[
{
"id": "T1001",
"name": "Data Obfuscation",
"description": "Adversaries may obfuscate command and control traffic to make it more difficult to detect.(Citation: Bitdefender FunnyDream Campaign November 2020) Command and control (C2) communications are hidden (but not necessarily encrypted) in an attempt to make the content more difficult to discover or decipher and to make the communication less conspicuous and hide commands from being seen. This encompasses many methods, such as adding junk data to protocol traffic, using steganography, or impersonating legitimate protocols. ",
"tactic_ids": [
"TA0011"
],
"tactic_names": [
"Command and Control"
],
"is_subtechnique": false,
"parent_id": null,
"platforms": [
"ESXi",
"Linux",
"macOS",
"Windows"
],
"detection": "",
"mitigation_ids": [
"M1031"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1001",
"created": "2017-05-31",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1001.001",
"name": "Junk Data",
"description": "Adversaries may add junk data to protocols used for command and control to make detection more difficult.(Citation: FireEye SUNBURST Backdoor December 2020) By adding random or meaningless data to the protocols used for command and control, adversaries can prevent trivial methods for decoding, deciphering, or otherwise analyzing the traffic. Examples may include appending/prepending data with junk characters or writing junk characters between significant characters. ",
"tactic_ids": [
"TA0011"
],
"tactic_names": [
"Command and Control"
],
"is_subtechnique": true,
"parent_id": "T1001",
"platforms": [
"ESXi",
"Linux",
"macOS",
"Windows"
],
"detection": "",
"mitigation_ids": [
"M1031"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1001/001",
"created": "2020-03-15",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1001.002",
"name": "Steganography",
"description": "Adversaries may use steganographic techniques to hide command and control traffic to make detection efforts more difficult. Steganographic techniques can be used to hide data in digital messages that are transferred between systems. This hidden information can be used for command and control of compromised systems. In some cases, the passing of files embedded using steganography, such as image or document files, can be used for command and control. ",
"tactic_ids": [
"TA0011"
],
"tactic_names": [
"Command and Control"
],
"is_subtechnique": true,
"parent_id": "T1001",
"platforms": [
"Linux",
"macOS",
"Windows",
"ESXi"
],
"detection": "",
"mitigation_ids": [
"M1031"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1001/002",
"created": "2020-03-15",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1001.003",
"name": "Protocol or Service Impersonation",
"description": "Adversaries may impersonate legitimate protocols or web service traffic to disguise command and control activity and thwart analysis efforts. By impersonating legitimate protocols or web services, adversaries can make their command and control traffic blend in with legitimate network traffic. \n\nAdversaries may impersonate a fake SSL/TLS handshake to make it look like subsequent traffic is SSL/TLS encrypted, potentially interfering with some security tooling, or to make the traffic look like it is related with a trusted entity. \n\nAdversaries may also leverage legitimate protocols to impersonate expected web traffic or trusted services. For example, adversaries may manipulate HTTP headers, URI endpoints, SSL certificates, and transmitted data to disguise C2 communications or mimic legitimate services such as Gmail, Google Drive, and Yahoo Messenger.(Citation: ESET Okrum July 2019)(Citation: Malleable-C2-U42)",
"tactic_ids": [
"TA0011"
],
"tactic_names": [
"Command and Control"
],
"is_subtechnique": true,
"parent_id": "T1001",
"platforms": [
"ESXi",
"Linux",
"macOS",
"Windows"
],
"detection": "",
"mitigation_ids": [
"M1031"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1001/003",
"created": "2020-03-15",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1003",
"name": "OS Credential Dumping",
"description": "Adversaries may attempt to dump credentials to obtain account login and credential material, normally in the form of a hash or a clear text password. Credentials can be obtained from OS caches, memory, or structures.(Citation: Brining MimiKatz to Unix) Credentials can then be used to perform [Lateral Movement](https://attack.mitre.org/tactics/TA0008) and access restricted information.\n\nSeveral of the tools mentioned in associated sub-techniques may be used by both adversaries and professional security testers. Additional custom tools likely exist as well.\n",
"tactic_ids": [
"TA0006"
],
"tactic_names": [
"Credential Access"
],
"is_subtechnique": false,
"parent_id": null,
"platforms": [
"Linux",
"macOS",
"Windows"
],
"detection": "",
"mitigation_ids": [
"M1017",
"M1028",
"M1043",
"M1025",
"M1027",
"M1040",
"M1026",
"M1015",
"M1041"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1003",
"created": "2017-05-31",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1003.001",
"name": "LSASS Memory",
"description": "Adversaries may attempt to access credential material stored in the process memory of the Local Security Authority Subsystem Service (LSASS). After a user logs on, the system generates and stores a variety of credential materials in LSASS process memory. These credential materials can be harvested by an administrative user or SYSTEM and used to conduct [Lateral Movement](https://attack.mitre.org/tactics/TA0008) using [Use Alternate Authentication Material](https://attack.mitre.org/techniques/T1550).\n\nAs well as in-memory techniques, the LSASS process memory can be dumped from the target host and analyzed on a local system.\n\nFor example, on the target host use procdump:\n\n* procdump -ma lsass.exe lsass_dump\n\nLocally, mimikatz can be run using:\n\n* sekurlsa::Minidump lsassdump.dmp\n* sekurlsa::logonPasswords\n\nBuilt-in Windows tools such as `comsvcs.dll` can also be used:\n\n* rundll32.exe C:\\Windows\\System32\\comsvcs.dll MiniDump PID lsass.dmp full(Citation: Volexity Exchange Marauder March 2021)(Citation: Symantec Attacks Against Government Sector)\n\nSimilar to [Image File Execution Options Injection](https://attack.mitre.org/techniques/T1546/012), the silent process exit mechanism can be abused to create a memory dump of `lsass.exe` through Windows Error Reporting (`WerFault.exe`).(Citation: Deep Instinct LSASS)\n\nWindows Security Support Provider (SSP) DLLs are loaded into LSASS process at system start. Once loaded into the LSA, SSP DLLs have access to encrypted and plaintext passwords that are stored in Windows, such as any logged-on user's Domain password or smart card PINs. The SSP configuration is stored in two Registry keys: HKLM\\SYSTEM\\CurrentControlSet\\Control\\Lsa\\Security Packages and HKLM\\SYSTEM\\CurrentControlSet\\Control\\Lsa\\OSConfig\\Security Packages. An adversary may modify these Registry keys to add new SSPs, which will be loaded the next time the system boots, or when the AddSecurityPackage Windows API function is called.(Citation: Graeber 2014)\n\nThe following SSPs can be used to access credentials:\n\n* Msv: Interactive logons, batch logons, and service logons are done through the MSV authentication package.\n* Wdigest: The Digest Authentication protocol is designed for use with Hypertext Transfer Protocol (HTTP) and Simple Authentication Security Layer (SASL) exchanges.(Citation: TechNet Blogs Credential Protection)\n* Kerberos: Preferred for mutual client-server domain authentication in Windows 2000 and later.\n* CredSSP: Provides SSO and Network Level Authentication for Remote Desktop Services.(Citation: TechNet Blogs Credential Protection)\n",
"tactic_ids": [
"TA0006"
],
"tactic_names": [
"Credential Access"
],
"is_subtechnique": true,
"parent_id": "T1003",
"platforms": [
"Windows"
],
"detection": "",
"mitigation_ids": [
"M1017",
"M1028",
"M1043",
"M1025",
"M1027",
"M1040",
"M1026"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1003/001",
"created": "2020-02-11",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1003.002",
"name": "Security Account Manager",
"description": "Adversaries may attempt to extract credential material from the Security Account Manager (SAM) database either through in-memory techniques or through the Windows Registry where the SAM database is stored. The SAM is a database file that contains local accounts for the host, typically those found with the net user command. Enumerating the SAM database requires SYSTEM level access.\n\nA number of tools can be used to retrieve the SAM file through in-memory techniques:\n\n* pwdumpx.exe\n* [gsecdump](https://attack.mitre.org/software/S0008)\n* [Mimikatz](https://attack.mitre.org/software/S0002)\n* secretsdump.py\n\nAlternatively, the SAM can be extracted from the Registry with Reg:\n\n* reg save HKLM\\sam sam\n* reg save HKLM\\system system\n\nCreddump7 can then be used to process the SAM database locally to retrieve hashes.(Citation: GitHub Creddump7)\n\nNotes: \n\n* RID 500 account is the local, built-in administrator.\n* RID 501 is the guest account.\n* User accounts start with a RID of 1,000+.\n",
"tactic_ids": [
"TA0006"
],
"tactic_names": [
"Credential Access"
],
"is_subtechnique": true,
"parent_id": "T1003",
"platforms": [
"Windows"
],
"detection": "",
"mitigation_ids": [
"M1017",
"M1028",
"M1027",
"M1026"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1003/002",
"created": "2020-02-11",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1003.003",
"name": "NTDS",
"description": "Adversaries may attempt to access or create a copy of the Active Directory domain database in order to steal credential information, as well as obtain other information about domain members such as devices, users, and access rights. By default, the NTDS file (NTDS.dit) is located in %SystemRoot%\\NTDS\\Ntds.dit of a domain controller.(Citation: Wikipedia Active Directory)\n\nIn addition to looking for NTDS files on active Domain Controllers, adversaries may search for backups that contain the same or similar information.(Citation: Metcalf 2015)\n\nThe following tools and techniques can be used to enumerate the NTDS file and the contents of the entire Active Directory hashes.\n\n* Volume Shadow Copy\n* secretsdump.py\n* Using the in-built Windows tool, ntdsutil.exe\n* Invoke-NinjaCopy\n",
"tactic_ids": [
"TA0006"
],
"tactic_names": [
"Credential Access"
],
"is_subtechnique": true,
"parent_id": "T1003",
"platforms": [
"Windows"
],
"detection": "",
"mitigation_ids": [
"M1017",
"M1027",
"M1026",
"M1041"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1003/003",
