mitre-attack-en / data /qa_dataset.json
AYI-NEDJIMI's picture
Upload data/qa_dataset.json with huggingface_hub
f26ee1e verified
[
{
"id": "qa-001",
"question": "What is the MITRE ATT&CK framework?",
"answer": "MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a globally accessible knowledge base documenting the tactics and techniques used by cyber attackers based on real-world observations. Created by MITRE Corporation, it serves as a reference for understanding adversary behavior, improving defenses, and structuring security operations. The framework covers Enterprise, Mobile, and ICS matrices.",
"category": "general",
"reference": "",
"difficulty": "beginner",
"keywords": [
"MITRE ATT&CK",
"framework",
"cybersecurity",
"tactics",
"techniques"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-002",
"question": "How many tactics are in MITRE ATT&CK Enterprise?",
"answer": "MITRE ATT&CK Enterprise contains 14 tactics representing the strategic objectives of an attacker: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Exfiltration, Command and Control, and Impact.",
"category": "general",
"reference": "",
"difficulty": "beginner",
"keywords": [
"tactics",
"14",
"Enterprise"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-003",
"question": "What is the difference between a tactic and a technique?",
"answer": "A tactic represents the 'why' - the adversary's tactical objective (e.g., gain initial access). A technique represents the 'how' - the specific method used to achieve that objective (e.g., phishing). A technique can be associated with multiple tactics, and each tactic contains many alternative techniques.",
"category": "general",
"reference": "",
"difficulty": "beginner",
"keywords": [
"tactic",
"technique",
"difference"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-004",
"question": "What is a sub-technique in MITRE ATT&CK?",
"answer": "A sub-technique is a more specific variant of a technique. For example, T1566 (Phishing) has sub-techniques like T1566.001 (Spearphishing Attachment), T1566.002 (Spearphishing Link), and T1566.003 (Spearphishing via Service). Sub-techniques allow for more precise descriptions of adversary behavior.",
"category": "general",
"reference": "T1566",
"difficulty": "beginner",
"keywords": [
"sub-technique",
"phishing",
"spearphishing"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-005",
"question": "How is phishing categorized in ATT&CK?",
"answer": "Phishing (T1566) is categorized under the Initial Access tactic (TA0001). It has several sub-techniques: T1566.001 (Spearphishing Attachment), T1566.002 (Spearphishing Link), T1566.003 (Spearphishing via Service), and T1566.004 (Spearphishing Voice). There is also T1598 (Phishing for Information) under the Reconnaissance tactic.",
"category": "technique",
"reference": "T1566",
"difficulty": "beginner",
"keywords": [
"phishing",
"spearphishing",
"initial access"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-006",
"question": "What is process injection (T1055)?",
"answer": "Process injection is a defense evasion and privilege escalation technique. The attacker injects malicious code into a legitimate running process to hide their activity. Sub-techniques include DLL injection, Process Hollowing, Thread Execution Hijacking, and APC injection. This technique allows executing code in the security context of another process.",
"category": "technique",
"reference": "T1055",
"difficulty": "intermediate",
"keywords": [
"injection",
"process",
"DLL",
"evasion"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-007",
"question": "What is credential dumping (T1003)?",
"answer": "OS Credential Dumping (T1003) is a technique for extracting credentials from the operating system. Sub-techniques include LSASS Memory (T1003.001), Security Account Manager (T1003.002), NTDS (T1003.003), LSA Secrets (T1003.004), and DCSync (T1003.006). Common tools include Mimikatz, secretsdump.py (Impacket), and procdump.",
"category": "technique",
"reference": "T1003",
"difficulty": "intermediate",
"keywords": [
"credential dumping",
"credentials",
"Mimikatz",
"LSASS"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-008",
"question": "How does Kerberoasting work?",
"answer": "Kerberoasting (T1558.003) exploits the Kerberos protocol in Active Directory. The attacker requests service tickets (TGS) for service accounts with configured SPNs. These tickets are encrypted with the service account password hash and can be cracked offline via brute force. It's a credential access technique that doesn't require elevated privileges.",
"category": "technique",
"reference": "T1558.003",
"difficulty": "advanced",
"keywords": [
"Kerberoasting",
"Kerberos",
"Active Directory",
"TGS",
"SPN"
],
"source_url": "https://www.ayinedjimi-consultants.fr/articles/attaques-active-directory/ntlm-relay-attacks-guide.html"
},
{
"id": "qa-009",
"question": "What is lateral movement and what techniques are used?",
"answer": "Lateral Movement (TA0008) is the tactic by which an attacker moves from one system to another within the network after initial access. Key techniques include: Remote Services (T1021) like RDP, SMB, SSH, and WinRM; Lateral Tool Transfer (T1570); Exploitation of Remote Services (T1210); Internal Spearphishing (T1534); and Use Alternate Authentication Material (T1550) like Pass-the-Hash and Pass-the-Ticket.",
"category": "tactic",
"reference": "TA0008",
"difficulty": "intermediate",
"keywords": [
"lateral movement",
"RDP",
"SMB",
"Pass-the-Hash"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-010",
"question": "How are ransomware attacks represented in ATT&CK?",
"answer": "Ransomware uses multiple ATT&CK techniques. The primary one is T1486 (Data Encrypted for Impact) in the Impact tactic (TA0040). A typical ransomware also uses: T1490 (Inhibit System Recovery) to delete shadow copies, T1489 (Service Stop) to stop security services, T1021 (Remote Services) for lateral movement, and T1567 (Exfiltration Over Web Service) for double extortion.",
"category": "technique",
"reference": "T1486",
"difficulty": "intermediate",
"keywords": [
"ransomware",
"encryption",
"impact",
"shadow copies"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-011",
"question": "What is APT28 (Fancy Bear)?",
"answer": "APT28 (G0007), also known as Fancy Bear, Sofacy, Sednit, and STRONTIUM, is a cyber espionage group attributed to Russia's GRU military intelligence. Active since at least 2004, it targets governments, military, and security organizations. APT28 uses sophisticated techniques including spearphishing, zero-day exploits, and custom malware like X-Agent and Zebrocy.",
"category": "group",
"reference": "G0007",
