AYI-NEDJIMI commited on
Commit
f26ee1e
·
verified ·
1 Parent(s): 190bf06

Upload data/qa_dataset.json with huggingface_hub

Browse files
Files changed (1) hide show
  1. data/qa_dataset.json +640 -0
data/qa_dataset.json CHANGED
@@ -457,5 +457,645 @@
457
  "agents"
458
  ],
459
  "source_url": "https://www.ayinedjimi-consultants.fr"
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
460
  }
461
  ]
 
457
  "agents"
458
  ],
459
  "source_url": "https://www.ayinedjimi-consultants.fr"
460
+ },
461
+ {
462
+ "id": "qa-031",
463
+ "question": "What is the Initial Access tactic (TA0001)?",
464
+ "answer": "Initial Access (TA0001) represents the methods adversaries use to gain a first foothold in a target network. Key techniques include Phishing (T1566), Exploit Public-Facing Application (T1190), External Remote Services (T1133), Supply Chain Compromise (T1195), Valid Accounts (T1078), and Drive-by Compromise (T1189). This is often the first tactic in an attack chain. Organizations defend against initial access through email security gateways, web application firewalls, patch management, and network segmentation.",
465
+ "category": "tactic",
466
+ "reference": "TA0001",
467
+ "difficulty": "beginner",
468
+ "keywords": [
469
+ "initial access",
470
+ "phishing",
471
+ "exploitation",
472
+ "foothold"
473
+ ],
474
+ "source_url": "https://www.ayinedjimi-consultants.fr"
475
+ },
476
+ {
477
+ "id": "qa-032",
478
+ "question": "What is the Execution tactic (TA0002)?",
479
+ "answer": "Execution (TA0002) covers techniques that result in adversary-controlled code running on a local or remote system. Key techniques include Command and Scripting Interpreter (T1059 - PowerShell, Bash, Python), Exploitation for Client Execution (T1203), System Services (T1569), and Windows Management Instrumentation (T1047). Detection focuses on process creation logs (Event ID 4688), script block logging, AMSI integration, and behavioral analysis of execution patterns.",
480
+ "category": "tactic",
481
+ "reference": "TA0002",
482
+ "difficulty": "beginner",
483
+ "keywords": [
484
+ "execution",
485
+ "PowerShell",
486
+ "scripting",
487
+ "WMI",
488
+ "code execution"
489
+ ],
490
+ "source_url": "https://www.ayinedjimi-consultants.fr"
491
+ },
492
+ {
493
+ "id": "qa-033",
494
+ "question": "What is the Defense Evasion tactic (TA0005)?",
495
+ "answer": "Defense Evasion (TA0005) is the tactic with the most techniques, covering methods adversaries use to avoid detection. Key techniques include Masquerading (T1036), Obfuscated Files (T1027), Process Injection (T1055), Indicator Removal (T1070), Disable or Modify Tools (T1562), and Rootkit (T1014). This tactic is critical because without detection evasion, most attacks would be caught early. Defense requires layered monitoring, behavioral detection, and integrity monitoring.",
496
+ "category": "tactic",
497
+ "reference": "TA0005",
498
+ "difficulty": "intermediate",
499
+ "keywords": [
500
+ "defense evasion",
501
+ "obfuscation",
502
+ "masquerading",
503
+ "process injection"
504
+ ],
505
+ "source_url": "https://www.ayinedjimi-consultants.fr"
506
+ },
507
+ {
508
+ "id": "qa-034",
509
+ "question": "What is the Exfiltration tactic (TA0010)?",
510
+ "answer": "Exfiltration (TA0010) covers techniques for stealing data from the target network. Techniques include Exfiltration Over C2 Channel (T1041), Exfiltration Over Web Service (T1567 - using cloud storage like Google Drive, Dropbox), Exfiltration Over Alternative Protocol (T1048), Automated Exfiltration (T1020), and Data Transfer Size Limits (T1030). Detection relies on DLP solutions, network traffic analysis, unusual outbound data volumes, and monitoring connections to known file-sharing services.",
511
+ "category": "tactic",
512
+ "reference": "TA0010",
513
+ "difficulty": "intermediate",
514
+ "keywords": [
515
+ "exfiltration",
516
+ "data theft",
517
+ "DLP",
518
+ "C2",
519
+ "cloud storage"
520
+ ],
521
+ "source_url": "https://www.ayinedjimi-consultants.fr"
522
+ },
523
+ {
524
+ "id": "qa-035",
525
+ "question": "What is the Impact tactic (TA0040)?",
526
+ "answer": "Impact (TA0040) covers techniques to disrupt availability or compromise integrity. Key techniques include Data Encrypted for Impact (T1486 - ransomware), Data Destruction (T1485), Defacement (T1491), Inhibit System Recovery (T1490 - deleting shadow copies), Service Stop (T1489), and Resource Hijacking (T1496 - cryptomining). This tactic represents the attacker's end goal in destructive campaigns. Defense includes robust backups, immutable storage, and business continuity planning.",
527
+ "category": "tactic",
528
+ "reference": "TA0040",
529
+ "difficulty": "intermediate",
530
+ "keywords": [
531
+ "impact",
532
+ "ransomware",
533
+ "destruction",
534
+ "defacement",
535
+ "cryptomining"
