File size: 59,586 Bytes
b08f27a
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
f26ee1e
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
b08f27a
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
[
  {
    "id": "qa-001",
    "question": "What is the MITRE ATT&CK framework?",
    "answer": "MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a globally accessible knowledge base documenting the tactics and techniques used by cyber attackers based on real-world observations. Created by MITRE Corporation, it serves as a reference for understanding adversary behavior, improving defenses, and structuring security operations. The framework covers Enterprise, Mobile, and ICS matrices.",
    "category": "general",
    "reference": "",
    "difficulty": "beginner",
    "keywords": [
      "MITRE ATT&CK",
      "framework",
      "cybersecurity",
      "tactics",
      "techniques"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-002",
    "question": "How many tactics are in MITRE ATT&CK Enterprise?",
    "answer": "MITRE ATT&CK Enterprise contains 14 tactics representing the strategic objectives of an attacker: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Exfiltration, Command and Control, and Impact.",
    "category": "general",
    "reference": "",
    "difficulty": "beginner",
    "keywords": [
      "tactics",
      "14",
      "Enterprise"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-003",
    "question": "What is the difference between a tactic and a technique?",
    "answer": "A tactic represents the 'why' - the adversary's tactical objective (e.g., gain initial access). A technique represents the 'how' - the specific method used to achieve that objective (e.g., phishing). A technique can be associated with multiple tactics, and each tactic contains many alternative techniques.",
    "category": "general",
    "reference": "",
    "difficulty": "beginner",
    "keywords": [
      "tactic",
      "technique",
      "difference"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-004",
    "question": "What is a sub-technique in MITRE ATT&CK?",
    "answer": "A sub-technique is a more specific variant of a technique. For example, T1566 (Phishing) has sub-techniques like T1566.001 (Spearphishing Attachment), T1566.002 (Spearphishing Link), and T1566.003 (Spearphishing via Service). Sub-techniques allow for more precise descriptions of adversary behavior.",
    "category": "general",
    "reference": "T1566",
    "difficulty": "beginner",
    "keywords": [
      "sub-technique",
      "phishing",
      "spearphishing"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-005",
    "question": "How is phishing categorized in ATT&CK?",
    "answer": "Phishing (T1566) is categorized under the Initial Access tactic (TA0001). It has several sub-techniques: T1566.001 (Spearphishing Attachment), T1566.002 (Spearphishing Link), T1566.003 (Spearphishing via Service), and T1566.004 (Spearphishing Voice). There is also T1598 (Phishing for Information) under the Reconnaissance tactic.",
    "category": "technique",
    "reference": "T1566",
    "difficulty": "beginner",
    "keywords": [
      "phishing",
      "spearphishing",
      "initial access"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-006",
    "question": "What is process injection (T1055)?",
    "answer": "Process injection is a defense evasion and privilege escalation technique. The attacker injects malicious code into a legitimate running process to hide their activity. Sub-techniques include DLL injection, Process Hollowing, Thread Execution Hijacking, and APC injection. This technique allows executing code in the security context of another process.",
    "category": "technique",
    "reference": "T1055",
    "difficulty": "intermediate",
    "keywords": [
      "injection",
      "process",
      "DLL",
      "evasion"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-007",
    "question": "What is credential dumping (T1003)?",
    "answer": "OS Credential Dumping (T1003) is a technique for extracting credentials from the operating system. Sub-techniques include LSASS Memory (T1003.001), Security Account Manager (T1003.002), NTDS (T1003.003), LSA Secrets (T1003.004), and DCSync (T1003.006). Common tools include Mimikatz, secretsdump.py (Impacket), and procdump.",
    "category": "technique",
    "reference": "T1003",
    "difficulty": "intermediate",
    "keywords": [
      "credential dumping",
      "credentials",
      "Mimikatz",
      "LSASS"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-008",
    "question": "How does Kerberoasting work?",
    "answer": "Kerberoasting (T1558.003) exploits the Kerberos protocol in Active Directory. The attacker requests service tickets (TGS) for service accounts with configured SPNs. These tickets are encrypted with the service account password hash and can be cracked offline via brute force. It's a credential access technique that doesn't require elevated privileges.",
    "category": "technique",
    "reference": "T1558.003",
    "difficulty": "advanced",
    "keywords": [
      "Kerberoasting",
      "Kerberos",
      "Active Directory",
      "TGS",
      "SPN"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr/articles/attaques-active-directory/ntlm-relay-attacks-guide.html"
  },
  {
    "id": "qa-009",
    "question": "What is lateral movement and what techniques are used?",
    "answer": "Lateral Movement (TA0008) is the tactic by which an attacker moves from one system to another within the network after initial access. Key techniques include: Remote Services (T1021) like RDP, SMB, SSH, and WinRM; Lateral Tool Transfer (T1570); Exploitation of Remote Services (T1210); Internal Spearphishing (T1534); and Use Alternate Authentication Material (T1550) like Pass-the-Hash and Pass-the-Ticket.",
    "category": "tactic",
    "reference": "TA0008",
    "difficulty": "intermediate",
    "keywords": [
      "lateral movement",
      "RDP",
      "SMB",
      "Pass-the-Hash"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-010",
    "question": "How are ransomware attacks represented in ATT&CK?",
    "answer": "Ransomware uses multiple ATT&CK techniques. The primary one is T1486 (Data Encrypted for Impact) in the Impact tactic (TA0040). A typical ransomware also uses: T1490 (Inhibit System Recovery) to delete shadow copies, T1489 (Service Stop) to stop security services, T1021 (Remote Services) for lateral movement, and T1567 (Exfiltration Over Web Service) for double extortion.",
    "category": "technique",
    "reference": "T1486",
    "difficulty": "intermediate",
    "keywords": [
      "ransomware",
      "encryption",
      "impact",
      "shadow copies"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-011",
    "question": "What is APT28 (Fancy Bear)?",
    "answer": "APT28 (G0007), also known as Fancy Bear, Sofacy, Sednit, and STRONTIUM, is a cyber espionage group attributed to Russia's GRU military intelligence. Active since at least 2004, it targets governments, military, and security organizations. APT28 uses sophisticated techniques including spearphishing, zero-day exploits, and custom malware like X-Agent and Zebrocy.",