"difficulty": "intermediate",
"keywords": [
"APT28",
"Fancy Bear",
"Russia",
"GRU",
"espionage"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-012",
"question": "What is the Lazarus Group?",
"answer": "Lazarus Group (G0032) is a threat group attributed to North Korea (DPRK). Active since at least 2009, it's responsible for major attacks including the Sony Pictures hack (2014), the Bangladesh Bank heist (2016), and the WannaCry ransomware (2017). Lazarus targets financial, aerospace, and defense sectors with both financial and espionage motivations.",
"category": "group",
"reference": "G0032",
"difficulty": "intermediate",
"keywords": [
"Lazarus",
"North Korea",
"WannaCry",
"cyberattack"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-013",
"question": "How to use MITRE ATT&CK for threat hunting?",
"answer": "To use ATT&CK for threat hunting: 1) Identify the most relevant techniques for your environment. 2) Map your data sources (logs, EDR, SIEM) to ATT&CK techniques. 3) Create hunting hypotheses based on techniques (e.g., 'An attacker is using T1003 to dump credentials'). 4) Develop specific search queries. 5) Validate with ATT&CK Navigator coverage matrices to identify detection gaps.",
"category": "general",
"reference": "",
"difficulty": "advanced",
"keywords": [
"threat hunting",
"detection",
"SIEM",
"Navigator"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-014",
"question": "What is the ATT&CK Navigator?",
"answer": "ATT&CK Navigator is an open-source web tool developed by MITRE for visualizing and annotating the ATT&CK matrix. It allows: creating custom layers with color coding, visualizing SOC detection coverage, comparing techniques used by different groups, and identifying security gaps. It's available on GitHub (mitre-attack/attack-navigator) and as a hosted version.",
"category": "general",
"reference": "",
"difficulty": "beginner",
"keywords": [
"Navigator",
"visualization",
"matrix",
"coverage"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-015",
"question": "How to map a security alert to ATT&CK?",
"answer": "To map an alert to ATT&CK: 1) Analyze the alert and identify the observed behavior (e.g., encoded PowerShell process). 2) Find the corresponding technique (T1059.001 - PowerShell). 3) Identify the associated tactic (Execution). 4) Look for applicable sub-techniques. 5) Document the mapping in your SIEM/SOAR. 6) Check related techniques the attacker might use next in the kill chain.",
"category": "general",
"reference": "T1059.001",
"difficulty": "intermediate",
"keywords": [
"mapping",
"alert",
"SIEM",
"PowerShell",
"detection"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-016",
"question": "What are the most common AD persistence techniques?",
"answer": "Most common AD persistence techniques: 1) T1098 (Account Manipulation) - adding users to privileged groups. 2) T1136 (Create Account) - creating backdoor accounts. 3) T1547 (Boot or Logon Autostart Execution) - malicious GPOs. 4) T1053 (Scheduled Task) - persistent tasks on domain controllers. 5) T1558 (Kerberos Tickets) - Golden Ticket and Silver Ticket for long-term Kerberos persistence.",
"category": "technique",
"reference": "TA0003",
"difficulty": "advanced",
"keywords": [
"persistence",
"Active Directory",
"Golden Ticket",
"GPO"
],
"source_url": "https://www.ayinedjimi-consultants.fr/articles/attaques-active-directory/ntlm-relay-attacks-guide.html"
},
{
"id": "qa-017",
"question": "What is Pass-the-Hash?",
"answer": "Pass-the-Hash (T1550.002) is a lateral movement technique where the attacker uses the NTLM hash of a password (instead of the plaintext password) to authenticate to remote systems. The attacker first extracts hashes via credential dumping (T1003), then uses them with tools like Mimikatz (sekurlsa::pth), Impacket, or CrackMapExec. Mitigations include using Credential Guard and restricting privileged accounts.",
"category": "technique",
"reference": "T1550.002",
"difficulty": "advanced",
"keywords": [
"Pass-the-Hash",
"NTLM",
"lateral movement",
"Mimikatz"
],
"source_url": "https://www.ayinedjimi-consultants.fr/articles/attaques-active-directory/ntlm-relay-attacks-guide.html"
},
{
"id": "qa-018",
"question": "How do attackers use PowerShell in ATT&CK?",
"answer": "PowerShell (T1059.001) is one of the most used execution techniques. Attackers exploit it to: execute malicious code in memory (fileless), download payloads (Invoke-WebRequest), perform reconnaissance (Get-ADUser, Get-NetComputer), perform lateral movement (Invoke-Command, Enter-PSSession), and run offensive frameworks (PowerSploit, Empire). Detection relies on ScriptBlock Logging, Module Logging, and AMSI.",
"category": "technique",
"reference": "T1059.001",
"difficulty": "intermediate",
"keywords": [
"PowerShell",
"execution",
"fileless",
"AMSI",
"detection"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-019",
"question": "What is the STIX format used by MITRE ATT&CK?",
"answer": "STIX (Structured Threat Information eXpression) is an open standard from OASIS for representing cyber threat information. MITRE ATT&CK uses STIX 2.1 to distribute its data. Each ATT&CK object (technique, tactic, group, mitigation) is a STIX object with relationships. ATT&CK STIX data is available on GitHub (mitre-attack/attack-stix-data) and can be parsed with libraries like mitreattack-python or stix2.",
"category": "general",
"reference": "",
"difficulty": "intermediate",
"keywords": [
"STIX",
"format",
"data",
"standard",
"OASIS"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-020",
"question": "What are the main mitigations against phishing?",
"answer": "ATT&CK mitigations against phishing (T1566): M1049 (Antivirus/Antimalware) - attachment scanning. M1031 (Network Intrusion Prevention) - email and URL filtering. M1021 (Restrict Web-Based Content) - phishing site filtering. M1054 (Software Configuration) - updating mail clients and browsers. M1017 (User Training) - phishing awareness. M1032 (Multi-factor Authentication) - protection even if credentials are compromised.",
"category": "mitigation",
"reference": "T1566",
"difficulty": "beginner",
"keywords": [
"phishing",
"mitigation",
"MFA",
"awareness"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-021",
"question": "How does ATT&CK help evaluate SOC maturity?",
"answer": "ATT&CK helps evaluate SOC maturity by: 1) Mapping existing detection rules to the ATT&CK matrix. 2) Identifying uncovered techniques (detection gaps). 3) Prioritizing the most relevant techniques for the environment. 4) Measuring coverage progression over time. 5) Comparing coverage with techniques used by threat groups targeting your sector. ATT&CK Navigator is the primary tool for this visualization.",