"created": "2020-02-11",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1003.004",
"name": "LSA Secrets",
"description": "Adversaries with SYSTEM access to a host may attempt to access Local Security Authority (LSA) secrets, which can contain a variety of different credential materials, such as credentials for service accounts.(Citation: Passcape LSA Secrets)(Citation: Microsoft AD Admin Tier Model)(Citation: Tilbury Windows Credentials) LSA secrets are stored in the registry at HKEY_LOCAL_MACHINE\\SECURITY\\Policy\\Secrets. LSA secrets can also be dumped from memory.(Citation: ired Dumping LSA Secrets)\n\n[Reg](https://attack.mitre.org/software/S0075) can be used to extract from the Registry. [Mimikatz](https://attack.mitre.org/software/S0002) can be used to extract secrets from memory.(Citation: ired Dumping LSA Secrets)",
"tactic_ids": [
"TA0006"
],
"tactic_names": [
"Credential Access"
],
"is_subtechnique": true,
"parent_id": "T1003",
"platforms": [
"Windows"
],
"detection": "",
"mitigation_ids": [
"M1017",
"M1027",
"M1026"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1003/004",
"created": "2020-02-21",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1003.005",
"name": "Cached Domain Credentials",
"description": "Adversaries may attempt to access cached domain credentials used to allow authentication to occur in the event a domain controller is unavailable.(Citation: Microsoft - Cached Creds)\n\nOn Windows Vista and newer, the hash format is DCC2 (Domain Cached Credentials version 2) hash, also known as MS-Cache v2 hash.(Citation: PassLib mscache) The number of default cached credentials varies and can be altered per system. This hash does not allow pass-the-hash style attacks, and instead requires [Password Cracking](https://attack.mitre.org/techniques/T1110/002) to recover the plaintext password.(Citation: ired mscache)\n\nOn Linux systems, Active Directory credentials can be accessed through caches maintained by software like System Security Services Daemon (SSSD) or Quest Authentication Services (formerly VAS). Cached credential hashes are typically located at `/var/lib/sss/db/cache.[domain].ldb` for SSSD or `/var/opt/quest/vas/authcache/vas_auth.vdb` for Quest. Adversaries can use utilities, such as `tdbdump`, on these database files to dump the cached hashes and use [Password Cracking](https://attack.mitre.org/techniques/T1110/002) to obtain the plaintext password.(Citation: Brining MimiKatz to Unix) \n\nWith SYSTEM or sudo access, the tools/utilities such as [Mimikatz](https://attack.mitre.org/software/S0002), [Reg](https://attack.mitre.org/software/S0075), and secretsdump.py for Windows or Linikatz for Linux can be used to extract the cached credentials.(Citation: Brining MimiKatz to Unix)\n\nNote: Cached credentials for Windows Vista are derived using PBKDF2.(Citation: PassLib mscache)",
"tactic_ids": [
"TA0006"
],
"tactic_names": [
"Credential Access"
],
"is_subtechnique": true,
"parent_id": "T1003",
"platforms": [
"Windows",
"Linux"
],
"detection": "",
"mitigation_ids": [
"M1017",
"M1028",
"M1027",
"M1026",
"M1015"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1003/005",
"created": "2020-02-21",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1003.006",
"name": "DCSync",
"description": "Adversaries may attempt to access credentials and other sensitive information by abusing a Windows Domain Controller's application programming interface (API)(Citation: Microsoft DRSR Dec 2017) (Citation: Microsoft GetNCCChanges) (Citation: Samba DRSUAPI) (Citation: Wine API samlib.dll) to simulate the replication process from a remote domain controller using a technique called DCSync.\n\nMembers of the Administrators, Domain Admins, and Enterprise Admin groups or computer accounts on the domain controller are able to run DCSync to pull password data(Citation: ADSecurity Mimikatz DCSync) from Active Directory, which may include current and historical hashes of potentially useful accounts such as KRBTGT and Administrators. The hashes can then in turn be used to create a [Golden Ticket](https://attack.mitre.org/techniques/T1558/001) for use in [Pass the Ticket](https://attack.mitre.org/techniques/T1550/003)(Citation: Harmj0y Mimikatz and DCSync) or change an account's password as noted in [Account Manipulation](https://attack.mitre.org/techniques/T1098).(Citation: InsiderThreat ChangeNTLM July 2017)\n\nDCSync functionality has been included in the \"lsadump\" module in [Mimikatz](https://attack.mitre.org/software/S0002).(Citation: GitHub Mimikatz lsadump Module) Lsadump also includes NetSync, which performs DCSync over a legacy replication protocol.(Citation: Microsoft NRPC Dec 2017)",
"tactic_ids": [
"TA0006"
],
"tactic_names": [
"Credential Access"
],
"is_subtechnique": true,
"parent_id": "T1003",
"platforms": [
"Windows"
],
"detection": "",
"mitigation_ids": [
"M1027",
"M1026",
"M1015"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1003/006",
"created": "2020-02-11",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1003.007",
"name": "Proc Filesystem",
"description": "Adversaries may gather credentials from the proc filesystem or `/proc`. The proc filesystem is a pseudo-filesystem used as an interface to kernel data structures for Linux based systems managing virtual memory. For each process, the `/proc//maps` file shows how memory is mapped within the process’s virtual address space. And `/proc//mem`, exposed for debugging purposes, provides access to the process’s virtual address space.(Citation: Picus Labs Proc cump 2022)(Citation: baeldung Linux proc map 2022)\n\nWhen executing with root privileges, adversaries can search these memory locations for all processes on a system that contain patterns indicative of credentials. Adversaries may use regex patterns, such as grep -E \"^[0-9a-f-]* r\" /proc/\"$pid\"/maps | cut -d' ' -f 1, to look for fixed strings in memory structures or cached hashes.(Citation: atomic-red proc file system) When running without privileged access, processes can still view their own virtual memory locations. Some services or programs may save credentials in clear text inside the process’s memory.(Citation: MimiPenguin GitHub May 2017)(Citation: Polop Linux PrivEsc Gitbook)\n\nIf running as or with the permissions of a web browser, a process can search the `/maps` & `/mem` locations for common website credential patterns (that can also be used to find adjacent memory within the same structure) in which hashes or cleartext credentials may be located.",
"tactic_ids": [
"TA0006"
],
"tactic_names": [
"Credential Access"
],
"is_subtechnique": true,
"parent_id": "T1003",
"platforms": [
"Linux"
],
"detection": "",
"mitigation_ids": [
"M1027",
"M1026"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1003/007",
"created": "2020-02-11",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1003.008",
"name": "/etc/passwd and /etc/shadow",
"description": "Adversaries may attempt to dump the contents of /etc/passwd and /etc/shadow to enable offline password cracking. Most modern Linux operating systems use a combination of /etc/passwd and /etc/shadow to store user account information, including password hashes in /etc/shadow. By default, /etc/shadow is only readable by the root user.(Citation: Linux Password and Shadow File Formats)\n\nLinux stores user information such as user ID, group ID, home directory path, and login shell in /etc/passwd. A \"user\" on the system may belong to a person or a service. All password hashes are stored in /etc/shadow - including entries for users with no passwords and users with locked or disabled accounts.(Citation: Linux Password and Shadow File Formats)\n\nAdversaries may attempt to read or dump the /etc/passwd and /etc/shadow files on Linux systems via command line utilities such as the cat command.(Citation: Arctic Wolf) Additionally, the Linux utility unshadow can be used to combine the two files in a format suited for password cracking utilities such as John the Ripper - for example, via the command /usr/bin/unshadow /etc/passwd /etc/shadow > /tmp/crack.password.db(Citation: nixCraft - John the Ripper). Since the user information stored in /etc/passwd are linked to the password hashes in /etc/shadow, an adversary would need to have access to both.",
"tactic_ids": [
"TA0006"
],
"tactic_names": [
"Credential Access"
],
"is_subtechnique": true,
"parent_id": "T1003",
"platforms": [
"Linux"
],
"detection": "",
"mitigation_ids": [
"M1027",
"M1026"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1003/008",
"created": "2020-02-11",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1005",
"name": "Data from Local System",
"description": "Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.\n\nAdversaries may do this using a [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059), such as [cmd](https://attack.mitre.org/software/S0106) as well as a [Network Device CLI](https://attack.mitre.org/techniques/T1059/008), which have functionality to interact with the file system to gather information.(Citation: show_run_config_cmd_cisco) Adversaries may also use [Automated Collection](https://attack.mitre.org/techniques/T1119) on the local system.\n",
"tactic_ids": [
"TA0009"
],
"tactic_names": [
"Collection"
],
"is_subtechnique": false,
"parent_id": null,
"platforms": [
"ESXi",
"Linux",
"macOS",
"Network Devices",
"Windows"
],
"detection": "",
"mitigation_ids": [
"M1057"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1005",
"created": "2017-05-31",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1006",
"name": "Direct Volume Access",
"description": "Adversaries may directly access a volume to bypass file access controls and file system monitoring. Windows allows programs to have direct access to logical volumes. Programs with direct access may read and write files directly from the drive by analyzing file system data structures. This technique may bypass Windows file access controls as well as file system monitoring tools. (Citation: Hakobyan 2009)\n\nUtilities, such as `NinjaCopy`, exist to perform these actions in PowerShell.(Citation: Github PowerSploit Ninjacopy) Adversaries may also use built-in or third-party utilities (such as `vssadmin`, `wbadmin`, and [esentutl](https://attack.mitre.org/software/S0404)) to create shadow copies or backups of data from system volumes.(Citation: LOLBAS Esentutl)",
"tactic_ids": [
"TA0005"
],
"tactic_names": [
"Defense Evasion"
],
"is_subtechnique": false,
"parent_id": null,
"platforms": [
"Network Devices",
"Windows"
],
"detection": "",
"mitigation_ids": [
"M1040",
"M1018"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1006",
"created": "2017-05-31",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1007",