    "category": "group",
    "reference": "G0007",
    "difficulty": "intermediate",
    "keywords": [
      "APT28",
      "Fancy Bear",
      "Russia",
      "GRU",
      "espionage"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-012",
    "question": "What is the Lazarus Group?",
    "answer": "Lazarus Group (G0032) is a threat group attributed to North Korea (DPRK). Active since at least 2009, it's responsible for major attacks including the Sony Pictures hack (2014), the Bangladesh Bank heist (2016), and the WannaCry ransomware (2017). Lazarus targets financial, aerospace, and defense sectors with both financial and espionage motivations.",
    "category": "group",
    "reference": "G0032",
    "difficulty": "intermediate",
    "keywords": [
      "Lazarus",
      "North Korea",
      "WannaCry",
      "cyberattack"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-013",
    "question": "How to use MITRE ATT&CK for threat hunting?",
    "answer": "To use ATT&CK for threat hunting: 1) Identify the most relevant techniques for your environment. 2) Map your data sources (logs, EDR, SIEM) to ATT&CK techniques. 3) Create hunting hypotheses based on techniques (e.g., 'An attacker is using T1003 to dump credentials'). 4) Develop specific search queries. 5) Validate with ATT&CK Navigator coverage matrices to identify detection gaps.",
    "category": "general",
    "reference": "",
    "difficulty": "advanced",
    "keywords": [
      "threat hunting",
      "detection",
      "SIEM",
      "Navigator"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-014",
    "question": "What is the ATT&CK Navigator?",
    "answer": "ATT&CK Navigator is an open-source web tool developed by MITRE for visualizing and annotating the ATT&CK matrix. It allows: creating custom layers with color coding, visualizing SOC detection coverage, comparing techniques used by different groups, and identifying security gaps. It's available on GitHub (mitre-attack/attack-navigator) and as a hosted version.",
    "category": "general",
    "reference": "",
    "difficulty": "beginner",
    "keywords": [
      "Navigator",
      "visualization",
      "matrix",
      "coverage"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-015",
    "question": "How to map a security alert to ATT&CK?",
    "answer": "To map an alert to ATT&CK: 1) Analyze the alert and identify the observed behavior (e.g., encoded PowerShell process). 2) Find the corresponding technique (T1059.001 - PowerShell). 3) Identify the associated tactic (Execution). 4) Look for applicable sub-techniques. 5) Document the mapping in your SIEM/SOAR. 6) Check related techniques the attacker might use next in the kill chain.",
    "category": "general",
    "reference": "T1059.001",
    "difficulty": "intermediate",
    "keywords": [
      "mapping",
      "alert",
      "SIEM",
      "PowerShell",
      "detection"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-016",
    "question": "What are the most common AD persistence techniques?",
    "answer": "Most common AD persistence techniques: 1) T1098 (Account Manipulation) - adding users to privileged groups. 2) T1136 (Create Account) - creating backdoor accounts. 3) T1547 (Boot or Logon Autostart Execution) - malicious GPOs. 4) T1053 (Scheduled Task) - persistent tasks on domain controllers. 5) T1558 (Kerberos Tickets) - Golden Ticket and Silver Ticket for long-term Kerberos persistence.",
    "category": "technique",
    "reference": "TA0003",
    "difficulty": "advanced",
    "keywords": [
      "persistence",
      "Active Directory",
      "Golden Ticket",
      "GPO"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr/articles/attaques-active-directory/ntlm-relay-attacks-guide.html"
  },
  {
    "id": "qa-017",
    "question": "What is Pass-the-Hash?",
    "answer": "Pass-the-Hash (T1550.002) is a lateral movement technique where the attacker uses the NTLM hash of a password (instead of the plaintext password) to authenticate to remote systems. The attacker first extracts hashes via credential dumping (T1003), then uses them with tools like Mimikatz (sekurlsa::pth), Impacket, or CrackMapExec. Mitigations include using Credential Guard and restricting privileged accounts.",
    "category": "technique",
    "reference": "T1550.002",
    "difficulty": "advanced",
    "keywords": [
      "Pass-the-Hash",
      "NTLM",
      "lateral movement",
      "Mimikatz"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr/articles/attaques-active-directory/ntlm-relay-attacks-guide.html"
  },
  {
    "id": "qa-018",
    "question": "How do attackers use PowerShell in ATT&CK?",
    "answer": "PowerShell (T1059.001) is one of the most used execution techniques. Attackers exploit it to: execute malicious code in memory (fileless), download payloads (Invoke-WebRequest), perform reconnaissance (Get-ADUser, Get-NetComputer), perform lateral movement (Invoke-Command, Enter-PSSession), and run offensive frameworks (PowerSploit, Empire). Detection relies on ScriptBlock Logging, Module Logging, and AMSI.",
    "category": "technique",
    "reference": "T1059.001",
    "difficulty": "intermediate",
    "keywords": [
      "PowerShell",
      "execution",
      "fileless",
      "AMSI",
      "detection"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-019",
    "question": "What is the STIX format used by MITRE ATT&CK?",
    "answer": "STIX (Structured Threat Information eXpression) is an open standard from OASIS for representing cyber threat information. MITRE ATT&CK uses STIX 2.1 to distribute its data. Each ATT&CK object (technique, tactic, group, mitigation) is a STIX object with relationships. ATT&CK STIX data is available on GitHub (mitre-attack/attack-stix-data) and can be parsed with libraries like mitreattack-python or stix2.",
    "category": "general",
    "reference": "",
    "difficulty": "intermediate",
    "keywords": [
      "STIX",
      "format",
      "data",
      "standard",
      "OASIS"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-020",
    "question": "What are the main mitigations against phishing?",
    "answer": "ATT&CK mitigations against phishing (T1566): M1049 (Antivirus/Antimalware) - attachment scanning. M1031 (Network Intrusion Prevention) - email and URL filtering. M1021 (Restrict Web-Based Content) - phishing site filtering. M1054 (Software Configuration) - updating mail clients and browsers. M1017 (User Training) - phishing awareness. M1032 (Multi-factor Authentication) - protection even if credentials are compromised.",
    "category": "mitigation",
    "reference": "T1566",
    "difficulty": "beginner",
    "keywords": [
      "phishing",
      "mitigation",
      "MFA",
      "awareness"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-021",
    "question": "How does ATT&CK help evaluate SOC maturity?",
    "answer": "ATT&CK helps evaluate SOC maturity by: 1) Mapping existing detection rules to the ATT&CK matrix. 2) Identifying uncovered techniques (detection gaps). 3) Prioritizing the most relevant techniques for the environment. 4) Measuring coverage progression over time. 5) Comparing coverage with techniques used by threat groups targeting your sector. ATT&CK Navigator is the primary tool for this visualization.",
