Dataset Preview
Duplicate
The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
The dataset generation failed because of a cast error
Error code:   DatasetGenerationCastError
Exception:    DatasetGenerationCastError
Message:      An error occurred while generating the dataset

All the data files must have the same columns, but at some point there are 50621 new columns ({'Lcom/jjbytes/indianmoney/mainactivity/inlook/my_leads/MyLeadsHome; => onCreate => iput-object => Lcom/jjbytes/indianmoney/mainactivity/inlook/my_leads/MyLeadsHome;->intent_aid Ljava/lang/String;', 'Lnet/daum/android/webtoon/gui/LaunchingActivity+AF8-', 'Lcom/epocrates/activities/BaseActivity.5', 'Lorg/openintents/openpgp/OpenPgpDecryptionResult.4', 'Lcom/keepsoft_lib/homebuh/ExpensesExpandableListFragment; => onPrepareOptionsMenu => iget-object => Lcom/keepsoft_lib/homebuh/ExpensesExpandableListFragment;->intentData Landroid/net/Uri;', 'com.lenskart.app.receivers.CampaignReferrerReceiver', 'Layw; => amq => iget-object => Layw;->intent Landroid/content/Intent;', 'Lcom/intent/mediums/originated/seeming; => a => sget-object => Lcom/intent/mediums/originated/seeming;->c_9 Ljava/lang/String;', 'Lcom/localytics/android/MarketingHandler+ACQ-4.1', 'com.voltage.api.billing.BillingReceiver', "'com.netflix.mediaclient.intent.action.PLAYER_SUBTITLE_CONFIG_CHANGED'", 'Lorg/openintents/openpgp/util/OpenPgpAppPreference.15', 'com.excelliance.kxqp.platform.action.CRASH+AF8-REPORT', 'Lorg/openintents/filemanager/util/CopyHelper$CopyAsync; => onPostExecute => iget-object => Lorg/openintents/filemanager/util/CopyHelper$CopyAsync;->this$0 Lorg/openintents/filemanager/util/CopyHelper;', 'Lorg/openintents/filemanager/FileManagerActivity.17', 'net.puwe.sefu.qopibuvuliw.ACTION_72CE8F44', 'Lcom/jjbytes/indianmoney/mainactivity/inlook/my+AF8-leads/MyLeadsHome.1', 'com.mobilefence.family.permission.C
...
rs/ShowtimesMovieIntentMatcher$$InjectAdapter;->matcher Ldagger/internal/Binding;', 'Lcom/youversion/ui/moments/MomentsFragment$b; => x => iput-object => Lcom/youversion/intents/plans/PlanIntent;->imageUrl Ljava/lang/String;', 'Lcom/google/android/gms/wallet/MaskedWallet.5', 'Lcom/anzhuor/com/Anzhuor_wz_user; => exitdialog => iget-object => Lcom/anzhuor/com/Anzhuor_wz_user;->intent Landroid/content/Intent;', 'Lcom/youversion/c/b; => newMediaId => iget-object => Lcom/youversion/intents/plans/PlanReaderIntent;->usfm Ljava/lang/String;', 'Lcom/google/android/gms/wallet/k.20', 'com.earn.MyReceiver', 'com.xiaomile.tmber.BerR', 'Lcom/google/android/gms/identity/intents/model/UserAddress.246', 'com.uuwldh.SMSReceiver', "'com.epocrates.intent.action.database.RESOURCE+AF8-UPDATED'", 'Lcom/android/systemengine/receiver/RootReceiver$1; => <init> => iput-object => Lcom/android/systemengine/receiver/RootReceiver$1;->val$intent Landroid/content/Intent;', 'com.msc.action.ACCESSTOKEN_V02_RESPONSE', 'Lcom/google/android/gms/identity/intents/model/b; => a => iget-object => Lcom/google/android/gms/identity/intents/model/UserAddress;->n Ljava/lang/String;', 'android.permission.ACCESS_CHECKIN_PROPERTIES', 'com.keepsoft+AF8-lib.homebuh.action.EDIT+AF8-PLANEXP', 'Lcom/google/android/gms/b/mp', 'android.intent.action.GTALK_CONNECTED', "'com.soundhound.intent.extras.album'", 'android.intent.action.RINGTONE+AF8-PICKER', 'receiver.NextAdminReceiver', 'android.appwidget.action.ACTION_APPWIDGET_DELETED'}) and 8 missing columns ({'data sources', 'platforms', 'detection', 'name', 'description', 'url', 'id', 'kill chain phases'}).