536
+ ],
537
+ "source_url": "https://www.ayinedjimi-consultants.fr"
538
+ },
539
+ {
540
+ "id": "qa-036",
541
+ "question": "What is T1190 (Exploit Public-Facing Application)?",
542
+ "answer": "T1190 describes exploitation of vulnerabilities in internet-facing applications to gain access. This includes web applications, VPN gateways, email servers, and other exposed services. Notable examples include ProxyShell/ProxyLogon (Exchange), Log4Shell, Citrix ADC vulnerabilities, and Fortinet VPN exploits. Mitigations include timely patching (M1051), WAF deployment, network segmentation, and vulnerability management programs. Detection involves monitoring application logs for exploitation indicators and IDS/IPS signatures.",
543
+ "category": "technique",
544
+ "reference": "T1190",
545
+ "difficulty": "intermediate",
546
+ "keywords": [
547
+ "exploitation",
548
+ "public-facing",
549
+ "vulnerability",
550
+ "ProxyShell",
551
+ "Log4Shell"
552
+ ],
553
+ "source_url": "https://www.ayinedjimi-consultants.fr"
554
+ },
555
+ {
556
+ "id": "qa-037",
557
+ "question": "What is T1078 (Valid Accounts)?",
558
+ "answer": "T1078 describes adversaries obtaining and abusing legitimate credentials to gain access. Sub-techniques include Default Accounts (T1078.001), Domain Accounts (T1078.002), Local Accounts (T1078.003), and Cloud Accounts (T1078.004). This technique spans multiple tactics (Initial Access, Persistence, Privilege Escalation, Defense Evasion) because valid credentials bypass many security controls. Detection requires analyzing authentication anomalies, impossible travel, and unusual access patterns. MFA and privileged access management are key mitigations.",
559
+ "category": "technique",
560
+ "reference": "T1078",
561
+ "difficulty": "intermediate",
562
+ "keywords": [
563
+ "valid accounts",
564
+ "credentials",
565
+ "authentication",
566
+ "MFA",
567
+ "defense evasion"
568
+ ],
569
+ "source_url": "https://www.ayinedjimi-consultants.fr"
570
+ },
571
+ {
572
+ "id": "qa-038",
573
+ "question": "What is Command and Control (TA0011)?",
574
+ "answer": "Command and Control (TA0011) covers techniques adversaries use to communicate with compromised systems. Key techniques include Application Layer Protocol (T1071 - using HTTP/S, DNS, or email), Encrypted Channel (T1573), Proxy (T1090), Ingress Tool Transfer (T1105), and Non-Standard Port (T1571). Modern C2 frameworks like Cobalt Strike, Sliver, and Mythic use domain fronting, malleable profiles, and encrypted channels. Detection involves network traffic analysis, JA3/JA3S fingerprinting, DNS anomaly detection, and beacon pattern analysis.",
575
+ "category": "tactic",
576
+ "reference": "TA0011",
577
+ "difficulty": "advanced",
578
+ "keywords": [
579
+ "C2",
580
+ "command and control",
581
+ "Cobalt Strike",
582
+ "beacon",
583
+ "DNS tunneling"
584
+ ],
585
+ "source_url": "https://www.ayinedjimi-consultants.fr"
586
+ },
587
+ {
588
+ "id": "qa-039",
589
+ "question": "What is APT29 (Cozy Bear)?",
590
+ "answer": "APT29 (G0016), also known as Cozy Bear, The Dukes, and Nobelium, is attributed to Russia's SVR intelligence service. Responsible for the SolarWinds supply chain attack (2020/2021), targeting of COVID-19 vaccine research, and the DNC hack (2016). APT29 is known for sophisticated tradecraft including supply chain compromises, cloud abuse, token theft, and use of legitimate cloud services for C2. They favor stealth and long-term persistence over destructive operations.",
591
+ "category": "group",
592
+ "reference": "G0016",
593
+ "difficulty": "advanced",
594
+ "keywords": [
595
+ "APT29",
596
+ "Cozy Bear",
597
+ "Nobelium",
598
+ "SolarWinds",
599
+ "SVR",
600
+ "Russia"
601
+ ],
602
+ "source_url": "https://www.ayinedjimi-consultants.fr"
603
+ },
604
+ {
605
+ "id": "qa-040",
606
+ "question": "What is FIN7?",
607
+ "answer": "FIN7 (G0046), also known as Carbanak and Navigator Group, is a financially motivated threat group active since 2013. They target retail, hospitality, and restaurant sectors using sophisticated phishing campaigns with weaponized documents. FIN7 uses custom malware (Carbanak, GRIFFON), point-of-sale malware for credit card theft, and has connections to various ransomware operations. They operate a professional structure with HR-like recruitment of unwitting participants.",
608
+ "category": "group",
609
+ "reference": "G0046",
610
+ "difficulty": "intermediate",
611
+ "keywords": [
612
+ "FIN7",
613
+ "Carbanak",
614
+ "financial",
615
+ "POS malware",
616
+ "credit card"
617
+ ],
618
+ "source_url": "https://www.ayinedjimi-consultants.fr"
619
+ },
620
+ {
621
+ "id": "qa-041",
622
+ "question": "What is T1059.001 (PowerShell) and why is it significant?",
623