"name": "System Service Discovery",
"description": "Adversaries may try to gather information about registered local system services. Adversaries may obtain information about services using tools as well as OS utility commands such as sc query, tasklist /svc, systemctl --type=service, and net start. Adversaries may also gather information about schedule tasks via commands such as `schtasks` on Windows or `crontab -l` on Linux and macOS.(Citation: Elastic Security Labs GOSAR 2024)(Citation: SentinelLabs macOS Malware 2021)(Citation: Splunk Linux Gormir 2024)(Citation: Aquasec Kinsing 2020)\n\nAdversaries may use the information from [System Service Discovery](https://attack.mitre.org/techniques/T1007) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.",
"tactic_ids": [
"TA0007"
],
"tactic_names": [
"Discovery"
],
"is_subtechnique": false,
"parent_id": null,
"platforms": [
"Linux",
"macOS",
"Windows"
],
"detection": "",
"mitigation_ids": [],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1007",
"created": "2017-05-31",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1008",
"name": "Fallback Channels",
"description": "Adversaries may use fallback or alternate communication channels if the primary channel is compromised or inaccessible in order to maintain reliable command and control and to avoid data transfer thresholds.",
"tactic_ids": [
"TA0011"
],
"tactic_names": [
"Command and Control"
],
"is_subtechnique": false,
"parent_id": null,
"platforms": [
"Linux",
"Windows",
"macOS",
"ESXi"
],
"detection": "",
"mitigation_ids": [
"M1031"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1008",
"created": "2017-05-31",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1010",
"name": "Application Window Discovery",
"description": "Adversaries may attempt to get a listing of open application windows. Window listings could convey information about how the system is used.(Citation: Prevailion DarkWatchman 2021) For example, information about application windows could be used identify potential data to collect as well as identifying security tooling ([Security Software Discovery](https://attack.mitre.org/techniques/T1518/001)) to evade.(Citation: ESET Grandoreiro April 2020)\n\nAdversaries typically abuse system features for this type of enumeration. For example, they may gather information through native system features such as [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059) commands and [Native API](https://attack.mitre.org/techniques/T1106) functions.",
"tactic_ids": [
"TA0007"
],
"tactic_names": [
"Discovery"
],
"is_subtechnique": false,
"parent_id": null,
"platforms": [
"Linux",
"Windows",
"macOS"
],
"detection": "",
"mitigation_ids": [],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1010",
"created": "2017-05-31",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1011",
"name": "Exfiltration Over Other Network Medium",
"description": "Adversaries may attempt to exfiltrate data over a different network medium than the command and control channel. If the command and control network is a wired Internet connection, the exfiltration may occur, for example, over a WiFi connection, modem, cellular data connection, Bluetooth, or another radio frequency (RF) channel.\n\nAdversaries may choose to do this if they have sufficient access or proximity, and the connection might not be secured or defended as well as the primary Internet-connected channel because it is not routed through the same enterprise network.",
"tactic_ids": [
"TA0010"
],
"tactic_names": [
"Exfiltration"
],
"is_subtechnique": false,
"parent_id": null,
"platforms": [
"Linux",
"macOS",
"Windows"
],
"detection": "",
"mitigation_ids": [
"M1028",
"M1042"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1011",
"created": "2017-05-31",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1011.001",
"name": "Exfiltration Over Bluetooth",
"description": "Adversaries may attempt to exfiltrate data over Bluetooth rather than the command and control channel. If the command and control network is a wired Internet connection, an adversary may opt to exfiltrate data using a Bluetooth communication channel.\n\nAdversaries may choose to do this if they have sufficient access and proximity. Bluetooth connections might not be secured or defended as well as the primary Internet-connected channel because it is not routed through the same enterprise network.",
"tactic_ids": [
"TA0010"
],
"tactic_names": [
"Exfiltration"
],
"is_subtechnique": true,
"parent_id": "T1011",
"platforms": [
"Linux",
"macOS",
"Windows"
],
"detection": "",
"mitigation_ids": [
"M1028",
"M1042"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1011/001",
"created": "2020-03-09",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1012",
"name": "Query Registry",
"description": "Adversaries may interact with the Windows Registry to gather information about the system, configuration, and installed software.\n\nThe Registry contains a significant amount of information about the operating system, configuration, software, and security.(Citation: Wikipedia Windows Registry) Information can easily be queried using the [Reg](https://attack.mitre.org/software/S0075) utility, though other means to access the Registry exist. Some of the information may help adversaries to further their operation within a network. Adversaries may use the information from [Query Registry](https://attack.mitre.org/techniques/T1012) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.",
"tactic_ids": [
"TA0007"
],
"tactic_names": [
"Discovery"
],
"is_subtechnique": false,
"parent_id": null,
"platforms": [
"Windows"
],
"detection": "",
"mitigation_ids": [],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1012",
"created": "2017-05-31",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1014",
"name": "Rootkit",
"description": "Adversaries may use rootkits to hide the presence of programs, files, network connections, services, drivers, and other system components. Rootkits are programs that hide the existence of malware by intercepting/hooking and modifying operating system API calls that supply system information. (Citation: Symantec Windows Rootkits) \n\nRootkits or rootkit enabling functionality may reside at the user or kernel level in the operating system or lower, to include a hypervisor or [System Firmware](https://attack.mitre.org/techniques/T1542/001). (Citation: Wikipedia Rootkit) Rootkits have been seen for Windows, Linux, and Mac OS X systems. (Citation: CrowdStrike Linux Rootkit) (Citation: BlackHat Mac OSX Rootkit)\n\nRootkits that reside or modify boot sectors are known as [Bootkit](https://attack.mitre.org/techniques/T1542/003)s and specifically target the boot process of the operating system.",
"tactic_ids": [
"TA0005"
],
"tactic_names": [
"Defense Evasion"
],
"is_subtechnique": false,
"parent_id": null,
"platforms": [
"Linux",
"macOS",
"Windows"
],
"detection": "",
"mitigation_ids": [],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1014",
"created": "2017-05-31",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1016",
"name": "System Network Configuration Discovery",
"description": "Adversaries may look for details about the network configuration and settings, such as IP and/or MAC addresses, of systems they access or through information discovery of remote systems. Several operating system administration utilities exist that can be used to gather this information. Examples include [Arp](https://attack.mitre.org/software/S0099), [ipconfig](https://attack.mitre.org/software/S0100)/[ifconfig](https://attack.mitre.org/software/S0101), [nbtstat](https://attack.mitre.org/software/S0102), and [route](https://attack.mitre.org/software/S0103).\n\nAdversaries may also leverage a [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) on network devices to gather information about configurations and settings, such as IP addresses of configured interfaces and static/dynamic routes (e.g. show ip route, show ip interface).(Citation: US-CERT-TA18-106A)(Citation: Mandiant APT41 Global Intrusion ) On ESXi, adversaries may leverage esxcli to gather network configuration information. For example, the command `esxcli network nic list` will retrieve the MAC address, while `esxcli network ip interface ipv4 get` will retrieve the local IPv4 address.(Citation: Trellix Rnasomhouse 2024)\n\nAdversaries may use the information from [System Network Configuration Discovery](https://attack.mitre.org/techniques/T1016) during automated discovery to shape follow-on behaviors, including determining certain access within the target network and what actions to do next. ",
"tactic_ids": [
"TA0007"
],
"tactic_names": [
"Discovery"
],
"is_subtechnique": false,
"parent_id": null,
"platforms": [
"ESXi",
"Linux",
"macOS",
"Network Devices",
"Windows"
],
"detection": "",
"mitigation_ids": [],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1016",
"created": "2017-05-31",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1016.001",
"name": "Internet Connection Discovery",
"description": "Adversaries may check for Internet connectivity on compromised systems. This may be performed during automated discovery and can be accomplished in numerous ways such as using [Ping](https://attack.mitre.org/software/S0097), tracert, and GET requests to websites, or performing initial speed testing to confirm bandwidth.\n\nAdversaries may use the results and responses from these requests to determine if the system is capable of communicating with their C2 servers before attempting to connect to them. The results may also be used to identify routes, redirectors, and proxy servers.",
"tactic_ids": [
"TA0007"
],
"tactic_names": [
"Discovery"
],
"is_subtechnique": true,
"parent_id": "T1016",
"platforms": [
"Windows",
"Linux",
"macOS",
"ESXi"
],
"detection": "",
"mitigation_ids": [],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1016/001",
"created": "2021-03-17",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1016.002",
"name": "Wi-Fi Discovery",