"category": "general",
"reference": "",
"difficulty": "advanced",
"keywords": [
"SOC",
"maturity",
"coverage",
"detection",
"gaps"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-022",
"question": "What is Living off the Land (LOLBins)?",
"answer": "Living off the Land (LOL) refers to using legitimate tools and binaries already present on the system for malicious activities. In ATT&CK, this maps to: T1218 (System Binary Proxy Execution) including rundll32, mshta, regsvr32; T1216 (System Script Proxy Execution); T1127 (Trusted Developer Utilities); and T1047 (WMI). The advantage for attackers is evading detection since these tools are signed and trusted.",
"category": "technique",
"reference": "T1218",
"difficulty": "intermediate",
"keywords": [
"LOLBins",
"Living off the Land",
"system binaries",
"evasion"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-023",
"question": "What is DCSync and how to detect it?",
"answer": "DCSync (T1003.006) simulates domain controller behavior to request credential data replication via MS-DRSR. An attacker with Replicating Directory Changes rights can extract all account hashes, including krbtgt. Detection: monitor DrsGetNCChanges requests (Event ID 4662) from non-DC sources, monitor replication rights assignments (Event ID 4738), and use tools like MDI (Microsoft Defender for Identity).",
"category": "technique",
"reference": "T1003.006",
"difficulty": "advanced",
"keywords": [
"DCSync",
"replication",
"Active Directory",
"krbtgt",
"detection"
],
"source_url": "https://www.ayinedjimi-consultants.fr/articles/attaques-active-directory/ntlm-relay-attacks-guide.html"
},
{
"id": "qa-024",
"question": "What techniques are in the Reconnaissance tactic?",
"answer": "The Reconnaissance tactic (TA0043) includes: T1595 (Active Scanning), T1592 (Gather Victim Host Information), T1589 (Gather Victim Identity Information), T1590 (Gather Victim Network Information), T1591 (Gather Victim Org Information), T1593 (Search Open Websites/Domains), T1594 (Search Victim-Owned Websites), T1596 (Search Open Technical Databases), T1597 (Search Closed Sources), T1598 (Phishing for Information).",
"category": "tactic",
"reference": "TA0043",
"difficulty": "beginner",
"keywords": [
"reconnaissance",
"OSINT",
"scanning",
"information gathering"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-025",
"question": "How does a Golden Ticket attack work?",
"answer": "Golden Ticket (T1558.001) is a Kerberos persistence technique. An attacker who has compromised the krbtgt account hash can forge TGTs (Ticket Granting Tickets) for any user with any privileges. These tickets are valid across the entire AD domain and can have very long lifetimes. The only complete remediation is resetting the krbtgt password twice. Detection: monitor ticket lifetime anomalies and discrepancies between ticket metadata and AD data.",
"category": "technique",
"reference": "T1558.001",
"difficulty": "advanced",
"keywords": [
"Golden Ticket",
"Kerberos",
"krbtgt",
"persistence",
"TGT"
],
"source_url": "https://www.ayinedjimi-consultants.fr/articles/attaques-active-directory/ntlm-relay-attacks-guide.html"
},
{
"id": "qa-026",
"question": "What is supply chain compromise in ATT&CK?",
"answer": "Supply chain compromise (T1195) is an initial access technique where the attacker compromises a supplier or third-party product to reach the final target. Sub-techniques include: T1195.001 (Compromise Software Dependencies and Development Tools), T1195.002 (Compromise Software Supply Chain), T1195.003 (Compromise Hardware Supply Chain). The most notable example is the SolarWinds attack (2020) which compromised thousands of organizations via a trojanized software update.",
"category": "technique",
"reference": "T1195",
"difficulty": "advanced",
"keywords": [
"supply chain",
"SolarWinds",
"third-party",
"compromise"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-027",
"question": "What is the Sandworm group?",
"answer": "Sandworm (G0034), also known as Voodoo Bear, is a group attributed to Russia's GRU Unit 74455. Responsible for some of the most destructive cyberattacks: BlackEnergy against Ukraine's power grid (2015-2016), NotPetya (2017) causing $10 billion in damages, the 2018 Olympics attack (Olympic Destroyer), and Industroyer/CrashOverride against energy infrastructure. Sandworm heavily uses impact techniques (T1485, T1486, T1561) and targets critical infrastructure.",
"category": "group",
"reference": "G0034",
"difficulty": "advanced",
"keywords": [
"Sandworm",
"GRU",
"NotPetya",
"Ukraine",
"critical infrastructure"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-028",
"question": "How to use ATT&CK for incident response?",
"answer": "ATT&CK structures incident response: 1) Identification: map observed IoCs to ATT&CK techniques to understand adversary TTPs. 2) Containment: identify used techniques to predict next steps and proactively block. 3) Eradication: use associated ATT&CK mitigations for each identified technique. 4) Recovery: verify all persistence techniques (TA0003) have been cleaned. 5) Lessons learned: document detected/missed techniques to improve future defenses.",
"category": "general",
"reference": "",
"difficulty": "advanced",
"keywords": [
"incident response",
"IoC",
"TTP",
"containment",
"eradication"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-029",
"question": "What are the differences between ATT&CK Enterprise, Mobile, and ICS?",
"answer": "MITRE ATT&CK has three main matrices: Enterprise covers Windows, macOS, Linux, Cloud, Containers, and Network (14 tactics, ~700 techniques). Mobile covers Android and iOS (14 tactics, ~100 techniques) with mobile-specific techniques like SMS interception. ICS (Industrial Control Systems) covers SCADA/ICS (12 tactics) with techniques targeting industrial protocols (Modbus, OPC) and PLCs. Each matrix is tailored to its domain.",
"category": "general",
"reference": "",
"difficulty": "beginner",
"keywords": [
"Enterprise",
"Mobile",
"ICS",
"matrices",
"differences"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-030",
"question": "What is the MITRE CALDERA framework?",
"answer": "CALDERA is an open-source adversary emulation framework developed by MITRE. It automatically simulates ATT&CK-based attack scenarios. Features: automatic attack chain planning, deployable agents on Windows/Linux/macOS, plugins for extending capabilities, autonomous red teaming and detection testing modes. CALDERA can be used for red team exercises, SOC detection testing, and defense validation. Available on GitHub (mitre/caldera).",
"category": "general",
"reference": "",
"difficulty": "advanced",
"keywords": [