+ "answer": "PowerShell (T1059.001) is one of the most frequently observed ATT&CK techniques. Adversaries use PowerShell for downloading payloads (IEX, Invoke-WebRequest), executing code in memory (fileless attacks), performing reconnaissance (Get-ADUser, Get-Process), and running offensive frameworks (PowerSploit, Empire, PowerView). Key detection mechanisms include Script Block Logging (Event ID 4104), Module Logging, Transcription Logging, and AMSI (Anti-Malware Scan Interface). Constrained Language Mode and Just Enough Administration (JEA) are effective mitigations.",
624
+ "category": "technique",
625
+ "reference": "T1059.001",
626
+ "difficulty": "intermediate",
627
+ "keywords": [
628
+ "PowerShell",
629
+ "fileless",
630
+ "AMSI",
631
+ "Script Block Logging",
632
+ "Empire"
633
+ ],
634
+ "source_url": "https://www.ayinedjimi-consultants.fr"
635
+ },
636
+ {
637
+ "id": "qa-042",
638
+ "question": "What is the Collection tactic (TA0009)?",
639
+ "answer": "Collection (TA0009) covers techniques for gathering data of interest before exfiltration. Key techniques include Data from Local System (T1005), Data from Network Shared Drive (T1039), Screen Capture (T1113), Clipboard Data (T1115), Email Collection (T1114), Audio Capture (T1123), and Archive Collected Data (T1560). Understanding collection techniques helps defenders identify what data adversaries target and implement appropriate protections like DLP, encryption at rest, and monitoring file access patterns.",
640
+ "category": "tactic",
641
+ "reference": "TA0009",
642
+ "difficulty": "intermediate",
643
+ "keywords": [
644
+ "collection",
645
+ "data gathering",
646
+ "screen capture",
647
+ "email",
648
+ "archive"
649
+ ],
650
+ "source_url": "https://www.ayinedjimi-consultants.fr"
651
+ },
652
+ {
653
+ "id": "qa-043",
654
+ "question": "What is Cobalt Strike and how does it map to ATT&CK?",
655
+ "answer": "Cobalt Strike is a commercial adversary simulation tool widely used by both red teams and real threat actors. It maps to numerous ATT&CK techniques: T1071.001 (HTTP C2), T1055 (Process Injection via Beacon), T1059.001 (PowerShell execution), T1021.002 (SMB/PsExec lateral movement), T1550.002 (Pass-the-Hash), T1003.001 (LSASS credential dumping), and T1573 (Encrypted C2). Its Malleable C2 profiles enable evasion (T1036). Detecting Cobalt Strike involves monitoring for named pipes, beacon sleep patterns, and specific network signatures.",
656
+ "category": "general",
657
+ "reference": "",
658
+ "difficulty": "advanced",
659
+ "keywords": [
660
+ "Cobalt Strike",
661
+ "Beacon",
662
+ "C2",
663
+ "Malleable profiles",
664
+ "red team"
665
+ ],
666
+ "source_url": "https://www.ayinedjimi-consultants.fr"
667
+ },
668
+ {
669
+ "id": "qa-044",
670
+ "question": "What is T1021 (Remote Services) and its sub-techniques?",
671
+ "answer": "Remote Services (T1021) is a lateral movement technique using legitimate remote access protocols. Sub-techniques include RDP (T1021.001), SMB/Windows Admin Shares (T1021.002), DCOM (T1021.003), SSH (T1021.004), VNC (T1021.005), and Windows Remote Management/WinRM (T1021.006). These are difficult to detect because they use legitimate protocols. Detection relies on baseline analysis of normal remote access patterns, monitoring for anomalous source-destination pairs, and restricting administrative protocols between workstations.",
672
+ "category": "technique",
673
+ "reference": "T1021",
674
+ "difficulty": "intermediate",
675
+ "keywords": [
676
+ "remote services",
677
+ "RDP",
678
+ "SMB",
679
+ "SSH",
680
+ "lateral movement"
681
+ ],
682
+ "source_url": "https://www.ayinedjimi-consultants.fr"
683
+ },
684
+ {
685
+ "id": "qa-045",
686
+ "question": "How does ATT&CK define persistence techniques?",
687
+ "answer": "Persistence (TA0003) covers techniques that allow adversaries to maintain access across restarts, changed credentials, or other interruptions. Major categories include Boot/Logon Autostart Execution (T1547 - registry run keys, startup folders), Scheduled Task/Job (T1053), Account Manipulation (T1098), Create Account (T1136), Server Software Component (T1505 - web shells), and Implant Internal Image (T1525). Each persistence mechanism requires specific detection: registry monitoring, scheduled task auditing, account change tracking, and file integrity monitoring.",
688
+ "category": "tactic",
689
+ "reference": "TA0003",
690
+ "difficulty": "intermediate",
691
+ "keywords": [
692
+ "persistence",
693
+ "autostart",
694
+ "scheduled task",
695
+ "web shell",
696
+ "registry"
697
+ ],
698
+ "source_url": "https://www.ayinedjimi-consultants.fr"
699
+ },
700
+ {
701
+ "id": "qa-046",
702
+ "question": "What is the Discovery tactic (TA0007)?",
703