"description": "Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems. Adversaries may use Wi-Fi information as part of [Account Discovery](https://attack.mitre.org/techniques/T1087), [Remote System Discovery](https://attack.mitre.org/techniques/T1018), and other discovery or [Credential Access](https://attack.mitre.org/tactics/TA0006) activity to support both ongoing and future campaigns.\n\nAdversaries may collect various types of information about Wi-Fi networks from hosts. For example, on Windows names and passwords of all Wi-Fi networks a device has previously connected to may be available through `netsh wlan show profiles` to enumerate Wi-Fi names and then `netsh wlan show profile “Wi-Fi name” key=clear` to show a Wi-Fi network’s corresponding password.(Citation: BleepingComputer Agent Tesla steal wifi passwords)(Citation: Malware Bytes New AgentTesla variant steals WiFi credentials)(Citation: Check Point APT35 CharmPower January 2022) Additionally, names and other details of locally reachable Wi-Fi networks can be discovered using calls to `wlanAPI.dll` [Native API](https://attack.mitre.org/techniques/T1106) functions.(Citation: Binary Defense Emotes Wi-Fi Spreader)\n\nOn Linux, names and passwords of all Wi-Fi-networks a device has previously connected to may be available in files under ` /etc/NetworkManager/system-connections/`.(Citation: Wi-Fi Password of All Connected Networks in Windows/Linux) On macOS, the password of a known Wi-Fi may be identified with ` security find-generic-password -wa wifiname` (requires admin username/password).(Citation: Find Wi-Fi Password on Mac)\n",
"tactic_ids": [
"TA0007"
],
"tactic_names": [
"Discovery"
],
"is_subtechnique": true,
"parent_id": "T1016",
"platforms": [
"Linux",
"Windows",
"macOS"
],
"detection": "",
"mitigation_ids": [],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1016/002",
"created": "2023-09-08",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1018",
"name": "Remote System Discovery",
"description": "Adversaries may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for Lateral Movement from the current system. Functionality could exist within remote access tools to enable this, but utilities available on the operating system could also be used such as [Ping](https://attack.mitre.org/software/S0097), net view using [Net](https://attack.mitre.org/software/S0039), or, on ESXi servers, `esxcli network diag ping`.\n\nAdversaries may also analyze data from local host files (ex: C:\\Windows\\System32\\Drivers\\etc\\hosts or /etc/hosts) or other passive means (such as local [Arp](https://attack.mitre.org/software/S0099) cache entries) in order to discover the presence of remote systems in an environment.\n\nAdversaries may also target discovery of network infrastructure as well as leverage [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) commands on network devices to gather detailed information about systems within a network (e.g. show cdp neighbors, show arp).(Citation: US-CERT-TA18-106A)(Citation: CISA AR21-126A FIVEHANDS May 2021) \n",
"tactic_ids": [
"TA0007"
],
"tactic_names": [
"Discovery"
],
"is_subtechnique": false,
"parent_id": null,
"platforms": [
"ESXi",
"Linux",
"macOS",
"Network Devices",
"Windows"
],
"detection": "",
"mitigation_ids": [],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1018",
"created": "2017-05-31",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1020",
"name": "Automated Exfiltration",
"description": "Adversaries may exfiltrate data, such as sensitive documents, through the use of automated processing after being gathered during Collection.(Citation: ESET Gamaredon June 2020) \n\nWhen automated exfiltration is used, other exfiltration techniques likely apply as well to transfer the information out of the network, such as [Exfiltration Over C2 Channel](https://attack.mitre.org/techniques/T1041) and [Exfiltration Over Alternative Protocol](https://attack.mitre.org/techniques/T1048).",
"tactic_ids": [
"TA0010"
],
"tactic_names": [
"Exfiltration"
],
"is_subtechnique": false,
"parent_id": null,
"platforms": [
"Linux",
"macOS",
"Network Devices",
"Windows"
],
"detection": "",
"mitigation_ids": [],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1020",
"created": "2017-05-31",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1020.001",
"name": "Traffic Duplication",
"description": "Adversaries may leverage traffic mirroring in order to automate data exfiltration over compromised infrastructure. Traffic mirroring is a native feature for some devices, often used for network analysis. For example, devices may be configured to forward network traffic to one or more destinations for analysis by a network analyzer or other monitoring device. (Citation: Cisco Traffic Mirroring)(Citation: Juniper Traffic Mirroring)\n\nAdversaries may abuse traffic mirroring to mirror or redirect network traffic through other infrastructure they control. Malicious modifications to network devices to enable traffic redirection may be possible through [ROMMONkit](https://attack.mitre.org/techniques/T1542/004) or [Patch System Image](https://attack.mitre.org/techniques/T1601/001).(Citation: US-CERT-TA18-106A)(Citation: Cisco Blog Legacy Device Attacks)\n\nMany cloud-based environments also support traffic mirroring. For example, AWS Traffic Mirroring, GCP Packet Mirroring, and Azure vTap allow users to define specified instances to collect traffic from and specified targets to send collected traffic to.(Citation: AWS Traffic Mirroring)(Citation: GCP Packet Mirroring)(Citation: Azure Virtual Network TAP)\n\nAdversaries may use traffic duplication in conjunction with [Network Sniffing](https://attack.mitre.org/techniques/T1040), [Input Capture](https://attack.mitre.org/techniques/T1056), or [Adversary-in-the-Middle](https://attack.mitre.org/techniques/T1557) depending on the goals and objectives of the adversary.",
"tactic_ids": [
"TA0010"
],
"tactic_names": [
"Exfiltration"
],
"is_subtechnique": true,
"parent_id": "T1020",
"platforms": [
"Network Devices",
"IaaS"
],
"detection": "",
"mitigation_ids": [
"M1057",
"M1018",
"M1041"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1020/001",
"created": "2020-10-19",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1021",
"name": "Remote Services",
"description": "Adversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to log into a service that accepts remote connections, such as telnet, SSH, and VNC. The adversary may then perform actions as the logged-on user.\n\nIn an enterprise environment, servers and workstations can be organized into domains. Domains provide centralized identity management, allowing users to login using one set of credentials across the entire network. If an adversary is able to obtain a set of valid domain credentials, they could login to many different machines using remote access protocols such as secure shell (SSH) or remote desktop protocol (RDP).(Citation: SSH Secure Shell)(Citation: TechNet Remote Desktop Services) They could also login to accessible SaaS or IaaS services, such as those that federate their identities to the domain, or management platforms for internal virtualization environments such as VMware vCenter. \n\nLegitimate applications (such as [Software Deployment Tools](https://attack.mitre.org/techniques/T1072) and other administrative programs) may utilize [Remote Services](https://attack.mitre.org/techniques/T1021) to access remote hosts. For example, Apple Remote Desktop (ARD) on macOS is native software used for remote management. ARD leverages a blend of protocols, including [VNC](https://attack.mitre.org/techniques/T1021/005) to send the screen and control buffers and [SSH](https://attack.mitre.org/techniques/T1021/004) for secure file transfer.(Citation: Remote Management MDM macOS)(Citation: Kickstart Apple Remote Desktop commands)(Citation: Apple Remote Desktop Admin Guide 3.3) Adversaries can abuse applications such as ARD to gain remote code execution and perform lateral movement. In versions of macOS prior to 10.14, an adversary can escalate an SSH session to an ARD session which enables an adversary to accept TCC (Transparency, Consent, and Control) prompts without user interaction and gain access to data.(Citation: FireEye 2019 Apple Remote Desktop)(Citation: Lockboxx ARD 2019)(Citation: Kickstart Apple Remote Desktop commands)",
"tactic_ids": [
"TA0008"
],
"tactic_names": [
"Lateral Movement"
],
"is_subtechnique": false,
"parent_id": null,
"platforms": [
"Linux",
"macOS",
"Windows",
"IaaS",
"ESXi"
],
"detection": "",
"mitigation_ids": [
"M1035",
"M1027",
"M1018",
"M1032",
"M1047",
"M1042"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1021",
"created": "2017-05-31",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1021.001",
"name": "Remote Desktop Protocol",
"description": "Adversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to log into a computer using the Remote Desktop Protocol (RDP). The adversary may then perform actions as the logged-on user.\n\nRemote desktop is a common feature in operating systems. It allows a user to log into an interactive session with a system desktop graphical user interface on a remote system. Microsoft refers to its implementation of the Remote Desktop Protocol (RDP) as Remote Desktop Services (RDS).(Citation: TechNet Remote Desktop Services) \n\nAdversaries may connect to a remote system over RDP/RDS to expand access if the service is enabled and allows access to accounts with known credentials. Adversaries will likely use Credential Access techniques to acquire credentials to use with RDP. Adversaries may also use RDP in conjunction with the [Accessibility Features](https://attack.mitre.org/techniques/T1546/008) or [Terminal Services DLL](https://attack.mitre.org/techniques/T1505/005) for Persistence.(Citation: Alperovitch Malware)",
"tactic_ids": [
"TA0008"
],
"tactic_names": [
"Lateral Movement"
],
"is_subtechnique": true,
"parent_id": "T1021",
"platforms": [
"Windows"
],
"detection": "",
"mitigation_ids": [
"M1035",
"M1028",
"M1030",
"M1018",
"M1026",
"M1032",
"M1047",
"M1042"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1021/001",
"created": "2020-02-11",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1021.002",
"name": "SMB/Windows Admin Shares",
"description": "Adversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to interact with a remote network share using Server Message Block (SMB). The adversary may then perform actions as the logged-on user.\n\nSMB is a file, printer, and serial port sharing protocol for Windows machines on the same network or domain. Adversaries may use SMB to interact with file shares, allowing them to move laterally throughout a network. Linux and macOS implementations of SMB typically use Samba.\n\nWindows systems have hidden network shares that are accessible only to administrators and provide the ability for remote file copy and other administrative functions. Example network shares include `C$`, `ADMIN$`, and `IPC$`. Adversaries may use this technique in conjunction with administrator-level [Valid Accounts](https://attack.mitre.org/techniques/T1078) to remotely access a networked system over SMB,(Citation: Wikipedia Server Message Block) to interact with systems using remote procedure calls (RPCs),(Citation: TechNet RPC) transfer files, and run transferred binaries through remote Execution. Example execution techniques that rely on authenticated sessions over SMB/RPC are [Scheduled Task/Job](https://attack.mitre.org/techniques/T1053), [Service Execution](https://attack.mitre.org/techniques/T1569/002), and [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047). Adversaries can also use NTLM hashes to access administrator shares on systems with [Pass the Hash](https://attack.mitre.org/techniques/T1550/002) and certain configuration and patch levels.(Citation: Microsoft Admin Shares)",