    "category": "general",
    "reference": "",
    "difficulty": "advanced",
    "keywords": [
      "SOC",
      "maturity",
      "coverage",
      "detection",
      "gaps"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-022",
    "question": "What is Living off the Land (LOLBins)?",
    "answer": "Living off the Land (LOL) refers to using legitimate tools and binaries already present on the system for malicious activities. In ATT&CK, this maps to: T1218 (System Binary Proxy Execution) including rundll32, mshta, regsvr32; T1216 (System Script Proxy Execution); T1127 (Trusted Developer Utilities); and T1047 (WMI). The advantage for attackers is evading detection since these tools are signed and trusted.",
    "category": "technique",
    "reference": "T1218",
    "difficulty": "intermediate",
    "keywords": [
      "LOLBins",
      "Living off the Land",
      "system binaries",
      "evasion"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-023",
    "question": "What is DCSync and how to detect it?",
    "answer": "DCSync (T1003.006) simulates domain controller behavior to request credential data replication via MS-DRSR. An attacker with Replicating Directory Changes rights can extract all account hashes, including krbtgt. Detection: monitor DrsGetNCChanges requests (Event ID 4662) from non-DC sources, monitor replication rights assignments (Event ID 4738), and use tools like MDI (Microsoft Defender for Identity).",
    "category": "technique",
    "reference": "T1003.006",
    "difficulty": "advanced",
    "keywords": [
      "DCSync",
      "replication",
      "Active Directory",
      "krbtgt",
      "detection"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr/articles/attaques-active-directory/ntlm-relay-attacks-guide.html"
  },
  {
    "id": "qa-024",
    "question": "What techniques are in the Reconnaissance tactic?",
    "answer": "The Reconnaissance tactic (TA0043) includes: T1595 (Active Scanning), T1592 (Gather Victim Host Information), T1589 (Gather Victim Identity Information), T1590 (Gather Victim Network Information), T1591 (Gather Victim Org Information), T1593 (Search Open Websites/Domains), T1594 (Search Victim-Owned Websites), T1596 (Search Open Technical Databases), T1597 (Search Closed Sources), T1598 (Phishing for Information).",
    "category": "tactic",
    "reference": "TA0043",
    "difficulty": "beginner",
    "keywords": [
      "reconnaissance",
      "OSINT",
      "scanning",
      "information gathering"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-025",
    "question": "How does a Golden Ticket attack work?",
    "answer": "Golden Ticket (T1558.001) is a Kerberos persistence technique. An attacker who has compromised the krbtgt account hash can forge TGTs (Ticket Granting Tickets) for any user with any privileges. These tickets are valid across the entire AD domain and can have very long lifetimes. The only complete remediation is resetting the krbtgt password twice. Detection: monitor ticket lifetime anomalies and discrepancies between ticket metadata and AD data.",
    "category": "technique",
    "reference": "T1558.001",
    "difficulty": "advanced",
    "keywords": [
      "Golden Ticket",
      "Kerberos",
      "krbtgt",
      "persistence",
      "TGT"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr/articles/attaques-active-directory/ntlm-relay-attacks-guide.html"
  },
  {
    "id": "qa-026",
    "question": "What is supply chain compromise in ATT&CK?",
    "answer": "Supply chain compromise (T1195) is an initial access technique where the attacker compromises a supplier or third-party product to reach the final target. Sub-techniques include: T1195.001 (Compromise Software Dependencies and Development Tools), T1195.002 (Compromise Software Supply Chain), T1195.003 (Compromise Hardware Supply Chain). The most notable example is the SolarWinds attack (2020) which compromised thousands of organizations via a trojanized software update.",
    "category": "technique",
    "reference": "T1195",
    "difficulty": "advanced",
    "keywords": [
      "supply chain",
      "SolarWinds",
      "third-party",
      "compromise"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-027",
    "question": "What is the Sandworm group?",
    "answer": "Sandworm (G0034), also known as Voodoo Bear, is a group attributed to Russia's GRU Unit 74455. Responsible for some of the most destructive cyberattacks: BlackEnergy against Ukraine's power grid (2015-2016), NotPetya (2017) causing $10 billion in damages, the 2018 Olympics attack (Olympic Destroyer), and Industroyer/CrashOverride against energy infrastructure. Sandworm heavily uses impact techniques (T1485, T1486, T1561) and targets critical infrastructure.",
    "category": "group",
    "reference": "G0034",
    "difficulty": "advanced",
    "keywords": [
      "Sandworm",
      "GRU",
      "NotPetya",
      "Ukraine",
      "critical infrastructure"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-028",
    "question": "How to use ATT&CK for incident response?",
    "answer": "ATT&CK structures incident response: 1) Identification: map observed IoCs to ATT&CK techniques to understand adversary TTPs. 2) Containment: identify used techniques to predict next steps and proactively block. 3) Eradication: use associated ATT&CK mitigations for each identified technique. 4) Recovery: verify all persistence techniques (TA0003) have been cleaned. 5) Lessons learned: document detected/missed techniques to improve future defenses.",
    "category": "general",
    "reference": "",
    "difficulty": "advanced",
    "keywords": [
      "incident response",
      "IoC",
      "TTP",
      "containment",
      "eradication"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-029",
    "question": "What are the differences between ATT&CK Enterprise, Mobile, and ICS?",
    "answer": "MITRE ATT&CK has three main matrices: Enterprise covers Windows, macOS, Linux, Cloud, Containers, and Network (14 tactics, ~700 techniques). Mobile covers Android and iOS (14 tactics, ~100 techniques) with mobile-specific techniques like SMS interception. ICS (Industrial Control Systems) covers SCADA/ICS (12 tactics) with techniques targeting industrial protocols (Modbus, OPC) and PLCs. Each matrix is tailored to its domain.",
    "category": "general",
    "reference": "",
    "difficulty": "beginner",
    "keywords": [
      "Enterprise",
      "Mobile",
      "ICS",
      "matrices",
      "differences"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-030",
    "question": "What is the MITRE CALDERA framework?",
    "answer": "CALDERA is an open-source adversary emulation framework developed by MITRE. It automatically simulates ATT&CK-based attack scenarios. Features: automatic attack chain planning, deployable agents on Windows/Linux/macOS, plugins for extending capabilities, autonomous red teaming and detection testing modes. CALDERA can be used for red team exercises, SOC detection testing, and defense validation. Available on GitHub (mitre/caldera).",