+ "answer": "Discovery (TA0007) covers techniques for understanding the target environment. Key techniques include System Information Discovery (T1082), Account Discovery (T1087), Network Service Scanning (T1046), File and Directory Discovery (T1083), Permission Groups Discovery (T1069), Process Discovery (T1057), and Remote System Discovery (T1018). These techniques are often difficult to distinguish from normal administrative activity. Detection requires baselining normal discovery patterns and alerting on abnormal volumes or sequences of discovery commands.",
704
+ "category": "tactic",
705
+ "reference": "TA0007",
706
+ "difficulty": "beginner",
707
+ "keywords": [
708
+ "discovery",
709
+ "enumeration",
710
+ "scanning",
711
+ "reconnaissance",
712
+ "internal"
713
+ ],
714
+ "source_url": "https://www.ayinedjimi-consultants.fr"
715
+ },
716
+ {
717
+ "id": "qa-047",
718
+ "question": "What is the Resource Development tactic (TA0042)?",
719
+ "answer": "Resource Development (TA0042) covers techniques adversaries use to establish resources for operations before targeting victims. Techniques include Acquire Infrastructure (T1583 - domains, servers, cloud accounts), Compromise Infrastructure (T1584), Develop Capabilities (T1587 - malware, exploits), Obtain Capabilities (T1588 - buying malware, credentials), and Establish Accounts (T1585). This pre-attack tactic is difficult to detect as it occurs outside the target network. Threat intelligence sharing and monitoring certificate transparency logs help identify adversary infrastructure.",
720
+ "category": "tactic",
721
+ "reference": "TA0042",
722
+ "difficulty": "advanced",
723
+ "keywords": [
724
+ "resource development",
725
+ "infrastructure",
726
+ "pre-attack",
727
+ "domains",
728
+ "malware development"
729
+ ],
730
+ "source_url": "https://www.ayinedjimi-consultants.fr"
731
+ },
732
+ {
733
+ "id": "qa-048",
734
+ "question": "What is T1562 (Impair Defenses)?",
735
+ "answer": "Impair Defenses (T1562) is a defense evasion technique where adversaries disable or modify security tools. Sub-techniques include Disable or Modify Tools (T1562.001 - killing AV/EDR processes), Disable Windows Event Logging (T1562.002), Impair Command History Logging (T1562.003), Disable or Modify System Firewall (T1562.004), and Disable Cloud Logs (T1562.008). Detection involves monitoring for security tool process termination, audit policy changes, and log source gaps. Tamper-protected EDR and centralized log collection mitigate this technique.",
736
+ "category": "technique",
737
+ "reference": "T1562",
738
+ "difficulty": "advanced",
739
+ "keywords": [
740
+ "impair defenses",
741
+ "disable AV",
742
+ "EDR evasion",
743
+ "log tampering",
744
+ "firewall disable"
745
+ ],
746
+ "source_url": "https://www.ayinedjimi-consultants.fr"
747
+ },
748
+ {
749
+ "id": "qa-049",
750
+ "question": "How do you build an ATT&CK-based detection strategy?",
751
+ "answer": "Building an ATT&CK detection strategy involves: 1) Prioritize techniques based on threat intelligence for your sector and most commonly used techniques. 2) Map existing data sources (logs, EDR, NDR) to ATT&CK techniques using the Data Sources objects. 3) Identify gaps where you have no visibility. 4) Write detection rules (Sigma, YARA, Snort) mapped to specific technique IDs. 5) Test detections using atomic tests or adversary emulation tools. 6) Measure coverage using ATT&CK Navigator. 7) Iterate by expanding coverage based on risk priorities.",
752
+ "category": "general",
753
+ "reference": "",
754
+ "difficulty": "advanced",
755
+ "keywords": [
756
+ "detection strategy",
757
+ "data sources",
758
+ "Sigma",
759
+ "atomic tests",
760
+ "coverage"
761
+ ],
762
+ "source_url": "https://www.ayinedjimi-consultants.fr"
763
+ },
764
+ {
765
+ "id": "qa-050",
766
+ "question": "What is T1547 (Boot or Logon Autostart Execution)?",
767
+ "answer": "T1547 covers persistence mechanisms that execute during system boot or user logon. Sub-techniques include Registry Run Keys (T1547.001), Authentication Package (T1547.002), Winlogon Helper DLL (T1547.004), Security Support Provider (T1547.005), Kernel Modules (T1547.006), and Shortcut Modification (T1547.009). These are among the most common persistence techniques. Detection involves monitoring registry key modifications (HKCU/HKLM Run/RunOnce), startup folder changes, and autostart enumeration tools like Autoruns.",
768
+ "category": "technique",
769
+ "reference": "T1547",
770
+ "difficulty": "intermediate",
771
+ "keywords": [
772
+ "autostart",
773
+ "registry",
774
+ "persistence",
775
+ "Run keys",
776
+ "Autoruns"
777
+ ],
778
+ "source_url": "https://www.ayinedjimi-consultants.fr"
779
+ },
780
+ {
781
+ "id": "qa-051",
782
+ "question": "What are data sources in ATT&CK and why are they important?",
783