"tactic_ids": [
"TA0008"
],
"tactic_names": [
"Lateral Movement"
],
"is_subtechnique": true,
"parent_id": "T1021",
"platforms": [
"Windows"
],
"detection": "",
"mitigation_ids": [
"M1035",
"M1037",
"M1027",
"M1026"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1021/002",
"created": "2020-02-11",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1021.003",
"name": "Distributed Component Object Model",
"description": "Adversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to interact with remote machines by taking advantage of Distributed Component Object Model (DCOM). The adversary may then perform actions as the logged-on user.\n\nThe Windows Component Object Model (COM) is a component of the native Windows application programming interface (API) that enables interaction between software objects, or executable code that implements one or more interfaces. Through COM, a client object can call methods of server objects, which are typically Dynamic Link Libraries (DLL) or executables (EXE). Distributed COM (DCOM) is transparent middleware that extends the functionality of COM beyond a local computer using remote procedure call (RPC) technology.(Citation: Fireeye Hunting COM June 2019)(Citation: Microsoft COM)\n\nPermissions to interact with local and remote server COM objects are specified by access control lists (ACL) in the Registry.(Citation: Microsoft Process Wide Com Keys) By default, only Administrators may remotely activate and launch COM objects through DCOM.(Citation: Microsoft COM ACL)\n\nThrough DCOM, adversaries operating in the context of an appropriately privileged user can remotely obtain arbitrary and even direct shellcode execution through Office applications(Citation: Enigma Outlook DCOM Lateral Movement Nov 2017) as well as other Windows objects that contain insecure methods.(Citation: Enigma MMC20 COM Jan 2017)(Citation: Enigma DCOM Lateral Movement Jan 2017) DCOM can also execute macros in existing documents(Citation: Enigma Excel DCOM Sept 2017) and may also invoke [Dynamic Data Exchange](https://attack.mitre.org/techniques/T1559/002) (DDE) execution directly through a COM created instance of a Microsoft Office application(Citation: Cyberreason DCOM DDE Lateral Movement Nov 2017), bypassing the need for a malicious document. DCOM can be used as a method of remotely interacting with [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047). (Citation: MSDN WMI)",
"tactic_ids": [
"TA0008"
],
"tactic_names": [
"Lateral Movement"
],
"is_subtechnique": true,
"parent_id": "T1021",
"platforms": [
"Windows"
],
"detection": "",
"mitigation_ids": [
"M1030",
"M1026",
"M1048",
"M1042"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1021/003",
"created": "2020-02-11",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1021.004",
"name": "SSH",
"description": "Adversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to log into remote machines using Secure Shell (SSH). The adversary may then perform actions as the logged-on user.\n\nSSH is a protocol that allows authorized users to open remote shells on other computers. Many Linux and macOS versions come with SSH installed by default, although typically disabled until the user enables it. On ESXi, SSH can be enabled either directly on the host (e.g., via `vim-cmd hostsvc/enable_ssh`) or via vCenter.(Citation: Sygnia ESXi Ransomware 2025)(Citation: TrendMicro ESXI Ransomware)(Citation: Sygnia Abyss Locker 2025) The SSH server can be configured to use standard password authentication or public-private keypairs in lieu of or in addition to a password. In this authentication scenario, the user’s public key must be in a special file on the computer running the server that lists which keypairs are allowed to login as that user (i.e., [SSH Authorized Keys](https://attack.mitre.org/techniques/T1098/004)).",
"tactic_ids": [
"TA0008"
],
"tactic_names": [
"Lateral Movement"
],
"is_subtechnique": true,
"parent_id": "T1021",
"platforms": [
"ESXi",
"Linux",
"macOS"
],
"detection": "",
"mitigation_ids": [
"M1018",
"M1032",
"M1042"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1021/004",
"created": "2020-02-11",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1021.005",
"name": "VNC",
"description": "Adversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to remotely control machines using Virtual Network Computing (VNC). VNC is a platform-independent desktop sharing system that uses the RFB (“remote framebuffer”) protocol to enable users to remotely control another computer’s display by relaying the screen, mouse, and keyboard inputs over the network.(Citation: The Remote Framebuffer Protocol)\n\nVNC differs from [Remote Desktop Protocol](https://attack.mitre.org/techniques/T1021/001) as VNC is screen-sharing software rather than resource-sharing software. By default, VNC uses the system's authentication, but it can be configured to use credentials specific to VNC.(Citation: MacOS VNC software for Remote Desktop)(Citation: VNC Authentication)\n\nAdversaries may abuse VNC to perform malicious actions as the logged-on user such as opening documents, downloading files, and running arbitrary commands. An adversary could use VNC to remotely control and monitor a system to collect data and information to pivot to other systems within the network. Specific VNC libraries/implementations have also been susceptible to brute force attacks and memory usage exploitation.(Citation: Hijacking VNC)(Citation: macOS root VNC login without authentication)(Citation: VNC Vulnerabilities)(Citation: Offensive Security VNC Authentication Check)(Citation: Attacking VNC Servers PentestLab)(Citation: Havana authentication bug)",
"tactic_ids": [
"TA0008"
],
"tactic_names": [
"Lateral Movement"
],
"is_subtechnique": true,
"parent_id": "T1021",
"platforms": [
"Linux",
"Windows",
"macOS"
],
"detection": "",
"mitigation_ids": [
"M1037",
"M1033",
"M1047",
"M1042"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1021/005",
"created": "2020-02-11",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1021.006",
"name": "Windows Remote Management",
"description": "Adversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to interact with remote systems using Windows Remote Management (WinRM). The adversary may then perform actions as the logged-on user.\n\nWinRM is the name of both a Windows service and a protocol that allows a user to interact with a remote system (e.g., run an executable, modify the Registry, modify services).(Citation: Microsoft WinRM) It may be called with the `winrm` command or by any number of programs such as PowerShell.(Citation: Jacobsen 2014) WinRM can be used as a method of remotely interacting with [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047).(Citation: MSDN WMI)",
"tactic_ids": [
"TA0008"
],
"tactic_names": [
"Lateral Movement"
],
"is_subtechnique": true,
"parent_id": "T1021",
"platforms": [
"Windows"
],
"detection": "",
"mitigation_ids": [
"M1030",
"M1026",
"M1042"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1021/006",
"created": "2020-02-11",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1021.007",
"name": "Cloud Services",
"description": "Adversaries may log into accessible cloud services within a compromised environment using [Valid Accounts](https://attack.mitre.org/techniques/T1078) that are synchronized with or federated to on-premises user identities. The adversary may then perform management actions or access cloud-hosted resources as the logged-on user. \n\nMany enterprises federate centrally managed user identities to cloud services, allowing users to login with their domain credentials in order to access the cloud control plane. Similarly, adversaries may connect to available cloud services through the web console or through the cloud command line interface (CLI) (e.g., [Cloud API](https://attack.mitre.org/techniques/T1059/009)), using commands such as Connect-AZAccount for Azure PowerShell, Connect-MgGraph for Microsoft Graph PowerShell, and gcloud auth login for the Google Cloud CLI.\n\nIn some cases, adversaries may be able to authenticate to these services via [Application Access Token](https://attack.mitre.org/techniques/T1550/001) instead of a username and password. ",
"tactic_ids": [
"TA0008"
],
"tactic_names": [
"Lateral Movement"
],
"is_subtechnique": true,
"parent_id": "T1021",
"platforms": [
"IaaS",
"Identity Provider",
"Office Suite",
"SaaS"
],
"detection": "",
"mitigation_ids": [
"M1026",
"M1032"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1021/007",
"created": "2023-02-21",
"modified": "2025-04-15",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1021.008",
"name": "Direct Cloud VM Connections",
"description": "Adversaries may leverage [Valid Accounts](https://attack.mitre.org/techniques/T1078) to log directly into accessible cloud hosted compute infrastructure through cloud native methods. Many cloud providers offer interactive connections to virtual infrastructure that can be accessed through the [Cloud API](https://attack.mitre.org/techniques/T1059/009), such as Azure Serial Console(Citation: Azure Serial Console), AWS EC2 Instance Connect(Citation: EC2 Instance Connect)(Citation: lucr-3: Getting SaaS-y in the cloud), and AWS System Manager.(Citation: AWS System Manager).\n\nMethods of authentication for these connections can include passwords, application access tokens, or SSH keys. These cloud native methods may, by default, allow for privileged access on the host with SYSTEM or root level access. \n\nAdversaries may utilize these cloud native methods to directly access virtual infrastructure and pivot through an environment.(Citation: SIM Swapping and Abuse of the Microsoft Azure Serial Console) These connections typically provide direct console access to the VM rather than the execution of scripts (i.e., [Cloud Administration Command](https://attack.mitre.org/techniques/T1651)).",
"tactic_ids": [
"TA0008"
],
"tactic_names": [
"Lateral Movement"
],
"is_subtechnique": true,
"parent_id": "T1021",
"platforms": [
"IaaS"
],
"detection": "",
"mitigation_ids": [
"M1018",
"M1042"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1021/008",