    "category": "general",
    "reference": "",
    "difficulty": "advanced",
    "keywords": [
      "CALDERA",
      "emulation",
      "automation",
      "red team",
      "agents"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-031",
    "question": "What is the Initial Access tactic (TA0001)?",
    "answer": "Initial Access (TA0001) represents the methods adversaries use to gain a first foothold in a target network. Key techniques include Phishing (T1566), Exploit Public-Facing Application (T1190), External Remote Services (T1133), Supply Chain Compromise (T1195), Valid Accounts (T1078), and Drive-by Compromise (T1189). This is often the first tactic in an attack chain. Organizations defend against initial access through email security gateways, web application firewalls, patch management, and network segmentation.",
    "category": "tactic",
    "reference": "TA0001",
    "difficulty": "beginner",
    "keywords": [
      "initial access",
      "phishing",
      "exploitation",
      "foothold"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-032",
    "question": "What is the Execution tactic (TA0002)?",
    "answer": "Execution (TA0002) covers techniques that result in adversary-controlled code running on a local or remote system. Key techniques include Command and Scripting Interpreter (T1059 - PowerShell, Bash, Python), Exploitation for Client Execution (T1203), System Services (T1569), and Windows Management Instrumentation (T1047). Detection focuses on process creation logs (Event ID 4688), script block logging, AMSI integration, and behavioral analysis of execution patterns.",
    "category": "tactic",
    "reference": "TA0002",
    "difficulty": "beginner",
    "keywords": [
      "execution",
      "PowerShell",
      "scripting",
      "WMI",
      "code execution"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-033",
    "question": "What is the Defense Evasion tactic (TA0005)?",
    "answer": "Defense Evasion (TA0005) is the tactic with the most techniques, covering methods adversaries use to avoid detection. Key techniques include Masquerading (T1036), Obfuscated Files (T1027), Process Injection (T1055), Indicator Removal (T1070), Disable or Modify Tools (T1562), and Rootkit (T1014). This tactic is critical because without detection evasion, most attacks would be caught early. Defense requires layered monitoring, behavioral detection, and integrity monitoring.",
    "category": "tactic",
    "reference": "TA0005",
    "difficulty": "intermediate",
    "keywords": [
      "defense evasion",
      "obfuscation",
      "masquerading",
      "process injection"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-034",
    "question": "What is the Exfiltration tactic (TA0010)?",
    "answer": "Exfiltration (TA0010) covers techniques for stealing data from the target network. Techniques include Exfiltration Over C2 Channel (T1041), Exfiltration Over Web Service (T1567 - using cloud storage like Google Drive, Dropbox), Exfiltration Over Alternative Protocol (T1048), Automated Exfiltration (T1020), and Data Transfer Size Limits (T1030). Detection relies on DLP solutions, network traffic analysis, unusual outbound data volumes, and monitoring connections to known file-sharing services.",
    "category": "tactic",
    "reference": "TA0010",
    "difficulty": "intermediate",
    "keywords": [
      "exfiltration",
      "data theft",
      "DLP",
      "C2",
      "cloud storage"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-035",
    "question": "What is the Impact tactic (TA0040)?",
    "answer": "Impact (TA0040) covers techniques to disrupt availability or compromise integrity. Key techniques include Data Encrypted for Impact (T1486 - ransomware), Data Destruction (T1485), Defacement (T1491), Inhibit System Recovery (T1490 - deleting shadow copies), Service Stop (T1489), and Resource Hijacking (T1496 - cryptomining). This tactic represents the attacker's end goal in destructive campaigns. Defense includes robust backups, immutable storage, and business continuity planning.",
    "category": "tactic",
    "reference": "TA0040",
    "difficulty": "intermediate",
    "keywords": [
      "impact",
      "ransomware",
      "destruction",
      "defacement",
      "cryptomining"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-036",
    "question": "What is T1190 (Exploit Public-Facing Application)?",
    "answer": "T1190 describes exploitation of vulnerabilities in internet-facing applications to gain access. This includes web applications, VPN gateways, email servers, and other exposed services. Notable examples include ProxyShell/ProxyLogon (Exchange), Log4Shell, Citrix ADC vulnerabilities, and Fortinet VPN exploits. Mitigations include timely patching (M1051), WAF deployment, network segmentation, and vulnerability management programs. Detection involves monitoring application logs for exploitation indicators and IDS/IPS signatures.",
    "category": "technique",
    "reference": "T1190",
    "difficulty": "intermediate",
    "keywords": [
      "exploitation",
      "public-facing",
      "vulnerability",
      "ProxyShell",
      "Log4Shell"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-037",
    "question": "What is T1078 (Valid Accounts)?",
    "answer": "T1078 describes adversaries obtaining and abusing legitimate credentials to gain access. Sub-techniques include Default Accounts (T1078.001), Domain Accounts (T1078.002), Local Accounts (T1078.003), and Cloud Accounts (T1078.004). This technique spans multiple tactics (Initial Access, Persistence, Privilege Escalation, Defense Evasion) because valid credentials bypass many security controls. Detection requires analyzing authentication anomalies, impossible travel, and unusual access patterns. MFA and privileged access management are key mitigations.",
    "category": "technique",
    "reference": "T1078",
    "difficulty": "intermediate",
    "keywords": [
      "valid accounts",
      "credentials",
      "authentication",
      "MFA",
      "defense evasion"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-038",
    "question": "What is Command and Control (TA0011)?",
    "answer": "Command and Control (TA0011) covers techniques adversaries use to communicate with compromised systems. Key techniques include Application Layer Protocol (T1071 - using HTTP/S, DNS, or email), Encrypted Channel (T1573), Proxy (T1090), Ingress Tool Transfer (T1105), and Non-Standard Port (T1571). Modern C2 frameworks like Cobalt Strike, Sliver, and Mythic use domain fronting, malleable profiles, and encrypted channels. Detection involves network traffic analysis, JA3/JA3S fingerprinting, DNS anomaly detection, and beacon pattern analysis.",
    "category": "tactic",
    "reference": "TA0011",
    "difficulty": "advanced",
    "keywords": [
      "C2",
      "command and control",
      "Cobalt Strike",
      "beacon",
      "DNS tunneling"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-039",
    "question": "What is APT29 (Cozy Bear)?",