+ "answer": "Data sources in ATT&CK describe the types of telemetry needed to detect specific techniques. Examples include Process Creation, Network Traffic Flow, File Modification, Windows Registry Key Modification, and Command Execution. Each data source has data components (e.g., Process Creation has Process Created, Process Metadata). They are critical for detection engineering because they help organizations understand what logs and sensors are needed. Mapping data sources to your infrastructure reveals detection blind spots.",
784
+ "category": "general",
785
+ "reference": "",
786
+ "difficulty": "intermediate",
787
+ "keywords": [
788
+ "data sources",
789
+ "telemetry",
790
+ "detection",
791
+ "logs",
792
+ "sensors"
793
+ ],
794
+ "source_url": "https://www.ayinedjimi-consultants.fr"
795
+ },
796
+ {
797
+ "id": "qa-052",
798
+ "question": "What is T1053 (Scheduled Task/Job)?",
799
+ "answer": "Scheduled Task/Job (T1053) is used for both execution and persistence. Sub-techniques include At (T1053.002), Cron (T1053.003), Scheduled Task (T1053.005), and Container Orchestration Job (T1053.007). Attackers create scheduled tasks to execute malicious payloads at specified times or intervals, maintaining persistence across reboots. Detection involves monitoring task creation events (Event ID 4698), schtasks.exe execution, and unexpected cron entries. Common in ransomware and APT campaigns for staged execution.",
800
+ "category": "technique",
801
+ "reference": "T1053",
802
+ "difficulty": "intermediate",
803
+ "keywords": [
804
+ "scheduled task",
805
+ "cron",
806
+ "persistence",
807
+ "execution",
808
+ "schtasks"
809
+ ],
810
+ "source_url": "https://www.ayinedjimi-consultants.fr"
811
+ },
812
+ {
813
+ "id": "qa-053",
814
+ "question": "What is ATT&CK for Cloud and what techniques are covered?",
815
+ "answer": "ATT&CK for Cloud covers adversary techniques targeting cloud environments (AWS, Azure, GCP, SaaS, Office 365). Key techniques include Cloud Service Discovery (T1580), Cloud Infrastructure Discovery (T1580), Steal Application Access Token (T1528), Modify Cloud Compute Infrastructure (T1578), and Transfer Data to Cloud Account (T1537). Cloud-specific mitigations include IAM policy hardening, cloud audit logging (CloudTrail, Azure Monitor), conditional access policies, and cloud security posture management (CSPM) tools.",
816
+ "category": "general",
817
+ "reference": "",
818
+ "difficulty": "advanced",
819
+ "keywords": [
820
+ "cloud",
821
+ "AWS",
822
+ "Azure",
823
+ "GCP",
824
+ "IAM",
825
+ "cloud security"
826
+ ],
827
+ "source_url": "https://www.ayinedjimi-consultants.fr"
828
+ },
829
+ {
830
+ "id": "qa-054",
831
+ "question": "What is T1505.003 (Web Shell)?",
832
+ "answer": "Web Shell (T1505.003) is a persistence technique where attackers install a malicious script on a web server that provides a backdoor for remote access. Web shells can be simple (one-line PHP eval) or sophisticated (China Chopper, WSO). They are commonly deployed after exploiting web application vulnerabilities. Detection involves file integrity monitoring on web directories, monitoring for unusual process creation by web server processes (w3wp.exe, httpd), and scanning for known web shell signatures. Network-based detection looks for unusual POST requests to unexpected files.",
833
+ "category": "technique",
834
+ "reference": "T1505.003",
835
+ "difficulty": "intermediate",
836
+ "keywords": [
837
+ "web shell",
838
+ "backdoor",
839
+ "PHP",
840
+ "China Chopper",
841
+ "persistence"
842
+ ],
843
+ "source_url": "https://www.ayinedjimi-consultants.fr"
844
+ },
845
+ {
846
+ "id": "qa-055",
847
+ "question": "What is the Privilege Escalation tactic (TA0004)?",
848
+ "answer": "Privilege Escalation (TA0004) covers techniques for gaining higher-level permissions. Key techniques include Exploitation for Privilege Escalation (T1068), Process Injection (T1055), Abuse Elevation Control Mechanism (T1548 - UAC bypass, sudo exploitation), Valid Accounts (T1078), and Access Token Manipulation (T1134). Many techniques overlap with Persistence. Detection requires monitoring for privilege changes, unusual service installations, and token manipulation. LAPS, PAM solutions, and least privilege enforcement are primary mitigations.",
849
+ "category": "tactic",
850
+ "reference": "TA0004",
851
+ "difficulty": "intermediate",
852
+ "keywords": [
853
+ "privilege escalation",
854
+ "UAC bypass",
855
+ "token manipulation",
856
+ "LAPS"
857
+ ],
858
+ "source_url": "https://www.ayinedjimi-consultants.fr"
859
+ },
860
+ {
861
+ "id": "qa-056",
862
+ "question": "How does ATT&CK help with purple team exercises?",
863
+ "answer": "ATT&CK provides a common language and structure for purple team exercises. The red team selects techniques to simulate (using tools like Atomic Red Team, CALDERA, or manual execution), while the blue team verifies detection and response capabilities. Steps: 1) Select ATT&CK techniques relevant to your threat model. 2) Red team executes techniques in a controlled manner. 3) Blue team attempts to detect and respond. 4) Both teams collaborate to improve detection rules. 5) Document findings in ATT&CK Navigator layers showing tested vs detected techniques.",