"created": "2023-06-02",
"modified": "2025-04-15",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1025",
"name": "Data from Removable Media",
"description": "Adversaries may search connected removable media on computers they have compromised to find files of interest. Sensitive data can be collected from any removable media (optical disk drive, USB memory, etc.) connected to the compromised system prior to Exfiltration. Interactive command shells may be in use, and common functionality within [cmd](https://attack.mitre.org/software/S0106) may be used to gather information. \n\nSome adversaries may also use [Automated Collection](https://attack.mitre.org/techniques/T1119) on removable media.",
"tactic_ids": [
"TA0009"
],
"tactic_names": [
"Collection"
],
"is_subtechnique": false,
"parent_id": null,
"platforms": [
"Linux",
"macOS",
"Windows"
],
"detection": "",
"mitigation_ids": [
"M1057"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1025",
"created": "2017-05-31",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1027",
"name": "Obfuscated Files or Information",
"description": "Adversaries may attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the system or in transit. This is common behavior that can be used across different platforms and the network to evade defenses. \n\nPayloads may be compressed, archived, or encrypted in order to avoid detection. These payloads may be used during Initial Access or later to mitigate detection. Sometimes a user's action may be required to open and [Deobfuscate/Decode Files or Information](https://attack.mitre.org/techniques/T1140) for [User Execution](https://attack.mitre.org/techniques/T1204). The user may also be required to input a password to open a password protected compressed/encrypted file that was provided by the adversary. (Citation: Volexity PowerDuke November 2016) Adversaries may also use compressed or archived scripts, such as JavaScript. \n\nPortions of files can also be encoded to hide the plain-text strings that would otherwise help defenders with discovery. (Citation: Linux/Cdorked.A We Live Security Analysis) Payloads may also be split into separate, seemingly benign files that only reveal malicious functionality when reassembled. (Citation: Carbon Black Obfuscation Sept 2016)\n\nAdversaries may also abuse [Command Obfuscation](https://attack.mitre.org/techniques/T1027/010) to obscure commands executed from payloads or directly via [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059). Environment variables, aliases, characters, and other platform/language specific semantics can be used to evade signature based detections and application control mechanisms. (Citation: FireEye Obfuscation June 2017) (Citation: FireEye Revoke-Obfuscation July 2017)(Citation: PaloAlto EncodedCommand March 2017) ",
"tactic_ids": [
"TA0005"
],
"tactic_names": [
"Defense Evasion"
],
"is_subtechnique": false,
"parent_id": null,
"platforms": [
"ESXi",
"Linux",
"macOS",
"Network Devices",
"Windows"
],
"detection": "",
"mitigation_ids": [
"M1017",
"M1040",
"M1049",
"M1047"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1027",
"created": "2017-05-31",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1027.001",
"name": "Binary Padding",
"description": "Adversaries may use binary padding to add junk data and change the on-disk representation of malware. This can be done without affecting the functionality or behavior of a binary, but can increase the size of the binary beyond what some security tools are capable of handling due to file size limitations. \n\nBinary padding effectively changes the checksum of the file and can also be used to avoid hash-based blocklists and static anti-virus signatures.(Citation: ESET OceanLotus) The padding used is commonly generated by a function to create junk data and then appended to the end or applied to sections of malware.(Citation: Securelist Malware Tricks April 2017) Increasing the file size may decrease the effectiveness of certain tools and detection capabilities that are not designed or configured to scan large files. This may also reduce the likelihood of being collected for analysis. Public file scanning services, such as VirusTotal, limits the maximum size of an uploaded file to be analyzed.(Citation: VirusTotal FAQ) ",
"tactic_ids": [
"TA0005"
],
"tactic_names": [
"Defense Evasion"
],
"is_subtechnique": true,
"parent_id": "T1027",
"platforms": [
"Linux",
"Windows",
"macOS"
],
"detection": "",
"mitigation_ids": [],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1027/001",
"created": "2020-02-05",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1027.002",
"name": "Software Packing",
"description": "Adversaries may perform software packing or virtual machine software protection to conceal their code. Software packing is a method of compressing or encrypting an executable. Packing an executable changes the file signature in an attempt to avoid signature-based detection. Most decompression techniques decompress the executable code in memory. Virtual machine software protection translates an executable's original code into a special format that only a special virtual machine can run. A virtual machine is then called to run this code.(Citation: ESET FinFisher Jan 2018) \n\nUtilities used to perform software packing are called packers. Example packers are MPRESS and UPX. A more comprehensive list of known packers is available, but adversaries may create their own packing techniques that do not leave the same artifacts as well-known packers to evade defenses.(Citation: Awesome Executable Packing) ",
"tactic_ids": [
"TA0005"
],
"tactic_names": [
"Defense Evasion"
],
"is_subtechnique": true,
"parent_id": "T1027",
"platforms": [
"Linux",
"macOS",
"Windows"
],
"detection": "",
"mitigation_ids": [
"M1049"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1027/002",
"created": "2020-02-05",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1027.003",
"name": "Steganography",
"description": "Adversaries may use steganography techniques in order to prevent the detection of hidden information. Steganographic techniques can be used to hide data in digital media such as images, audio tracks, video clips, or text files.\n\n[Duqu](https://attack.mitre.org/software/S0038) was an early example of malware that used steganography. It encrypted the gathered information from a victim's system and hid it within an image before exfiltrating the image to a C2 server.(Citation: Wikipedia Duqu) \n\nBy the end of 2017, a threat group used Invoke-PSImage to hide [PowerShell](https://attack.mitre.org/techniques/T1059/001) commands in an image file (.png) and execute the code on a victim's system. In this particular case the [PowerShell](https://attack.mitre.org/techniques/T1059/001) code downloaded another obfuscated script to gather intelligence from the victim's machine and communicate it back to the adversary.(Citation: McAfee Malicious Doc Targets Pyeongchang Olympics) ",
"tactic_ids": [
"TA0005"
],
"tactic_names": [
"Defense Evasion"
],
"is_subtechnique": true,
"parent_id": "T1027",
"platforms": [
"Linux",
"macOS",
"Windows"
],
"detection": "",
"mitigation_ids": [],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1027/003",
"created": "2020-02-05",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1027.004",
"name": "Compile After Delivery",
"description": "Adversaries may attempt to make payloads difficult to discover and analyze by delivering files to victims as uncompiled code. Text-based source code files may subvert analysis and scrutiny from protections targeting executables/binaries. These payloads will need to be compiled before execution; typically via native utilities such as ilasm.exe(Citation: ATTACK IQ), csc.exe, or GCC/MinGW.(Citation: ClearSky MuddyWater Nov 2018)\n\nSource code payloads may also be encrypted, encoded, and/or embedded within other files, such as those delivered as a [Phishing](https://attack.mitre.org/techniques/T1566). Payloads may also be delivered in formats unrecognizable and inherently benign to the native OS (ex: EXEs on macOS/Linux) before later being (re)compiled into a proper executable binary with a bundled compiler and execution framework.(Citation: TrendMicro WindowsAppMac)",
"tactic_ids": [
"TA0005"
],
"tactic_names": [
"Defense Evasion"
],
"is_subtechnique": true,
"parent_id": "T1027",
"platforms": [
"Linux",
"macOS",
"Windows"
],
"detection": "",
"mitigation_ids": [],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1027/004",
"created": "2020-03-16",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1027.005",
"name": "Indicator Removal from Tools",
"description": "Adversaries may remove indicators from tools if they believe their malicious tool was detected, quarantined, or otherwise curtailed. They can modify the tool by removing the indicator and using the updated version that is no longer detected by the target's defensive systems or subsequent targets that may use similar systems.\n\nA good example of this is when malware is detected with a file signature and quarantined by anti-virus software. An adversary who can determine that the malware was quarantined because of its file signature may modify the file to explicitly avoid that signature, and then re-use the malware.",
"tactic_ids": [
"TA0005"
],
"tactic_names": [
"Defense Evasion"
],
"is_subtechnique": true,
"parent_id": "T1027",
"platforms": [
"Linux",
"macOS",
"Windows"
],
"detection": "",
"mitigation_ids": [],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1027/005",
"created": "2020-03-19",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1027.006",
"name": "HTML Smuggling",
"description": "Adversaries may smuggle data and files past content filters by hiding malicious payloads inside of seemingly benign HTML files. HTML documents can store large binary objects known as JavaScript Blobs (immutable data that represents raw bytes) that can later be constructed into file-like objects. Data may also be stored in Data URLs, which enable embedding media type or MIME files inline of HTML documents. HTML5 also introduced a download attribute that may be used to initiate file downloads.(Citation: HTML Smuggling Menlo Security 2020)(Citation: Outlflank HTML Smuggling 2018)\n\nAdversaries may deliver payloads to victims that bypass security controls through HTML Smuggling by abusing JavaScript Blobs and/or HTML5 download attributes. Security controls such as web content filters may not identify smuggled malicious files inside of HTML/JS files, as the content may be based on typically benign MIME types such as text/plain and/or text/html. Malicious files or data can be obfuscated and hidden inside of HTML files through Data URLs and/or JavaScript Blobs and can be deobfuscated when they reach the victim (i.e. [Deobfuscate/Decode Files or Information](https://attack.mitre.org/techniques/T1140)), potentially bypassing content filters.\n\nFor example, JavaScript Blobs can be abused to dynamically generate malicious files in the victim machine and may be dropped to disk by abusing JavaScript functions such as msSaveBlob.(Citation: HTML Smuggling Menlo Security 2020)(Citation: MSTIC NOBELIUM May 2021)(Citation: Outlflank HTML Smuggling 2018)(Citation: nccgroup Smuggling HTA 2017)",