"CALDERA",
"emulation",
"automation",
"red team",
"agents"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-031",
"question": "What is the Initial Access tactic (TA0001)?",
"answer": "Initial Access (TA0001) represents the methods adversaries use to gain a first foothold in a target network. Key techniques include Phishing (T1566), Exploit Public-Facing Application (T1190), External Remote Services (T1133), Supply Chain Compromise (T1195), Valid Accounts (T1078), and Drive-by Compromise (T1189). This is often the first tactic in an attack chain. Organizations defend against initial access through email security gateways, web application firewalls, patch management, and network segmentation.",
"category": "tactic",
"reference": "TA0001",
"difficulty": "beginner",
"keywords": [
"initial access",
"phishing",
"exploitation",
"foothold"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-032",
"question": "What is the Execution tactic (TA0002)?",
"answer": "Execution (TA0002) covers techniques that result in adversary-controlled code running on a local or remote system. Key techniques include Command and Scripting Interpreter (T1059 - PowerShell, Bash, Python), Exploitation for Client Execution (T1203), System Services (T1569), and Windows Management Instrumentation (T1047). Detection focuses on process creation logs (Event ID 4688), script block logging, AMSI integration, and behavioral analysis of execution patterns.",
"category": "tactic",
"reference": "TA0002",
"difficulty": "beginner",
"keywords": [
"execution",
"PowerShell",
"scripting",
"WMI",
"code execution"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-033",
"question": "What is the Defense Evasion tactic (TA0005)?",
"answer": "Defense Evasion (TA0005) is the tactic with the most techniques, covering methods adversaries use to avoid detection. Key techniques include Masquerading (T1036), Obfuscated Files (T1027), Process Injection (T1055), Indicator Removal (T1070), Disable or Modify Tools (T1562), and Rootkit (T1014). This tactic is critical because without detection evasion, most attacks would be caught early. Defense requires layered monitoring, behavioral detection, and integrity monitoring.",
"category": "tactic",
"reference": "TA0005",
"difficulty": "intermediate",
"keywords": [
"defense evasion",
"obfuscation",
"masquerading",
"process injection"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-034",
"question": "What is the Exfiltration tactic (TA0010)?",
"answer": "Exfiltration (TA0010) covers techniques for stealing data from the target network. Techniques include Exfiltration Over C2 Channel (T1041), Exfiltration Over Web Service (T1567 - using cloud storage like Google Drive, Dropbox), Exfiltration Over Alternative Protocol (T1048), Automated Exfiltration (T1020), and Data Transfer Size Limits (T1030). Detection relies on DLP solutions, network traffic analysis, unusual outbound data volumes, and monitoring connections to known file-sharing services.",
"category": "tactic",
"reference": "TA0010",
"difficulty": "intermediate",
"keywords": [
"exfiltration",
"data theft",
"DLP",
"C2",
"cloud storage"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-035",
"question": "What is the Impact tactic (TA0040)?",
"answer": "Impact (TA0040) covers techniques to disrupt availability or compromise integrity. Key techniques include Data Encrypted for Impact (T1486 - ransomware), Data Destruction (T1485), Defacement (T1491), Inhibit System Recovery (T1490 - deleting shadow copies), Service Stop (T1489), and Resource Hijacking (T1496 - cryptomining). This tactic represents the attacker's end goal in destructive campaigns. Defense includes robust backups, immutable storage, and business continuity planning.",
"category": "tactic",
"reference": "TA0040",
"difficulty": "intermediate",
"keywords": [
"impact",
"ransomware",
"destruction",
"defacement",
"cryptomining"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-036",
"question": "What is T1190 (Exploit Public-Facing Application)?",
"answer": "T1190 describes exploitation of vulnerabilities in internet-facing applications to gain access. This includes web applications, VPN gateways, email servers, and other exposed services. Notable examples include ProxyShell/ProxyLogon (Exchange), Log4Shell, Citrix ADC vulnerabilities, and Fortinet VPN exploits. Mitigations include timely patching (M1051), WAF deployment, network segmentation, and vulnerability management programs. Detection involves monitoring application logs for exploitation indicators and IDS/IPS signatures.",
"category": "technique",
"reference": "T1190",
"difficulty": "intermediate",
"keywords": [
"exploitation",
"public-facing",
"vulnerability",
"ProxyShell",
"Log4Shell"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-037",
"question": "What is T1078 (Valid Accounts)?",
"answer": "T1078 describes adversaries obtaining and abusing legitimate credentials to gain access. Sub-techniques include Default Accounts (T1078.001), Domain Accounts (T1078.002), Local Accounts (T1078.003), and Cloud Accounts (T1078.004). This technique spans multiple tactics (Initial Access, Persistence, Privilege Escalation, Defense Evasion) because valid credentials bypass many security controls. Detection requires analyzing authentication anomalies, impossible travel, and unusual access patterns. MFA and privileged access management are key mitigations.",
"category": "technique",
"reference": "T1078",
"difficulty": "intermediate",
"keywords": [
"valid accounts",
"credentials",
"authentication",
"MFA",
"defense evasion"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-038",
"question": "What is Command and Control (TA0011)?",
"answer": "Command and Control (TA0011) covers techniques adversaries use to communicate with compromised systems. Key techniques include Application Layer Protocol (T1071 - using HTTP/S, DNS, or email), Encrypted Channel (T1573), Proxy (T1090), Ingress Tool Transfer (T1105), and Non-Standard Port (T1571). Modern C2 frameworks like Cobalt Strike, Sliver, and Mythic use domain fronting, malleable profiles, and encrypted channels. Detection involves network traffic analysis, JA3/JA3S fingerprinting, DNS anomaly detection, and beacon pattern analysis.",
"category": "tactic",
"reference": "TA0011",
"difficulty": "advanced",
"keywords": [
"C2",
"command and control",
"Cobalt Strike",
"beacon",
"DNS tunneling"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-039",
"question": "What is APT29 (Cozy Bear)?",