864
+ "category": "general",
865
+ "reference": "",
866
+ "difficulty": "advanced",
867
+ "keywords": [
868
+ "purple team",
869
+ "adversary emulation",
870
+ "Atomic Red Team",
871
+ "detection validation"
872
+ ],
873
+ "source_url": "https://www.ayinedjimi-consultants.fr"
874
+ },
875
+ {
876
+ "id": "qa-057",
877
+ "question": "What is T1070 (Indicator Removal)?",
878
+ "answer": "Indicator Removal (T1070) is a defense evasion technique where adversaries delete or modify artifacts to cover their tracks. Sub-techniques include Clear Windows Event Logs (T1070.001), Clear Linux/Mac System Logs (T1070.002), Clear Command History (T1070.003), File Deletion (T1070.004), Network Share Connection Removal (T1070.005), and Timestomp (T1070.006). Detection involves monitoring for log clearing events (Event ID 1102 for Security log), unexpected file deletions, and timestamp anomalies. Centralized logging to a tamper-proof location (SIEM) is the primary mitigation.",
879
+ "category": "technique",
880
+ "reference": "T1070",
881
+ "difficulty": "intermediate",
882
+ "keywords": [
883
+ "indicator removal",
884
+ "log clearing",
885
+ "timestomp",
886
+ "anti-forensics",
887
+ "cover tracks"
888
+ ],
889
+ "source_url": "https://www.ayinedjimi-consultants.fr"
890
+ },
891
+ {
892
+ "id": "qa-058",
893
+ "question": "What is the Credential Access tactic (TA0006)?",
894
+ "answer": "Credential Access (TA0006) covers techniques for stealing credentials. Key techniques include OS Credential Dumping (T1003), Brute Force (T1110), Steal or Forge Kerberos Tickets (T1558), Input Capture (T1056 - keylogging), Unsecured Credentials (T1552), and Forge Web Credentials (T1606). These credentials enable privilege escalation and lateral movement. Mitigations include Credential Guard, MFA, password policies, privileged access management, and monitoring for credential access indicators like LSASS memory access.",
895
+ "category": "tactic",
896
+ "reference": "TA0006",
897
+ "difficulty": "intermediate",
898
+ "keywords": [
899
+ "credential access",
900
+ "credential dumping",
901
+ "brute force",
902
+ "Kerberos",
903
+ "keylogging"
904
+ ],
905
+ "source_url": "https://www.ayinedjimi-consultants.fr"
906
+ },
907
+ {
908
+ "id": "qa-059",
909
+ "question": "What is Atomic Red Team?",
910
+ "answer": "Atomic Red Team is an open-source library of small, focused tests mapped to ATT&CK techniques. Each 'atomic test' simulates a single technique with minimal dependencies, making them easy to execute and validate detection capabilities. Tests are available for Windows, Linux, and macOS. They can be executed manually, via Invoke-AtomicRedTeam (PowerShell), or integrated into CI/CD pipelines for continuous detection validation. The project is maintained by Red Canary and available on GitHub with over 1,000 test cases covering hundreds of ATT&CK techniques.",
911
+ "category": "general",
912
+ "reference": "",
913
+ "difficulty": "intermediate",
914
+ "keywords": [
915
+ "Atomic Red Team",
916
+ "testing",
917
+ "detection validation",
918
+ "Red Canary",
919
+ "automation"
920
+ ],
921
+ "source_url": "https://www.ayinedjimi-consultants.fr"
922
+ },
923
+ {
924
+ "id": "qa-060",
925
+ "question": "What is T1027 (Obfuscated Files or Information)?",
926
+ "answer": "T1027 covers adversary use of obfuscation to hide malicious content. Sub-techniques include Binary Padding (T1027.001), Software Packing (T1027.002), Steganography (T1027.003), Compile After Delivery (T1027.004), Encrypted/Encoded File (T1027.013), and HTML Smuggling (T1027.006). Obfuscation helps evade signature-based detection. Detection involves entropy analysis, behavioral execution monitoring, AMSI for script deobfuscation, and sandboxing for packed executables. Static analysis of obfuscated files should be complemented by dynamic analysis.",
927
+ "category": "technique",
928
+ "reference": "T1027",
929
+ "difficulty": "advanced",
930
+ "keywords": [
931
+ "obfuscation",
932
+ "packing",
933
+ "encoding",
934
+ "steganography",
935
+ "HTML smuggling"
936
+ ],
937
+ "source_url": "https://www.ayinedjimi-consultants.fr"
938
+ },
939
+ {
940
+ "id": "qa-061",
941
+ "question": "How is MITRE ATT&CK used in CTI (Cyber Threat Intelligence)?",
942
+ "answer": "ATT&CK provides a structured framework for CTI analysis: 1) TTPs mapping: convert raw intelligence (IoCs, malware samples) into ATT&CK technique mappings for structured analysis. 2) Group tracking: associate observed techniques with known threat groups. 3) Trend analysis: identify which techniques are trending across the threat landscape. 4) Intelligence sharing: use ATT&CK IDs as a common vocabulary when sharing intelligence (STIX/TAXII). 5) Threat profiling: build profiles of adversaries targeting your sector to prioritize defenses.",