"tactic_ids": [
"TA0005"
],
"tactic_names": [
"Defense Evasion"
],
"is_subtechnique": true,
"parent_id": "T1027",
"platforms": [
"Windows",
"Linux",
"macOS"
],
"detection": "",
"mitigation_ids": [
"M1048"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1027/006",
"created": "2021-05-20",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1027.007",
"name": "Dynamic API Resolution",
"description": "Adversaries may obfuscate then dynamically resolve API functions called by their malware in order to conceal malicious functionalities and impair defensive analysis. Malware commonly uses various [Native API](https://attack.mitre.org/techniques/T1106) functions provided by the OS to perform various tasks such as those involving processes, files, and other system artifacts.\n\nAPI functions called by malware may leave static artifacts such as strings in payload files. Defensive analysts may also uncover which functions a binary file may execute via an import address table (IAT) or other structures that help dynamically link calling code to the shared modules that provide functions.(Citation: Huntress API Hash)(Citation: IRED API Hashing)\n\nTo avoid static or other defensive analysis, adversaries may use dynamic API resolution to conceal malware characteristics and functionalities. Similar to [Software Packing](https://attack.mitre.org/techniques/T1027/002), dynamic API resolution may change file signatures and obfuscate malicious API function calls until they are resolved and invoked during runtime.\n\nVarious methods may be used to obfuscate malware calls to API functions. For example, hashes of function names are commonly stored in malware in lieu of literal strings. Malware can use these hashes (or other identifiers) to manually reproduce the linking and loading process using functions such as `GetProcAddress()` and `LoadLibrary()`. These hashes/identifiers can also be further obfuscated using encryption or other string manipulation tricks (requiring various forms of [Deobfuscate/Decode Files or Information](https://attack.mitre.org/techniques/T1140) during execution).(Citation: BlackHat API Packers)(Citation: Drakonia HInvoke)(Citation: Huntress API Hash)",
"tactic_ids": [
"TA0005"
],
"tactic_names": [
"Defense Evasion"
],
"is_subtechnique": true,
"parent_id": "T1027",
"platforms": [
"Windows"
],
"detection": "",
"mitigation_ids": [],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1027/007",
"created": "2022-08-22",
"modified": "2025-04-15",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1027.008",
"name": "Stripped Payloads",
"description": "Adversaries may attempt to make a payload difficult to analyze by removing symbols, strings, and other human readable information. Scripts and executables may contain variables names and other strings that help developers document code functionality. Symbols are often created by an operating system’s `linker` when executable payloads are compiled. Reverse engineers use these symbols and strings to analyze code and to identify functionality in payloads.(Citation: Mandiant golang stripped binaries explanation)(Citation: intezer stripped binaries elf files 2018)\n\nAdversaries may use stripped payloads in order to make malware analysis more difficult. For example, compilers and other tools may provide features to remove or obfuscate strings and symbols. Adversaries have also used stripped payload formats, such as run-only AppleScripts, a compiled and stripped version of [AppleScript](https://attack.mitre.org/techniques/T1059/002), to evade detection and analysis. The lack of human-readable information may directly hinder detection and analysis of payloads.(Citation: SentinelLabs reversing run-only applescripts 2021)",
"tactic_ids": [
"TA0005"
],
"tactic_names": [
"Defense Evasion"
],
"is_subtechnique": true,
"parent_id": "T1027",
"platforms": [
"macOS",
"Linux",
"Windows",
"Network Devices"
],
"detection": "",
"mitigation_ids": [],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1027/008",
"created": "2022-09-29",
"modified": "2025-04-15",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1027.009",
"name": "Embedded Payloads",
"description": "Adversaries may embed payloads within other files to conceal malicious content from defenses. Otherwise seemingly benign files (such as scripts and executables) may be abused to carry and obfuscate malicious payloads and content. In some cases, embedded payloads may also enable adversaries to [Subvert Trust Controls](https://attack.mitre.org/techniques/T1553) by not impacting execution controls such as digital signatures and notarization tickets.(Citation: Sentinel Labs) \n\nAdversaries may embed payloads in various file formats to hide payloads.(Citation: Microsoft Learn) This is similar to [Steganography](https://attack.mitre.org/techniques/T1027/003), though does not involve weaving malicious content into specific bytes and patterns related to legitimate digital media formats.(Citation: GitHub PSImage) \n\nFor example, adversaries have been observed embedding payloads within or as an overlay of an otherwise benign binary.(Citation: Securelist Dtrack2) Adversaries have also been observed nesting payloads (such as executables and run-only scripts) inside a file of the same format.(Citation: SentinelLabs reversing run-only applescripts 2021) \n\nEmbedded content may also be used as [Process Injection](https://attack.mitre.org/techniques/T1055) payloads used to infect benign system processes.(Citation: Trend Micro) These embedded then injected payloads may be used as part of the modules of malware designed to provide specific features such as encrypting C2 communications in support of an orchestrator module. For example, an embedded module may be injected into default browsers, allowing adversaries to then communicate via the network.(Citation: Malware Analysis Report ComRAT)",
"tactic_ids": [
"TA0005"
],
"tactic_names": [
"Defense Evasion"
],
"is_subtechnique": true,
"parent_id": "T1027",
"platforms": [
"Linux",
"macOS",
"Windows"
],
"detection": "",
"mitigation_ids": [
"M1040",
"M1049"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1027/009",
"created": "2022-09-30",
"modified": "2025-04-15",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1027.010",
"name": "Command Obfuscation",
"description": "Adversaries may obfuscate content during command execution to impede detection. Command-line obfuscation is a method of making strings and patterns within commands and scripts more difficult to signature and analyze. This type of obfuscation can be included within commands executed by delivered payloads (e.g., [Phishing](https://attack.mitre.org/techniques/T1566) and [Drive-by Compromise](https://attack.mitre.org/techniques/T1189)) or interactively via [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059).(Citation: Akamai JS)(Citation: Malware Monday VBE)\n\nFor example, adversaries may abuse syntax that utilizes various symbols and escape characters (such as spacing, `^`, `+`. `$`, and `%`) to make commands difficult to analyze while maintaining the same intended functionality.(Citation: RC PowerShell) Many languages support built-in obfuscation in the form of base64 or URL encoding.(Citation: Microsoft PowerShellB64) Adversaries may also manually implement command obfuscation via string splitting (`“Wor”+“d.Application”`), order and casing of characters (`rev <<<'dwssap/cte/ tac'`), globing (`mkdir -p '/tmp/:&$NiA'`), as well as various tricks involving passing strings through tokens/environment variables/input streams.(Citation: Bashfuscator Command Obfuscators)(Citation: FireEye Obfuscation June 2017)\n\nAdversaries may also use tricks such as directory traversals to obfuscate references to the binary being invoked by a command (`C:\\voi\\pcw\\..\\..\\Windows\\tei\\qs\\k\\..\\..\\..\\system32\\erool\\..\\wbem\\wg\\je\\..\\..\\wmic.exe shadowcopy delete`).(Citation: Twitter Richard WMIC)\n\nTools such as Invoke-Obfuscation and Invoke-DOSfucation have also been used to obfuscate commands.(Citation: Invoke-DOSfuscation)(Citation: Invoke-Obfuscation)",
"tactic_ids": [
"TA0005"
],
"tactic_names": [
"Defense Evasion"
],
"is_subtechnique": true,
"parent_id": "T1027",
"platforms": [
"Linux",
"macOS",
"Windows"
],
"detection": "",
"mitigation_ids": [
"M1040",
"M1049"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1027/010",
"created": "2023-03-14",
"modified": "2025-04-15",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1027.011",
"name": "Fileless Storage",
"description": "Adversaries may store data in \"fileless\" formats to conceal malicious activity from defenses. Fileless storage can be broadly defined as any format other than a file. Common examples of non-volatile fileless storage in Windows systems include the Windows Registry, event logs, or WMI repository.(Citation: Microsoft Fileless)(Citation: SecureList Fileless) Shared memory directories on Linux systems (`/dev/shm`, `/run/shm`, `/var/run`, and `/var/lock`) and volatile directories on Network Devices (`/tmp` and `/volatile`) may also be considered fileless storage, as files written to these directories are mapped directly to RAM and not stored on the disk.(Citation: Elastic Binary Executed from Shared Memory Directory)(Citation: Akami Frog4Shell 2024)(Citation: Aquasec Muhstik Malware 2024)(Citation: Bitsight 7777 Botnet)(Citation: CISCO Nexus 900 Config).\n\nSimilar to fileless in-memory behaviors such as [Reflective Code Loading](https://attack.mitre.org/techniques/T1620) and [Process Injection](https://attack.mitre.org/techniques/T1055), fileless data storage may remain undetected by anti-virus and other endpoint security tools that can only access specific file formats from disk storage. Leveraging fileless storage may also allow adversaries to bypass the protections offered by read-only file systems in Linux.(Citation: Sysdig Fileless Malware 23022)\n\nAdversaries may use fileless storage to conceal various types of stored data, including payloads/shellcode (potentially being used as part of [Persistence](https://attack.mitre.org/tactics/TA0003)) and collected data not yet exfiltrated from the victim (e.g., [Local Data Staging](https://attack.mitre.org/techniques/T1074/001)). Adversaries also often encrypt, encode, splice, or otherwise obfuscate this fileless data when stored. \n\nSome forms of fileless storage activity may indirectly create artifacts in the file system, but in central and otherwise difficult to inspect formats such as the WMI (e.g., `%SystemRoot%\\System32\\Wbem\\Repository`) or Registry (e.g., `%SystemRoot%\\System32\\Config`) physical files.(Citation: Microsoft Fileless) ",