    "answer": "APT29 (G0016), also known as Cozy Bear, The Dukes, and Nobelium, is attributed to Russia's SVR intelligence service. Responsible for the SolarWinds supply chain attack (2020/2021), targeting of COVID-19 vaccine research, and the DNC hack (2016). APT29 is known for sophisticated tradecraft including supply chain compromises, cloud abuse, token theft, and use of legitimate cloud services for C2. They favor stealth and long-term persistence over destructive operations.",
    "category": "group",
    "reference": "G0016",
    "difficulty": "advanced",
    "keywords": [
      "APT29",
      "Cozy Bear",
      "Nobelium",
      "SolarWinds",
      "SVR",
      "Russia"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-040",
    "question": "What is FIN7?",
    "answer": "FIN7 (G0046), also known as Carbanak and Navigator Group, is a financially motivated threat group active since 2013. They target retail, hospitality, and restaurant sectors using sophisticated phishing campaigns with weaponized documents. FIN7 uses custom malware (Carbanak, GRIFFON), point-of-sale malware for credit card theft, and has connections to various ransomware operations. They operate a professional structure with HR-like recruitment of unwitting participants.",
    "category": "group",
    "reference": "G0046",
    "difficulty": "intermediate",
    "keywords": [
      "FIN7",
      "Carbanak",
      "financial",
      "POS malware",
      "credit card"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-041",
    "question": "What is T1059.001 (PowerShell) and why is it significant?",
    "answer": "PowerShell (T1059.001) is one of the most frequently observed ATT&CK techniques. Adversaries use PowerShell for downloading payloads (IEX, Invoke-WebRequest), executing code in memory (fileless attacks), performing reconnaissance (Get-ADUser, Get-Process), and running offensive frameworks (PowerSploit, Empire, PowerView). Key detection mechanisms include Script Block Logging (Event ID 4104), Module Logging, Transcription Logging, and AMSI (Anti-Malware Scan Interface). Constrained Language Mode and Just Enough Administration (JEA) are effective mitigations.",
    "category": "technique",
    "reference": "T1059.001",
    "difficulty": "intermediate",
    "keywords": [
      "PowerShell",
      "fileless",
      "AMSI",
      "Script Block Logging",
      "Empire"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-042",
    "question": "What is the Collection tactic (TA0009)?",
    "answer": "Collection (TA0009) covers techniques for gathering data of interest before exfiltration. Key techniques include Data from Local System (T1005), Data from Network Shared Drive (T1039), Screen Capture (T1113), Clipboard Data (T1115), Email Collection (T1114), Audio Capture (T1123), and Archive Collected Data (T1560). Understanding collection techniques helps defenders identify what data adversaries target and implement appropriate protections like DLP, encryption at rest, and monitoring file access patterns.",
    "category": "tactic",
    "reference": "TA0009",
    "difficulty": "intermediate",
    "keywords": [
      "collection",
      "data gathering",
      "screen capture",
      "email",
      "archive"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-043",
    "question": "What is Cobalt Strike and how does it map to ATT&CK?",
    "answer": "Cobalt Strike is a commercial adversary simulation tool widely used by both red teams and real threat actors. It maps to numerous ATT&CK techniques: T1071.001 (HTTP C2), T1055 (Process Injection via Beacon), T1059.001 (PowerShell execution), T1021.002 (SMB/PsExec lateral movement), T1550.002 (Pass-the-Hash), T1003.001 (LSASS credential dumping), and T1573 (Encrypted C2). Its Malleable C2 profiles enable evasion (T1036). Detecting Cobalt Strike involves monitoring for named pipes, beacon sleep patterns, and specific network signatures.",
    "category": "general",
    "reference": "",
    "difficulty": "advanced",
    "keywords": [
      "Cobalt Strike",
      "Beacon",
      "C2",
      "Malleable profiles",
      "red team"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-044",
    "question": "What is T1021 (Remote Services) and its sub-techniques?",
    "answer": "Remote Services (T1021) is a lateral movement technique using legitimate remote access protocols. Sub-techniques include RDP (T1021.001), SMB/Windows Admin Shares (T1021.002), DCOM (T1021.003), SSH (T1021.004), VNC (T1021.005), and Windows Remote Management/WinRM (T1021.006). These are difficult to detect because they use legitimate protocols. Detection relies on baseline analysis of normal remote access patterns, monitoring for anomalous source-destination pairs, and restricting administrative protocols between workstations.",
    "category": "technique",
    "reference": "T1021",
    "difficulty": "intermediate",
    "keywords": [
      "remote services",
      "RDP",
      "SMB",
      "SSH",
      "lateral movement"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-045",
    "question": "How does ATT&CK define persistence techniques?",
    "answer": "Persistence (TA0003) covers techniques that allow adversaries to maintain access across restarts, changed credentials, or other interruptions. Major categories include Boot/Logon Autostart Execution (T1547 - registry run keys, startup folders), Scheduled Task/Job (T1053), Account Manipulation (T1098), Create Account (T1136), Server Software Component (T1505 - web shells), and Implant Internal Image (T1525). Each persistence mechanism requires specific detection: registry monitoring, scheduled task auditing, account change tracking, and file integrity monitoring.",
    "category": "tactic",
    "reference": "TA0003",
    "difficulty": "intermediate",
    "keywords": [
      "persistence",
      "autostart",
      "scheduled task",
      "web shell",
      "registry"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-046",
    "question": "What is the Discovery tactic (TA0007)?",
    "answer": "Discovery (TA0007) covers techniques for understanding the target environment. Key techniques include System Information Discovery (T1082), Account Discovery (T1087), Network Service Scanning (T1046), File and Directory Discovery (T1083), Permission Groups Discovery (T1069), Process Discovery (T1057), and Remote System Discovery (T1018). These techniques are often difficult to distinguish from normal administrative activity. Detection requires baselining normal discovery patterns and alerting on abnormal volumes or sequences of discovery commands.",
    "category": "tactic",
    "reference": "TA0007",
    "difficulty": "beginner",
    "keywords": [
      "discovery",
      "enumeration",
      "scanning",
      "reconnaissance",
      "internal"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-047",
    "question": "What is the Resource Development tactic (TA0042)?",