943
+ "category": "general",
944
+ "reference": "",
945
+ "difficulty": "advanced",
946
+ "keywords": [
947
+ "CTI",
948
+ "threat intelligence",
949
+ "TTP",
950
+ "STIX",
951
+ "TAXII",
952
+ "intelligence sharing"
953
+ ],
954
+ "source_url": "https://www.ayinedjimi-consultants.fr"
955
+ },
956
+ {
957
+ "id": "qa-062",
958
+ "question": "What is T1486 (Data Encrypted for Impact)?",
959
+ "answer": "T1486 represents the core ransomware behavior - encrypting data to deny access and demand ransom. Modern ransomware operations combine T1486 with T1490 (Inhibit System Recovery - deleting shadow copies), T1489 (Service Stop - stopping backup agents), T1567 (Exfiltration - double extortion), and T1657 (Financial Theft). Notable ransomware families include LockBit, BlackCat/ALPHV, Royal, and Cl0p. Detection relies on monitoring for mass file modifications, known ransomware file extensions, and ransom note creation. Immutable backups and network segmentation are critical mitigations.",
960
+ "category": "technique",
961
+ "reference": "T1486",
962
+ "difficulty": "intermediate",
963
+ "keywords": [
964
+ "ransomware",
965
+ "encryption",
966
+ "data encrypted",
967
+ "LockBit",
968
+ "double extortion"
969
+ ],
970
+ "source_url": "https://www.ayinedjimi-consultants.fr"
971
+ },
972
+ {
973
+ "id": "qa-063",
974
+ "question": "What are MITRE ATT&CK mitigations and how are they used?",
975
+ "answer": "ATT&CK mitigations (M-series IDs) represent security measures that prevent or limit the effectiveness of techniques. Examples include M1036 (Account Use Policies), M1049 (Antivirus/Antimalware), M1026 (Privileged Account Management), M1051 (Update Software), and M1017 (User Training). Each mitigation is linked to the techniques it addresses. Organizations use mitigations to: prioritize security investments based on which mitigations cover the most relevant techniques, validate existing controls against ATT&CK, and build a defense-in-depth strategy mapped to the framework.",
976
+ "category": "general",
977
+ "reference": "",
978
+ "difficulty": "beginner",
979
+ "keywords": [
980
+ "mitigations",
981
+ "controls",
982
+ "defense",
983
+ "prioritization",
984
+ "M-series"
985
+ ],
986
+ "source_url": "https://www.ayinedjimi-consultants.fr"
987
+ },
988
+ {
989
+ "id": "qa-064",
990
+ "question": "What is the Reconnaissance tactic and how is it detected?",
991
+ "answer": "Reconnaissance (TA0043) covers pre-attack information gathering that occurs mostly outside the target network. Techniques include Active Scanning (T1595), Gather Victim Identity Information (T1589), Gather Victim Network Information (T1590), Search Open Websites (T1593), and Phishing for Information (T1598). Detection is challenging since most activity happens externally. Organizations can detect some reconnaissance via honeypots, monitoring for unusual DNS queries, detecting web scraping of public-facing sites, and tracking social engineering attempts. Threat intelligence feeds help identify adversary infrastructure.",
992
+ "category": "tactic",
993
+ "reference": "TA0043",
994
+ "difficulty": "intermediate",
995
+ "keywords": [
996
+ "reconnaissance",
997
+ "OSINT",
998
+ "scanning",
999
+ "social engineering",
1000
+ "honeypots"
1001
+ ],
1002
+ "source_url": "https://www.ayinedjimi-consultants.fr"
1003
+ },
1004
+ {
1005
+ "id": "qa-065",
1006
+ "question": "What is T1036 (Masquerading)?",
1007
+ "answer": "Masquerading (T1036) is a defense evasion technique where adversaries manipulate names and locations to make files or activities appear legitimate. Sub-techniques include Invalid Code Signature (T1036.001), Rename System Utilities (T1036.003), Masquerade Task or Service (T1036.004), Match Legitimate Name or Location (T1036.005), and Space After Filename (T1036.006). For example, renaming malware to svchost.exe or placing it in C:\\Windows\\. Detection involves comparing process names to expected file paths, verifying code signatures, and monitoring for renamed system binaries.",
1008
+ "category": "technique",
1009
+ "reference": "T1036",
1010
+ "difficulty": "intermediate",
1011
+ "keywords": [
1012
+ "masquerading",
1013
+ "rename",
1014
+ "impersonation",
1015
+ "svchost",
1016
+ "evasion"
1017
+ ],
1018
+ "source_url": "https://www.ayinedjimi-consultants.fr"
1019
+ },
1020
+ {
1021
+ "id": "qa-066",
1022
+ "question": "How does MITRE D3FEND complement ATT&CK?",
1023