"answer": "APT29 (G0016), also known as Cozy Bear, The Dukes, and Nobelium, is attributed to Russia's SVR intelligence service. Responsible for the SolarWinds supply chain attack (2020/2021), targeting of COVID-19 vaccine research, and the DNC hack (2016). APT29 is known for sophisticated tradecraft including supply chain compromises, cloud abuse, token theft, and use of legitimate cloud services for C2. They favor stealth and long-term persistence over destructive operations.",
"category": "group",
"reference": "G0016",
"difficulty": "advanced",
"keywords": [
"APT29",
"Cozy Bear",
"Nobelium",
"SolarWinds",
"SVR",
"Russia"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-040",
"question": "What is FIN7?",
"answer": "FIN7 (G0046), also known as Carbanak and Navigator Group, is a financially motivated threat group active since 2013. They target retail, hospitality, and restaurant sectors using sophisticated phishing campaigns with weaponized documents. FIN7 uses custom malware (Carbanak, GRIFFON), point-of-sale malware for credit card theft, and has connections to various ransomware operations. They operate a professional structure with HR-like recruitment of unwitting participants.",
"category": "group",
"reference": "G0046",
"difficulty": "intermediate",
"keywords": [
"FIN7",
"Carbanak",
"financial",
"POS malware",
"credit card"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-041",
"question": "What is T1059.001 (PowerShell) and why is it significant?",
"answer": "PowerShell (T1059.001) is one of the most frequently observed ATT&CK techniques. Adversaries use PowerShell for downloading payloads (IEX, Invoke-WebRequest), executing code in memory (fileless attacks), performing reconnaissance (Get-ADUser, Get-Process), and running offensive frameworks (PowerSploit, Empire, PowerView). Key detection mechanisms include Script Block Logging (Event ID 4104), Module Logging, Transcription Logging, and AMSI (Anti-Malware Scan Interface). Constrained Language Mode and Just Enough Administration (JEA) are effective mitigations.",
"category": "technique",
"reference": "T1059.001",
"difficulty": "intermediate",
"keywords": [
"PowerShell",
"fileless",
"AMSI",
"Script Block Logging",
"Empire"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-042",
"question": "What is the Collection tactic (TA0009)?",
"answer": "Collection (TA0009) covers techniques for gathering data of interest before exfiltration. Key techniques include Data from Local System (T1005), Data from Network Shared Drive (T1039), Screen Capture (T1113), Clipboard Data (T1115), Email Collection (T1114), Audio Capture (T1123), and Archive Collected Data (T1560). Understanding collection techniques helps defenders identify what data adversaries target and implement appropriate protections like DLP, encryption at rest, and monitoring file access patterns.",
"category": "tactic",
"reference": "TA0009",
"difficulty": "intermediate",
"keywords": [
"collection",
"data gathering",
"screen capture",
"email",
"archive"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-043",
"question": "What is Cobalt Strike and how does it map to ATT&CK?",
"answer": "Cobalt Strike is a commercial adversary simulation tool widely used by both red teams and real threat actors. It maps to numerous ATT&CK techniques: T1071.001 (HTTP C2), T1055 (Process Injection via Beacon), T1059.001 (PowerShell execution), T1021.002 (SMB/PsExec lateral movement), T1550.002 (Pass-the-Hash), T1003.001 (LSASS credential dumping), and T1573 (Encrypted C2). Its Malleable C2 profiles enable evasion (T1036). Detecting Cobalt Strike involves monitoring for named pipes, beacon sleep patterns, and specific network signatures.",
"category": "general",
"reference": "",
"difficulty": "advanced",
"keywords": [
"Cobalt Strike",
"Beacon",
"C2",
"Malleable profiles",
"red team"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-044",
"question": "What is T1021 (Remote Services) and its sub-techniques?",
"answer": "Remote Services (T1021) is a lateral movement technique using legitimate remote access protocols. Sub-techniques include RDP (T1021.001), SMB/Windows Admin Shares (T1021.002), DCOM (T1021.003), SSH (T1021.004), VNC (T1021.005), and Windows Remote Management/WinRM (T1021.006). These are difficult to detect because they use legitimate protocols. Detection relies on baseline analysis of normal remote access patterns, monitoring for anomalous source-destination pairs, and restricting administrative protocols between workstations.",
"category": "technique",
"reference": "T1021",
"difficulty": "intermediate",
"keywords": [
"remote services",
"RDP",
"SMB",
"SSH",
"lateral movement"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-045",
"question": "How does ATT&CK define persistence techniques?",
"answer": "Persistence (TA0003) covers techniques that allow adversaries to maintain access across restarts, changed credentials, or other interruptions. Major categories include Boot/Logon Autostart Execution (T1547 - registry run keys, startup folders), Scheduled Task/Job (T1053), Account Manipulation (T1098), Create Account (T1136), Server Software Component (T1505 - web shells), and Implant Internal Image (T1525). Each persistence mechanism requires specific detection: registry monitoring, scheduled task auditing, account change tracking, and file integrity monitoring.",
"category": "tactic",
"reference": "TA0003",
"difficulty": "intermediate",
"keywords": [
"persistence",
"autostart",
"scheduled task",
"web shell",
"registry"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-046",
"question": "What is the Discovery tactic (TA0007)?",
"answer": "Discovery (TA0007) covers techniques for understanding the target environment. Key techniques include System Information Discovery (T1082), Account Discovery (T1087), Network Service Scanning (T1046), File and Directory Discovery (T1083), Permission Groups Discovery (T1069), Process Discovery (T1057), and Remote System Discovery (T1018). These techniques are often difficult to distinguish from normal administrative activity. Detection requires baselining normal discovery patterns and alerting on abnormal volumes or sequences of discovery commands.",
"category": "tactic",
"reference": "TA0007",
"difficulty": "beginner",
"keywords": [
"discovery",
"enumeration",
"scanning",
"reconnaissance",
"internal"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-047",
"question": "What is the Resource Development tactic (TA0042)?",
"answer": "Resource Development (TA0042) covers techniques adversaries use to establish resources for operations before targeting victims. Techniques include Acquire Infrastructure (T1583 - domains, servers, cloud accounts), Compromise Infrastructure (T1584), Develop Capabilities (T1587 - malware, exploits), Obtain Capabilities (T1588 - buying malware, credentials), and Establish Accounts (T1585). This pre-attack tactic is difficult to detect as it occurs outside the target network. Threat intelligence sharing and monitoring certificate transparency logs help identify adversary infrastructure.",