    "answer": "Resource Development (TA0042) covers techniques adversaries use to establish resources for operations before targeting victims. Techniques include Acquire Infrastructure (T1583 - domains, servers, cloud accounts), Compromise Infrastructure (T1584), Develop Capabilities (T1587 - malware, exploits), Obtain Capabilities (T1588 - buying malware, credentials), and Establish Accounts (T1585). This pre-attack tactic is difficult to detect as it occurs outside the target network. Threat intelligence sharing and monitoring certificate transparency logs help identify adversary infrastructure.",
    "category": "tactic",
    "reference": "TA0042",
    "difficulty": "advanced",
    "keywords": [
      "resource development",
      "infrastructure",
      "pre-attack",
      "domains",
      "malware development"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-048",
    "question": "What is T1562 (Impair Defenses)?",
    "answer": "Impair Defenses (T1562) is a defense evasion technique where adversaries disable or modify security tools. Sub-techniques include Disable or Modify Tools (T1562.001 - killing AV/EDR processes), Disable Windows Event Logging (T1562.002), Impair Command History Logging (T1562.003), Disable or Modify System Firewall (T1562.004), and Disable Cloud Logs (T1562.008). Detection involves monitoring for security tool process termination, audit policy changes, and log source gaps. Tamper-protected EDR and centralized log collection mitigate this technique.",
    "category": "technique",
    "reference": "T1562",
    "difficulty": "advanced",
    "keywords": [
      "impair defenses",
      "disable AV",
      "EDR evasion",
      "log tampering",
      "firewall disable"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-049",
    "question": "How do you build an ATT&CK-based detection strategy?",
    "answer": "Building an ATT&CK detection strategy involves: 1) Prioritize techniques based on threat intelligence for your sector and most commonly used techniques. 2) Map existing data sources (logs, EDR, NDR) to ATT&CK techniques using the Data Sources objects. 3) Identify gaps where you have no visibility. 4) Write detection rules (Sigma, YARA, Snort) mapped to specific technique IDs. 5) Test detections using atomic tests or adversary emulation tools. 6) Measure coverage using ATT&CK Navigator. 7) Iterate by expanding coverage based on risk priorities.",
    "category": "general",
    "reference": "",
    "difficulty": "advanced",
    "keywords": [
      "detection strategy",
      "data sources",
      "Sigma",
      "atomic tests",
      "coverage"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-050",
    "question": "What is T1547 (Boot or Logon Autostart Execution)?",
    "answer": "T1547 covers persistence mechanisms that execute during system boot or user logon. Sub-techniques include Registry Run Keys (T1547.001), Authentication Package (T1547.002), Winlogon Helper DLL (T1547.004), Security Support Provider (T1547.005), Kernel Modules (T1547.006), and Shortcut Modification (T1547.009). These are among the most common persistence techniques. Detection involves monitoring registry key modifications (HKCU/HKLM Run/RunOnce), startup folder changes, and autostart enumeration tools like Autoruns.",
    "category": "technique",
    "reference": "T1547",
    "difficulty": "intermediate",
    "keywords": [
      "autostart",
      "registry",
      "persistence",
      "Run keys",
      "Autoruns"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-051",
    "question": "What are data sources in ATT&CK and why are they important?",
    "answer": "Data sources in ATT&CK describe the types of telemetry needed to detect specific techniques. Examples include Process Creation, Network Traffic Flow, File Modification, Windows Registry Key Modification, and Command Execution. Each data source has data components (e.g., Process Creation has Process Created, Process Metadata). They are critical for detection engineering because they help organizations understand what logs and sensors are needed. Mapping data sources to your infrastructure reveals detection blind spots.",
    "category": "general",
    "reference": "",
    "difficulty": "intermediate",
    "keywords": [
      "data sources",
      "telemetry",
      "detection",
      "logs",
      "sensors"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-052",
    "question": "What is T1053 (Scheduled Task/Job)?",
    "answer": "Scheduled Task/Job (T1053) is used for both execution and persistence. Sub-techniques include At (T1053.002), Cron (T1053.003), Scheduled Task (T1053.005), and Container Orchestration Job (T1053.007). Attackers create scheduled tasks to execute malicious payloads at specified times or intervals, maintaining persistence across reboots. Detection involves monitoring task creation events (Event ID 4698), schtasks.exe execution, and unexpected cron entries. Common in ransomware and APT campaigns for staged execution.",
    "category": "technique",
    "reference": "T1053",
    "difficulty": "intermediate",
    "keywords": [
      "scheduled task",
      "cron",
      "persistence",
      "execution",
      "schtasks"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-053",
    "question": "What is ATT&CK for Cloud and what techniques are covered?",
    "answer": "ATT&CK for Cloud covers adversary techniques targeting cloud environments (AWS, Azure, GCP, SaaS, Office 365). Key techniques include Cloud Service Discovery (T1580), Cloud Infrastructure Discovery (T1580), Steal Application Access Token (T1528), Modify Cloud Compute Infrastructure (T1578), and Transfer Data to Cloud Account (T1537). Cloud-specific mitigations include IAM policy hardening, cloud audit logging (CloudTrail, Azure Monitor), conditional access policies, and cloud security posture management (CSPM) tools.",
    "category": "general",
    "reference": "",
    "difficulty": "advanced",
    "keywords": [
      "cloud",
      "AWS",
      "Azure",
      "GCP",
      "IAM",
      "cloud security"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-054",
    "question": "What is T1505.003 (Web Shell)?",
    "answer": "Web Shell (T1505.003) is a persistence technique where attackers install a malicious script on a web server that provides a backdoor for remote access. Web shells can be simple (one-line PHP eval) or sophisticated (China Chopper, WSO). They are commonly deployed after exploiting web application vulnerabilities. Detection involves file integrity monitoring on web directories, monitoring for unusual process creation by web server processes (w3wp.exe, httpd), and scanning for known web shell signatures. Network-based detection looks for unusual POST requests to unexpected files.",
    "category": "technique",
    "reference": "T1505.003",
    "difficulty": "intermediate",
    "keywords": [
      "web shell",
      "backdoor",
      "PHP",
      "China Chopper",
      "persistence"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-055",
    "question": "What is the Privilege Escalation tactic (TA0004)?",
    "answer": "Privilege Escalation (TA0004) covers techniques for gaining higher-level permissions. Key techniques include Exploitation for Privilege Escalation (T1068), Process Injection (T1055), Abuse Elevation Control Mechanism (T1548 - UAC bypass, sudo exploitation), Valid Accounts (T1078), and Access Token Manipulation (T1134). Many techniques overlap with Persistence. Detection requires monitoring for privilege changes, unusual service installations, and token manipulation. LAPS, PAM solutions, and least privilege enforcement are primary mitigations.",
