active directory object creation active directory active directory object deletion active directory active directory object modification command command execution
|
t1484
|
domain policy modification
| null |
adversaries may modify the configuration settings of a domain to evade defenses andor escalate privileges in domain environments
|
t1484
|
domain policy modification
| null |
citation microsoft azure sentinel adfs domain trust modscitation microsoft 365 defender solorigate this may also include monitoring for event id 307 which can be correlated to relevant event id 510 with the same instance id for change details
|
t1484
|
domain policy modification
| null |
citation microsoft update or repair federated domain some domain policy modifications such as changes to federation settings are likely to be rare
|
t1484
|
domain policy modification
| null |
citation microsoft 365 defender solorigate
|
t1484
|
domain policy modification
| null |
citation sygnia golden saml citation cisa solarwinds cloud detection consider monitoring for commandscmdlets and command line arguments that may be leveraged to modify domain policy settings
|
t1484
|
domain policy modification
| null |
domains provide a centralized means of managing how computer resources ex computers user accounts can act and interact with each other on a network
|
t1484
|
domain policy modification
| null |
group policy modifications for example may be logged under a variety of windows event ids for modifying creating undeleting moving and deleting directory service objects event id 5136 5137 5138 5139 5141 respectively
|
t1484
|
domain policy modification
| null |
it may be possible to detect domain policy modifications using windows event logs
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.