"tactic_ids": [
"TA0005"
],
"tactic_names": [
"Defense Evasion"
],
"is_subtechnique": true,
"parent_id": "T1027",
"platforms": [
"Windows",
"Linux"
],
"detection": "",
"mitigation_ids": [
"M1047"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1027/011",
"created": "2023-03-23",
"modified": "2025-06-05",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1027.012",
"name": "LNK Icon Smuggling",
"description": "Adversaries may smuggle commands to download malicious payloads past content filters by hiding them within otherwise seemingly benign windows shortcut files. Windows shortcut files (.LNK) include many metadata fields, including an icon location field (also known as the `IconEnvironmentDataBlock`) designed to specify the path to an icon file that is to be displayed for the LNK file within a host directory. \n\nAdversaries may abuse this LNK metadata to download malicious payloads. For example, adversaries have been observed using LNK files as phishing payloads to deliver malware. Once invoked (e.g., [Malicious File](https://attack.mitre.org/techniques/T1204/002)), payloads referenced via external URLs within the LNK icon location field may be downloaded. These files may also then be invoked by [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059)/[System Binary Proxy Execution](https://attack.mitre.org/techniques/T1218) arguments within the target path field of the LNK.(Citation: Unprotect Shortcut)(Citation: Booby Trap Shortcut 2017)\n\nLNK Icon Smuggling may also be utilized post compromise, such as malicious scripts executing an LNK on an infected host to download additional malicious payloads. \n",
"tactic_ids": [
"TA0005"
],
"tactic_names": [
"Defense Evasion"
],
"is_subtechnique": true,
"parent_id": "T1027",
"platforms": [
"Windows"
],
"detection": "",
"mitigation_ids": [
"M1040",
"M1049"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1027/012",
"created": "2023-09-29",
"modified": "2025-10-24",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1027.013",
"name": "Encrypted/Encoded File",
"description": "Adversaries may encrypt or encode files to obfuscate strings, bytes, and other specific patterns to impede detection. Encrypting and/or encoding file content aims to conceal malicious artifacts within a file used in an intrusion. Many other techniques, such as [Software Packing](https://attack.mitre.org/techniques/T1027/002), [Steganography](https://attack.mitre.org/techniques/T1027/003), and [Embedded Payloads](https://attack.mitre.org/techniques/T1027/009), share this same broad objective. Encrypting and/or encoding files could lead to a lapse in detection of static signatures, only for this malicious content to be revealed (i.e., [Deobfuscate/Decode Files or Information](https://attack.mitre.org/techniques/T1140)) at the time of execution/use.\n\nThis type of file obfuscation can be applied to many file artifacts present on victim hosts, such as malware log/configuration and payload files.(Citation: File obfuscation) Files can be encrypted with a hardcoded or user-supplied key, as well as otherwise obfuscated using standard encoding schemes such as Base64.\n\nThe entire content of a file may be obfuscated, or just specific functions or values (such as C2 addresses). Encryption and encoding may also be applied in redundant layers for additional protection.\n\nFor example, adversaries may abuse password-protected Word documents or self-extracting (SFX) archives as a method of encrypting/encoding a file such as a [Phishing](https://attack.mitre.org/techniques/T1566) payload. These files typically function by attaching the intended archived content to a decompressor stub that is executed when the file is invoked (e.g., [User Execution](https://attack.mitre.org/techniques/T1204)).(Citation: SFX - Encrypted/Encoded File) \n\nAdversaries may also abuse file-specific as well as custom encoding schemes. For example, Byte Order Mark (BOM) headers in text files may be abused to manipulate and obfuscate file content until [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059) execution.",
"tactic_ids": [
"TA0005"
],
"tactic_names": [
"Defense Evasion"
],
"is_subtechnique": true,
"parent_id": "T1027",
"platforms": [
"Linux",
"macOS",
"Windows"
],
"detection": "",
"mitigation_ids": [
"M1040",
"M1049"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1027/013",
"created": "2024-03-29",
"modified": "2025-04-15",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1027.014",
"name": "Polymorphic Code",
"description": "Adversaries may utilize polymorphic code (also known as metamorphic or mutating code) to evade detection. Polymorphic code is a type of software capable of changing its runtime footprint during code execution.(Citation: polymorphic-blackberry) With each execution of the software, the code is mutated into a different version of itself that achieves the same purpose or objective as the original. This functionality enables the malware to evade traditional signature-based defenses, such as antivirus and antimalware tools.(Citation: polymorphic-sentinelone) \nOther obfuscation techniques can be used in conjunction with polymorphic code to accomplish the intended effects, including using mutation engines to conduct actions such as [Software Packing](https://attack.mitre.org/techniques/T1027/002), [Command Obfuscation](https://attack.mitre.org/techniques/T1027/010), or [Encrypted/Encoded File](https://attack.mitre.org/techniques/T1027/013).(Citation: polymorphic-linkedin)(Citation: polymorphic-medium)\n",
"tactic_ids": [
"TA0005"
],
"tactic_names": [
"Defense Evasion"
],
"is_subtechnique": true,
"parent_id": "T1027",
"platforms": [
"Windows",
"macOS",
"Linux"
],
"detection": "",
"mitigation_ids": [
"M1040",
"M1049"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1027/014",
"created": "2024-09-27",
"modified": "2025-04-15",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1027.015",
"name": "Compression",
"description": "Adversaries may use compression to obfuscate their payloads or files. Compressed file formats such as ZIP, gzip, 7z, and RAR can compress and archive multiple files together to make it easier and faster to transfer files. In addition to compressing files, adversaries may also compress shellcode directly - for example, in order to store it in a Windows Registry key (i.e., [Fileless Storage](https://attack.mitre.org/techniques/T1027/011)).(Citation: Trustwave Pillowmint June 2020)\n\nIn order to further evade detection, adversaries may combine multiple ZIP files into one archive. This process of concatenation creates an archive that appears to be a single archive but in fact contains the central directories of the embedded archives. Some ZIP readers, such as 7zip, may not be able to identify concatenated ZIP files and miss the presence of the malicious payload.(Citation: Perception Point)\n\nFile archives may be sent as one [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001) through email. Adversaries have sent malicious payloads as archived files to encourage the user to interact with and extract the malicious payload onto their system (i.e., [Malicious File](https://attack.mitre.org/techniques/T1204/002)).(Citation: NTT Security Flagpro new December 2021) However, some file compression tools, such as 7zip, can be used to produce self-extracting archives. Adversaries may send self-extracting archives to hide the functionality of their payload and launch it without requiring multiple actions from the user.(Citation: The Hacker News)\n\n[Compression](https://attack.mitre.org/techniques/T1027/015) may be used in combination with [Encrypted/Encoded File](https://attack.mitre.org/techniques/T1027/013) where compressed files are encrypted and password-protected.",
"tactic_ids": [
"TA0005"
],
"tactic_names": [
"Defense Evasion"
],
"is_subtechnique": true,
"parent_id": "T1027",
"platforms": [
"Linux",
"Windows",
"macOS"
],
"detection": "",
"mitigation_ids": [
"M1049"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1027/015",
"created": "2025-03-04",
"modified": "2025-04-15",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1027.016",
"name": "Junk Code Insertion",
"description": "Adversaries may use junk code / dead code to obfuscate a malware’s functionality. Junk code is code that either does not execute, or if it does execute, does not change the functionality of the code. Junk code makes analysis more difficult and time-consuming, as the analyst steps through non-functional code instead of analyzing the main code. It also may hinder detections that rely on static code analysis due to the use of benign functionality, especially when combined with [Compression](https://attack.mitre.org/techniques/T1027/015) or [Software Packing](https://attack.mitre.org/techniques/T1027/002).(Citation: ReasonLabs)(Citation: ReasonLabs Cyberpedia Junk Code)\n\nNo-Operation (NOP) instructions are an example of dead code commonly used in x86 assembly language. They are commonly used as the 0x90 opcode. When NOPs are added to malware, the disassembler may show the NOP instructions, leading to the analyst needing to step through them.(Citation: ReasonLabs)\n\nThe use of junk / dead code insertion is distinct from [Binary Padding](https://attack.mitre.org/techniques/T1027/001) because the purpose is to obfuscate the functionality of the code, rather than simply to change the malware’s signature. ",
"tactic_ids": [
"TA0005"
],
"tactic_names": [
"Defense Evasion"
],
"is_subtechnique": true,
"parent_id": "T1027",
"platforms": [
"Linux",
"macOS",
"Windows"
],
"detection": "",
"mitigation_ids": [
"M1049"
],
"data_sources": [],
"url": "https://attack.mitre.org/techniques/T1027/016",
"created": "2025-03-04",
"modified": "2025-04-15",
"source_url": "https://www.ayinedjimi-consultants.fr"
},
{
"id": "T1027.017",
"name": "SVG Smuggling",
"description": "Adversaries may smuggle data and files past content filters by hiding malicious payloads inside of seemingly benign SVG files.(Citation: Trustwave SVG Smuggling 2025) SVGs, or Scalable Vector Graphics, are vector-based image files constructed using XML. As such, they can legitimately include `