+ "answer": "MITRE D3FEND is a knowledge graph of defensive techniques mapped to ATT&CK offensive techniques. While ATT&CK catalogs what adversaries do, D3FEND catalogs what defenders can do about it. D3FEND organizes defenses into categories: Harden (reduce attack surface), Detect (identify malicious activity), Isolate (contain threats), Deceive (deploy deception), and Evict (remove threats). Each D3FEND technique links to the ATT&CK techniques it counters, helping security teams build comprehensive defensive architectures.",
1024
+ "category": "general",
1025
+ "reference": "",
1026
+ "difficulty": "advanced",
1027
+ "keywords": [
1028
+ "D3FEND",
1029
+ "defensive",
1030
+ "countermeasures",
1031
+ "knowledge graph",
1032
+ "harden"
1033
+ ],
1034
+ "source_url": "https://www.ayinedjimi-consultants.fr"
1035
+ },
1036
+ {
1037
+ "id": "qa-067",
1038
+ "question": "What is the difference between techniques used by APT groups vs cybercriminals?",
1039
+ "answer": "APT groups (nation-state) typically focus on stealth, persistence, and long-term access using sophisticated custom tools and zero-days. They prioritize techniques in Credential Access, Collection, and Exfiltration with extensive Defense Evasion. Cybercriminals prioritize speed and monetization, focusing on Initial Access (mass phishing, exploit scanning), rapid Execution, and Impact (ransomware). Cybercriminals more frequently use commodity tools (Cobalt Strike, commodity RATs) and publicly known exploits. However, this distinction is blurring as cybercriminals adopt APT techniques and vice versa.",
1040
+ "category": "general",
1041
+ "reference": "",
1042
+ "difficulty": "intermediate",
1043
+ "keywords": [
1044
+ "APT",
1045
+ "cybercriminal",
1046
+ "nation-state",
1047
+ "ransomware",
1048
+ "TTPs comparison"
1049
+ ],
1050
+ "source_url": "https://www.ayinedjimi-consultants.fr"
1051
+ },
1052
+ {
1053
+ "id": "qa-068",
1054
+ "question": "What is T1098 (Account Manipulation)?",
1055
+ "answer": "Account Manipulation (T1098) involves modifying account attributes to maintain access. Sub-techniques include Additional Cloud Credentials (T1098.001), Additional Email Delegate Access (T1098.002), Additional Cloud Roles (T1098.003), SSH Authorized Keys (T1098.004), and Device Registration (T1098.005). In Active Directory, this includes adding users to privileged groups, modifying delegation settings, or adding SPN for Kerberoasting setup. Detection involves monitoring group membership changes (Event IDs 4728, 4732, 4756), authorized_keys file modifications, and cloud IAM policy changes.",
1056
+ "category": "technique",
1057
+ "reference": "T1098",
1058
+ "difficulty": "advanced",
1059
+ "keywords": [
1060
+ "account manipulation",
1061
+ "group membership",
1062
+ "SSH keys",
1063
+ "IAM",
1064
+ "persistence"
1065
+ ],
1066
+ "source_url": "https://www.ayinedjimi-consultants.fr"
1067
+ },
1068
+ {
1069
+ "id": "qa-069",
1070
+ "question": "What is Sigma and how does it relate to ATT&CK?",
1071
+ "answer": "Sigma is an open standard for writing detection rules that can be converted to various SIEM formats (Splunk, Elastic, Microsoft Sentinel, etc.). Many Sigma rules are mapped to ATT&CK technique IDs via the 'tags' field (e.g., attack.t1003.001). The SigmaHQ repository contains thousands of community-contributed rules organized by ATT&CK tactics. Using Sigma with ATT&CK allows organizations to measure detection coverage against the framework, share detection logic across different SIEM platforms, and systematically build detections for prioritized techniques.",
1072
+ "category": "general",
1073
+ "reference": "",
1074
+ "difficulty": "intermediate",
1075
+ "keywords": [
1076
+ "Sigma",
1077
+ "detection rules",
1078
+ "SIEM",
1079
+ "Splunk",
1080
+ "Elastic",
1081
+ "conversion"
1082
+ ],
1083
+ "source_url": "https://www.ayinedjimi-consultants.fr"
1084
+ },
1085
+ {
1086
+ "id": "qa-070",
1087
+ "question": "What are the best practices for maintaining ATT&CK coverage over time?",
1088
+ "answer": "Maintaining ATT&CK coverage requires: 1) Regular reassessment as ATT&CK updates quarterly with new techniques and sub-techniques. 2) Continuous detection testing using Atomic Red Team or CALDERA to validate existing detections still work. 3) Threat intelligence integration to reprioritize based on emerging threats to your sector. 4) Purple team exercises to test the full detection-response chain, not just rule matching. 5) Tracking coverage metrics in ATT&CK Navigator layers comparing quarterly snapshots. 6) Ensuring new infrastructure and cloud services are integrated into the detection framework.",
1089
+ "category": "general",
1090
+ "reference": "",
1091
+ "difficulty": "advanced",
1092
+ "keywords": [
1093
+ "coverage maintenance",
1094
+ "continuous testing",
1095
+ "quarterly updates",
1096
+ "metrics",
1097
+ "Navigator"
1098
+ ],
1099
+ "source_url": "https://www.ayinedjimi-consultants.fr"
1100
  }
1101
  ]