"category": "tactic",
"reference": "TA0042",
"difficulty": "advanced",
"keywords": [
"resource development",
"infrastructure",
"pre-attack",
"domains",
"malware development"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-048",
"question": "What is T1562 (Impair Defenses)?",
"answer": "Impair Defenses (T1562) is a defense evasion technique where adversaries disable or modify security tools. Sub-techniques include Disable or Modify Tools (T1562.001 - killing AV/EDR processes), Disable Windows Event Logging (T1562.002), Impair Command History Logging (T1562.003), Disable or Modify System Firewall (T1562.004), and Disable Cloud Logs (T1562.008). Detection involves monitoring for security tool process termination, audit policy changes, and log source gaps. Tamper-protected EDR and centralized log collection mitigate this technique.",
"category": "technique",
"reference": "T1562",
"difficulty": "advanced",
"keywords": [
"impair defenses",
"disable AV",
"EDR evasion",
"log tampering",
"firewall disable"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-049",
"question": "How do you build an ATT&CK-based detection strategy?",
"answer": "Building an ATT&CK detection strategy involves: 1) Prioritize techniques based on threat intelligence for your sector and most commonly used techniques. 2) Map existing data sources (logs, EDR, NDR) to ATT&CK techniques using the Data Sources objects. 3) Identify gaps where you have no visibility. 4) Write detection rules (Sigma, YARA, Snort) mapped to specific technique IDs. 5) Test detections using atomic tests or adversary emulation tools. 6) Measure coverage using ATT&CK Navigator. 7) Iterate by expanding coverage based on risk priorities.",
"category": "general",
"reference": "",
"difficulty": "advanced",
"keywords": [
"detection strategy",
"data sources",
"Sigma",
"atomic tests",
"coverage"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-050",
"question": "What is T1547 (Boot or Logon Autostart Execution)?",
"answer": "T1547 covers persistence mechanisms that execute during system boot or user logon. Sub-techniques include Registry Run Keys (T1547.001), Authentication Package (T1547.002), Winlogon Helper DLL (T1547.004), Security Support Provider (T1547.005), Kernel Modules (T1547.006), and Shortcut Modification (T1547.009). These are among the most common persistence techniques. Detection involves monitoring registry key modifications (HKCU/HKLM Run/RunOnce), startup folder changes, and autostart enumeration tools like Autoruns.",
"category": "technique",
"reference": "T1547",
"difficulty": "intermediate",
"keywords": [
"autostart",
"registry",
"persistence",
"Run keys",
"Autoruns"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-051",
"question": "What are data sources in ATT&CK and why are they important?",
"answer": "Data sources in ATT&CK describe the types of telemetry needed to detect specific techniques. Examples include Process Creation, Network Traffic Flow, File Modification, Windows Registry Key Modification, and Command Execution. Each data source has data components (e.g., Process Creation has Process Created, Process Metadata). They are critical for detection engineering because they help organizations understand what logs and sensors are needed. Mapping data sources to your infrastructure reveals detection blind spots.",
"category": "general",
"reference": "",
"difficulty": "intermediate",
"keywords": [
"data sources",
"telemetry",
"detection",
"logs",
"sensors"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-052",
"question": "What is T1053 (Scheduled Task/Job)?",
"answer": "Scheduled Task/Job (T1053) is used for both execution and persistence. Sub-techniques include At (T1053.002), Cron (T1053.003), Scheduled Task (T1053.005), and Container Orchestration Job (T1053.007). Attackers create scheduled tasks to execute malicious payloads at specified times or intervals, maintaining persistence across reboots. Detection involves monitoring task creation events (Event ID 4698), schtasks.exe execution, and unexpected cron entries. Common in ransomware and APT campaigns for staged execution.",
"category": "technique",
"reference": "T1053",
"difficulty": "intermediate",
"keywords": [
"scheduled task",
"cron",
"persistence",
"execution",
"schtasks"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-053",
"question": "What is ATT&CK for Cloud and what techniques are covered?",
"answer": "ATT&CK for Cloud covers adversary techniques targeting cloud environments (AWS, Azure, GCP, SaaS, Office 365). Key techniques include Cloud Service Discovery (T1580), Cloud Infrastructure Discovery (T1580), Steal Application Access Token (T1528), Modify Cloud Compute Infrastructure (T1578), and Transfer Data to Cloud Account (T1537). Cloud-specific mitigations include IAM policy hardening, cloud audit logging (CloudTrail, Azure Monitor), conditional access policies, and cloud security posture management (CSPM) tools.",
"category": "general",
"reference": "",
"difficulty": "advanced",
"keywords": [
"cloud",
"AWS",
"Azure",
"GCP",
"IAM",
"cloud security"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-054",
"question": "What is T1505.003 (Web Shell)?",
"answer": "Web Shell (T1505.003) is a persistence technique where attackers install a malicious script on a web server that provides a backdoor for remote access. Web shells can be simple (one-line PHP eval) or sophisticated (China Chopper, WSO). They are commonly deployed after exploiting web application vulnerabilities. Detection involves file integrity monitoring on web directories, monitoring for unusual process creation by web server processes (w3wp.exe, httpd), and scanning for known web shell signatures. Network-based detection looks for unusual POST requests to unexpected files.",
"category": "technique",
"reference": "T1505.003",
"difficulty": "intermediate",
"keywords": [
"web shell",
"backdoor",
"PHP",
"China Chopper",
"persistence"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-055",
"question": "What is the Privilege Escalation tactic (TA0004)?",
"answer": "Privilege Escalation (TA0004) covers techniques for gaining higher-level permissions. Key techniques include Exploitation for Privilege Escalation (T1068), Process Injection (T1055), Abuse Elevation Control Mechanism (T1548 - UAC bypass, sudo exploitation), Valid Accounts (T1078), and Access Token Manipulation (T1134). Many techniques overlap with Persistence. Detection requires monitoring for privilege changes, unusual service installations, and token manipulation. LAPS, PAM solutions, and least privilege enforcement are primary mitigations.",