    "category": "tactic",
    "reference": "TA0004",
    "difficulty": "intermediate",
    "keywords": [
      "privilege escalation",
      "UAC bypass",
      "token manipulation",
      "LAPS"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-056",
    "question": "How does ATT&CK help with purple team exercises?",
    "answer": "ATT&CK provides a common language and structure for purple team exercises. The red team selects techniques to simulate (using tools like Atomic Red Team, CALDERA, or manual execution), while the blue team verifies detection and response capabilities. Steps: 1) Select ATT&CK techniques relevant to your threat model. 2) Red team executes techniques in a controlled manner. 3) Blue team attempts to detect and respond. 4) Both teams collaborate to improve detection rules. 5) Document findings in ATT&CK Navigator layers showing tested vs detected techniques.",
    "category": "general",
    "reference": "",
    "difficulty": "advanced",
    "keywords": [
      "purple team",
      "adversary emulation",
      "Atomic Red Team",
      "detection validation"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-057",
    "question": "What is T1070 (Indicator Removal)?",
    "answer": "Indicator Removal (T1070) is a defense evasion technique where adversaries delete or modify artifacts to cover their tracks. Sub-techniques include Clear Windows Event Logs (T1070.001), Clear Linux/Mac System Logs (T1070.002), Clear Command History (T1070.003), File Deletion (T1070.004), Network Share Connection Removal (T1070.005), and Timestomp (T1070.006). Detection involves monitoring for log clearing events (Event ID 1102 for Security log), unexpected file deletions, and timestamp anomalies. Centralized logging to a tamper-proof location (SIEM) is the primary mitigation.",
    "category": "technique",
    "reference": "T1070",
    "difficulty": "intermediate",
    "keywords": [
      "indicator removal",
      "log clearing",
      "timestomp",
      "anti-forensics",
      "cover tracks"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-058",
    "question": "What is the Credential Access tactic (TA0006)?",
    "answer": "Credential Access (TA0006) covers techniques for stealing credentials. Key techniques include OS Credential Dumping (T1003), Brute Force (T1110), Steal or Forge Kerberos Tickets (T1558), Input Capture (T1056 - keylogging), Unsecured Credentials (T1552), and Forge Web Credentials (T1606). These credentials enable privilege escalation and lateral movement. Mitigations include Credential Guard, MFA, password policies, privileged access management, and monitoring for credential access indicators like LSASS memory access.",
    "category": "tactic",
    "reference": "TA0006",
    "difficulty": "intermediate",
    "keywords": [
      "credential access",
      "credential dumping",
      "brute force",
      "Kerberos",
      "keylogging"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-059",
    "question": "What is Atomic Red Team?",
    "answer": "Atomic Red Team is an open-source library of small, focused tests mapped to ATT&CK techniques. Each 'atomic test' simulates a single technique with minimal dependencies, making them easy to execute and validate detection capabilities. Tests are available for Windows, Linux, and macOS. They can be executed manually, via Invoke-AtomicRedTeam (PowerShell), or integrated into CI/CD pipelines for continuous detection validation. The project is maintained by Red Canary and available on GitHub with over 1,000 test cases covering hundreds of ATT&CK techniques.",
    "category": "general",
    "reference": "",
    "difficulty": "intermediate",
    "keywords": [
      "Atomic Red Team",
      "testing",
      "detection validation",
      "Red Canary",
      "automation"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-060",
    "question": "What is T1027 (Obfuscated Files or Information)?",
    "answer": "T1027 covers adversary use of obfuscation to hide malicious content. Sub-techniques include Binary Padding (T1027.001), Software Packing (T1027.002), Steganography (T1027.003), Compile After Delivery (T1027.004), Encrypted/Encoded File (T1027.013), and HTML Smuggling (T1027.006). Obfuscation helps evade signature-based detection. Detection involves entropy analysis, behavioral execution monitoring, AMSI for script deobfuscation, and sandboxing for packed executables. Static analysis of obfuscated files should be complemented by dynamic analysis.",
    "category": "technique",
    "reference": "T1027",
    "difficulty": "advanced",
    "keywords": [
      "obfuscation",
      "packing",
      "encoding",
      "steganography",
      "HTML smuggling"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-061",
    "question": "How is MITRE ATT&CK used in CTI (Cyber Threat Intelligence)?",
    "answer": "ATT&CK provides a structured framework for CTI analysis: 1) TTPs mapping: convert raw intelligence (IoCs, malware samples) into ATT&CK technique mappings for structured analysis. 2) Group tracking: associate observed techniques with known threat groups. 3) Trend analysis: identify which techniques are trending across the threat landscape. 4) Intelligence sharing: use ATT&CK IDs as a common vocabulary when sharing intelligence (STIX/TAXII). 5) Threat profiling: build profiles of adversaries targeting your sector to prioritize defenses.",
    "category": "general",
    "reference": "",
    "difficulty": "advanced",
    "keywords": [
      "CTI",
      "threat intelligence",
      "TTP",
      "STIX",
      "TAXII",
      "intelligence sharing"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-062",
    "question": "What is T1486 (Data Encrypted for Impact)?",
    "answer": "T1486 represents the core ransomware behavior - encrypting data to deny access and demand ransom. Modern ransomware operations combine T1486 with T1490 (Inhibit System Recovery - deleting shadow copies), T1489 (Service Stop - stopping backup agents), T1567 (Exfiltration - double extortion), and T1657 (Financial Theft). Notable ransomware families include LockBit, BlackCat/ALPHV, Royal, and Cl0p. Detection relies on monitoring for mass file modifications, known ransomware file extensions, and ransom note creation. Immutable backups and network segmentation are critical mitigations.",
    "category": "technique",
    "reference": "T1486",
    "difficulty": "intermediate",
    "keywords": [
      "ransomware",
      "encryption",
      "data encrypted",
      "LockBit",
      "double extortion"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-063",
    "question": "What are MITRE ATT&CK mitigations and how are they used?",