"category": "tactic",
"reference": "TA0004",
"difficulty": "intermediate",
"keywords": [
"privilege escalation",
"UAC bypass",
"token manipulation",
"LAPS"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-056",
"question": "How does ATT&CK help with purple team exercises?",
"answer": "ATT&CK provides a common language and structure for purple team exercises. The red team selects techniques to simulate (using tools like Atomic Red Team, CALDERA, or manual execution), while the blue team verifies detection and response capabilities. Steps: 1) Select ATT&CK techniques relevant to your threat model. 2) Red team executes techniques in a controlled manner. 3) Blue team attempts to detect and respond. 4) Both teams collaborate to improve detection rules. 5) Document findings in ATT&CK Navigator layers showing tested vs detected techniques.",
"category": "general",
"reference": "",
"difficulty": "advanced",
"keywords": [
"purple team",
"adversary emulation",
"Atomic Red Team",
"detection validation"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-057",
"question": "What is T1070 (Indicator Removal)?",
"answer": "Indicator Removal (T1070) is a defense evasion technique where adversaries delete or modify artifacts to cover their tracks. Sub-techniques include Clear Windows Event Logs (T1070.001), Clear Linux/Mac System Logs (T1070.002), Clear Command History (T1070.003), File Deletion (T1070.004), Network Share Connection Removal (T1070.005), and Timestomp (T1070.006). Detection involves monitoring for log clearing events (Event ID 1102 for Security log), unexpected file deletions, and timestamp anomalies. Centralized logging to a tamper-proof location (SIEM) is the primary mitigation.",
"category": "technique",
"reference": "T1070",
"difficulty": "intermediate",
"keywords": [
"indicator removal",
"log clearing",
"timestomp",
"anti-forensics",
"cover tracks"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-058",
"question": "What is the Credential Access tactic (TA0006)?",
"answer": "Credential Access (TA0006) covers techniques for stealing credentials. Key techniques include OS Credential Dumping (T1003), Brute Force (T1110), Steal or Forge Kerberos Tickets (T1558), Input Capture (T1056 - keylogging), Unsecured Credentials (T1552), and Forge Web Credentials (T1606). These credentials enable privilege escalation and lateral movement. Mitigations include Credential Guard, MFA, password policies, privileged access management, and monitoring for credential access indicators like LSASS memory access.",
"category": "tactic",
"reference": "TA0006",
"difficulty": "intermediate",
"keywords": [
"credential access",
"credential dumping",
"brute force",
"Kerberos",
"keylogging"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-059",
"question": "What is Atomic Red Team?",
"answer": "Atomic Red Team is an open-source library of small, focused tests mapped to ATT&CK techniques. Each 'atomic test' simulates a single technique with minimal dependencies, making them easy to execute and validate detection capabilities. Tests are available for Windows, Linux, and macOS. They can be executed manually, via Invoke-AtomicRedTeam (PowerShell), or integrated into CI/CD pipelines for continuous detection validation. The project is maintained by Red Canary and available on GitHub with over 1,000 test cases covering hundreds of ATT&CK techniques.",
"category": "general",
"reference": "",
"difficulty": "intermediate",
"keywords": [
"Atomic Red Team",
"testing",
"detection validation",
"Red Canary",
"automation"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-060",
"question": "What is T1027 (Obfuscated Files or Information)?",
"answer": "T1027 covers adversary use of obfuscation to hide malicious content. Sub-techniques include Binary Padding (T1027.001), Software Packing (T1027.002), Steganography (T1027.003), Compile After Delivery (T1027.004), Encrypted/Encoded File (T1027.013), and HTML Smuggling (T1027.006). Obfuscation helps evade signature-based detection. Detection involves entropy analysis, behavioral execution monitoring, AMSI for script deobfuscation, and sandboxing for packed executables. Static analysis of obfuscated files should be complemented by dynamic analysis.",
"category": "technique",
"reference": "T1027",
"difficulty": "advanced",
"keywords": [
"obfuscation",
"packing",
"encoding",
"steganography",
"HTML smuggling"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-061",
"question": "How is MITRE ATT&CK used in CTI (Cyber Threat Intelligence)?",
"answer": "ATT&CK provides a structured framework for CTI analysis: 1) TTPs mapping: convert raw intelligence (IoCs, malware samples) into ATT&CK technique mappings for structured analysis. 2) Group tracking: associate observed techniques with known threat groups. 3) Trend analysis: identify which techniques are trending across the threat landscape. 4) Intelligence sharing: use ATT&CK IDs as a common vocabulary when sharing intelligence (STIX/TAXII). 5) Threat profiling: build profiles of adversaries targeting your sector to prioritize defenses.",
"category": "general",
"reference": "",
"difficulty": "advanced",
"keywords": [
"CTI",
"threat intelligence",
"TTP",
"STIX",
"TAXII",
"intelligence sharing"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-062",
"question": "What is T1486 (Data Encrypted for Impact)?",
"answer": "T1486 represents the core ransomware behavior - encrypting data to deny access and demand ransom. Modern ransomware operations combine T1486 with T1490 (Inhibit System Recovery - deleting shadow copies), T1489 (Service Stop - stopping backup agents), T1567 (Exfiltration - double extortion), and T1657 (Financial Theft). Notable ransomware families include LockBit, BlackCat/ALPHV, Royal, and Cl0p. Detection relies on monitoring for mass file modifications, known ransomware file extensions, and ransom note creation. Immutable backups and network segmentation are critical mitigations.",
"category": "technique",
"reference": "T1486",
"difficulty": "intermediate",
"keywords": [
"ransomware",
"encryption",
"data encrypted",
"LockBit",
"double extortion"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-063",
"question": "What are MITRE ATT&CK mitigations and how are they used?",