    "answer": "ATT&CK mitigations (M-series IDs) represent security measures that prevent or limit the effectiveness of techniques. Examples include M1036 (Account Use Policies), M1049 (Antivirus/Antimalware), M1026 (Privileged Account Management), M1051 (Update Software), and M1017 (User Training). Each mitigation is linked to the techniques it addresses. Organizations use mitigations to: prioritize security investments based on which mitigations cover the most relevant techniques, validate existing controls against ATT&CK, and build a defense-in-depth strategy mapped to the framework.",
    "category": "general",
    "reference": "",
    "difficulty": "beginner",
    "keywords": [
      "mitigations",
      "controls",
      "defense",
      "prioritization",
      "M-series"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-064",
    "question": "What is the Reconnaissance tactic and how is it detected?",
    "answer": "Reconnaissance (TA0043) covers pre-attack information gathering that occurs mostly outside the target network. Techniques include Active Scanning (T1595), Gather Victim Identity Information (T1589), Gather Victim Network Information (T1590), Search Open Websites (T1593), and Phishing for Information (T1598). Detection is challenging since most activity happens externally. Organizations can detect some reconnaissance via honeypots, monitoring for unusual DNS queries, detecting web scraping of public-facing sites, and tracking social engineering attempts. Threat intelligence feeds help identify adversary infrastructure.",
    "category": "tactic",
    "reference": "TA0043",
    "difficulty": "intermediate",
    "keywords": [
      "reconnaissance",
      "OSINT",
      "scanning",
      "social engineering",
      "honeypots"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-065",
    "question": "What is T1036 (Masquerading)?",
    "answer": "Masquerading (T1036) is a defense evasion technique where adversaries manipulate names and locations to make files or activities appear legitimate. Sub-techniques include Invalid Code Signature (T1036.001), Rename System Utilities (T1036.003), Masquerade Task or Service (T1036.004), Match Legitimate Name or Location (T1036.005), and Space After Filename (T1036.006). For example, renaming malware to svchost.exe or placing it in C:\\Windows\\. Detection involves comparing process names to expected file paths, verifying code signatures, and monitoring for renamed system binaries.",
    "category": "technique",
    "reference": "T1036",
    "difficulty": "intermediate",
    "keywords": [
      "masquerading",
      "rename",
      "impersonation",
      "svchost",
      "evasion"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-066",
    "question": "How does MITRE D3FEND complement ATT&CK?",
    "answer": "MITRE D3FEND is a knowledge graph of defensive techniques mapped to ATT&CK offensive techniques. While ATT&CK catalogs what adversaries do, D3FEND catalogs what defenders can do about it. D3FEND organizes defenses into categories: Harden (reduce attack surface), Detect (identify malicious activity), Isolate (contain threats), Deceive (deploy deception), and Evict (remove threats). Each D3FEND technique links to the ATT&CK techniques it counters, helping security teams build comprehensive defensive architectures.",
    "category": "general",
    "reference": "",
    "difficulty": "advanced",
    "keywords": [
      "D3FEND",
      "defensive",
      "countermeasures",
      "knowledge graph",
      "harden"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-067",
    "question": "What is the difference between techniques used by APT groups vs cybercriminals?",
    "answer": "APT groups (nation-state) typically focus on stealth, persistence, and long-term access using sophisticated custom tools and zero-days. They prioritize techniques in Credential Access, Collection, and Exfiltration with extensive Defense Evasion. Cybercriminals prioritize speed and monetization, focusing on Initial Access (mass phishing, exploit scanning), rapid Execution, and Impact (ransomware). Cybercriminals more frequently use commodity tools (Cobalt Strike, commodity RATs) and publicly known exploits. However, this distinction is blurring as cybercriminals adopt APT techniques and vice versa.",
    "category": "general",
    "reference": "",
    "difficulty": "intermediate",
    "keywords": [
      "APT",
      "cybercriminal",
      "nation-state",
      "ransomware",
      "TTPs comparison"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-068",
    "question": "What is T1098 (Account Manipulation)?",
    "answer": "Account Manipulation (T1098) involves modifying account attributes to maintain access. Sub-techniques include Additional Cloud Credentials (T1098.001), Additional Email Delegate Access (T1098.002), Additional Cloud Roles (T1098.003), SSH Authorized Keys (T1098.004), and Device Registration (T1098.005). In Active Directory, this includes adding users to privileged groups, modifying delegation settings, or adding SPN for Kerberoasting setup. Detection involves monitoring group membership changes (Event IDs 4728, 4732, 4756), authorized_keys file modifications, and cloud IAM policy changes.",
    "category": "technique",
    "reference": "T1098",
    "difficulty": "advanced",
    "keywords": [
      "account manipulation",
      "group membership",
      "SSH keys",
      "IAM",
      "persistence"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-069",
    "question": "What is Sigma and how does it relate to ATT&CK?",
    "answer": "Sigma is an open standard for writing detection rules that can be converted to various SIEM formats (Splunk, Elastic, Microsoft Sentinel, etc.). Many Sigma rules are mapped to ATT&CK technique IDs via the 'tags' field (e.g., attack.t1003.001). The SigmaHQ repository contains thousands of community-contributed rules organized by ATT&CK tactics. Using Sigma with ATT&CK allows organizations to measure detection coverage against the framework, share detection logic across different SIEM platforms, and systematically build detections for prioritized techniques.",
    "category": "general",
    "reference": "",
    "difficulty": "intermediate",
    "keywords": [
      "Sigma",
      "detection rules",
      "SIEM",
      "Splunk",
      "Elastic",
      "conversion"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  },
  {
    "id": "qa-070",
    "question": "What are the best practices for maintaining ATT&CK coverage over time?",
    "answer": "Maintaining ATT&CK coverage requires: 1) Regular reassessment as ATT&CK updates quarterly with new techniques and sub-techniques. 2) Continuous detection testing using Atomic Red Team or CALDERA to validate existing detections still work. 3) Threat intelligence integration to reprioritize based on emerging threats to your sector. 4) Purple team exercises to test the full detection-response chain, not just rule matching. 5) Tracking coverage metrics in ATT&CK Navigator layers comparing quarterly snapshots. 6) Ensuring new infrastructure and cloud services are integrated into the detection framework.",
    "category": "general",
    "reference": "",
    "difficulty": "advanced",
    "keywords": [
      "coverage maintenance",
      "continuous testing",
      "quarterly updates",
      "metrics",
      "Navigator"
    ],
    "source_url": "https://www.ayinedjimi-consultants.fr"
  }
]