"answer": "ATT&CK mitigations (M-series IDs) represent security measures that prevent or limit the effectiveness of techniques. Examples include M1036 (Account Use Policies), M1049 (Antivirus/Antimalware), M1026 (Privileged Account Management), M1051 (Update Software), and M1017 (User Training). Each mitigation is linked to the techniques it addresses. Organizations use mitigations to: prioritize security investments based on which mitigations cover the most relevant techniques, validate existing controls against ATT&CK, and build a defense-in-depth strategy mapped to the framework.",
"category": "general",
"reference": "",
"difficulty": "beginner",
"keywords": [
"mitigations",
"controls",
"defense",
"prioritization",
"M-series"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-064",
"question": "What is the Reconnaissance tactic and how is it detected?",
"answer": "Reconnaissance (TA0043) covers pre-attack information gathering that occurs mostly outside the target network. Techniques include Active Scanning (T1595), Gather Victim Identity Information (T1589), Gather Victim Network Information (T1590), Search Open Websites (T1593), and Phishing for Information (T1598). Detection is challenging since most activity happens externally. Organizations can detect some reconnaissance via honeypots, monitoring for unusual DNS queries, detecting web scraping of public-facing sites, and tracking social engineering attempts. Threat intelligence feeds help identify adversary infrastructure.",
"category": "tactic",
"reference": "TA0043",
"difficulty": "intermediate",
"keywords": [
"reconnaissance",
"OSINT",
"scanning",
"social engineering",
"honeypots"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-065",
"question": "What is T1036 (Masquerading)?",
"answer": "Masquerading (T1036) is a defense evasion technique where adversaries manipulate names and locations to make files or activities appear legitimate. Sub-techniques include Invalid Code Signature (T1036.001), Rename System Utilities (T1036.003), Masquerade Task or Service (T1036.004), Match Legitimate Name or Location (T1036.005), and Space After Filename (T1036.006). For example, renaming malware to svchost.exe or placing it in C:\\Windows\\. Detection involves comparing process names to expected file paths, verifying code signatures, and monitoring for renamed system binaries.",
"category": "technique",
"reference": "T1036",
"difficulty": "intermediate",
"keywords": [
"masquerading",
"rename",
"impersonation",
"svchost",
"evasion"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-066",
"question": "How does MITRE D3FEND complement ATT&CK?",
"answer": "MITRE D3FEND is a knowledge graph of defensive techniques mapped to ATT&CK offensive techniques. While ATT&CK catalogs what adversaries do, D3FEND catalogs what defenders can do about it. D3FEND organizes defenses into categories: Harden (reduce attack surface), Detect (identify malicious activity), Isolate (contain threats), Deceive (deploy deception), and Evict (remove threats). Each D3FEND technique links to the ATT&CK techniques it counters, helping security teams build comprehensive defensive architectures.",
"category": "general",
"reference": "",
"difficulty": "advanced",
"keywords": [
"D3FEND",
"defensive",
"countermeasures",
"knowledge graph",
"harden"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-067",
"question": "What is the difference between techniques used by APT groups vs cybercriminals?",
"answer": "APT groups (nation-state) typically focus on stealth, persistence, and long-term access using sophisticated custom tools and zero-days. They prioritize techniques in Credential Access, Collection, and Exfiltration with extensive Defense Evasion. Cybercriminals prioritize speed and monetization, focusing on Initial Access (mass phishing, exploit scanning), rapid Execution, and Impact (ransomware). Cybercriminals more frequently use commodity tools (Cobalt Strike, commodity RATs) and publicly known exploits. However, this distinction is blurring as cybercriminals adopt APT techniques and vice versa.",
"category": "general",
"reference": "",
"difficulty": "intermediate",
"keywords": [
"APT",
"cybercriminal",
"nation-state",
"ransomware",
"TTPs comparison"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-068",
"question": "What is T1098 (Account Manipulation)?",
"answer": "Account Manipulation (T1098) involves modifying account attributes to maintain access. Sub-techniques include Additional Cloud Credentials (T1098.001), Additional Email Delegate Access (T1098.002), Additional Cloud Roles (T1098.003), SSH Authorized Keys (T1098.004), and Device Registration (T1098.005). In Active Directory, this includes adding users to privileged groups, modifying delegation settings, or adding SPN for Kerberoasting setup. Detection involves monitoring group membership changes (Event IDs 4728, 4732, 4756), authorized_keys file modifications, and cloud IAM policy changes.",
"category": "technique",
"reference": "T1098",
"difficulty": "advanced",
"keywords": [
"account manipulation",
"group membership",
"SSH keys",
"IAM",
"persistence"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-069",
"question": "What is Sigma and how does it relate to ATT&CK?",
"answer": "Sigma is an open standard for writing detection rules that can be converted to various SIEM formats (Splunk, Elastic, Microsoft Sentinel, etc.). Many Sigma rules are mapped to ATT&CK technique IDs via the 'tags' field (e.g., attack.t1003.001). The SigmaHQ repository contains thousands of community-contributed rules organized by ATT&CK tactics. Using Sigma with ATT&CK allows organizations to measure detection coverage against the framework, share detection logic across different SIEM platforms, and systematically build detections for prioritized techniques.",
"category": "general",
"reference": "",
"difficulty": "intermediate",
"keywords": [
"Sigma",
"detection rules",
"SIEM",
"Splunk",
"Elastic",
"conversion"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "qa-070",
"question": "What are the best practices for maintaining ATT&CK coverage over time?",
"answer": "Maintaining ATT&CK coverage requires: 1) Regular reassessment as ATT&CK updates quarterly with new techniques and sub-techniques. 2) Continuous detection testing using Atomic Red Team or CALDERA to validate existing detections still work. 3) Threat intelligence integration to reprioritize based on emerging threats to your sector. 4) Purple team exercises to test the full detection-response chain, not just rule matching. 5) Tracking coverage metrics in ATT&CK Navigator layers comparing quarterly snapshots. 6) Ensuring new infrastructure and cloud services are integrated into the detection framework.",
"category": "general",
"reference": "",
"difficulty": "advanced",
"keywords": [
"coverage maintenance",
"continuous testing",
"quarterly updates",
"metrics",
"Navigator"
],
"source_url": "https://www.ayinedjimi-consultants.fr"
}
]