This happened while the csv dataset builder was generating data using

hf://datasets/ErebusTN/The-Ultimate-CyberSecurity-Dataset-Collection/000000002.csv (at revision 57f17775d0b022de2064dd80d2d86cf74eb06974)

Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)
Traceback:    Traceback (most recent call last):
                File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1831, in _prepare_split_single
                  writer.write_table(table)
                File "/usr/local/lib/python3.12/site-packages/datasets/arrow_writer.py", line 714, in write_table
                  pa_table = table_cast(pa_table, self._schema)
                             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
                File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2272, in table_cast
                  return cast_table_to_schema(table, schema)
                         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
                File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2218, in cast_table_to_schema
                  raise CastError(
              datasets.table.CastError: Couldn't cast
              Unnamed: 0: int64
              ' a:targetActivity+AD0-'com.mplus.lib.ui.main.MainActivity' tools:targetApi+AD0-'25'+AD4AXA-n        (... 283 chars omitted): double
              Can't find launcher app through android.intent.category.HOME category and android.intent.action.MAIN (... 7 chars omitted): double
              +ACI-More than one BroadcastReceiver that handles android.intent.action.MEDIA+AF8-BUTTON was found: double
              Please replace '+AFw-xe3+AFw-x80+AFw-x90+AFw-xe5+AFw-xba+AFw-x94+AFw-xe7+AFw-x94+AFw-xa8+AFw-xe5+AFw (... 157 chars omitted): double
              Please replace '+AFw-xe3+AFw-x80+AFw-x90+AFw-xe5+AFw-xba+AFw-x94+AFw-xe7+AFw-x94+AFw-xa8+AFw-xe5+AFw (... 163 chars omitted): double
              Please replace '+AFw-xe3+AFw-x80+AFw-x90+AFw-xe5+AFw-xba+AFw-x94+AFw-xe7+AFw-x94+AFw-xa8+AFw-xe5+AFw (... 153 chars omitted): double
              +ACI-To prevent external tampering to your app's notifications: double
              +ACI-'                +ADw-action android:name+AD0AIgAi-android.intent.action.ANY+AF8-DATA+AF8-STATE (... 69 chars omitted): double
              +ACI-'                +ADw-action android:name+AD0AIgAi-android.intent.action.BOOT+AF8-COMPLETED+ACI (... 130 chars omitted): double
              +ACI-'            +ADw-intent+AC0-filter+AD4AXA-n                +ADw-action android:name+AD0AIgAi-c (... 62 chars omitted): double
              +ACI-'        +ADw-action android:name+AD0AIgAi-com.google.android.c2dm.intent.REGISTRATION'+ACI-: double
              +ACI-'    +ADw-action android:name+AD0AIgAi-com.google.android.c2dm.intent.RECEIVE+ACIAIg- /+AD4AXA- (... 7 chars omitted): double
              +ACI-' 
              ...
              _ALERT: double
              com.motorola.alarmclock.ALARM_ALERT: double
              com.motorola.blur.alarmclock.ALARM_ALERT: double
              com.lge.alarm.alarmclocknew.ALARM_ALERT: double
              com.mobitobi.android.gentlealarm.ALARM_INFO: double
              com.splunchy.android.alarmclock.ALARM_ALERT: double
              app.medicalid.CHANGE_LANG: double
              com.imo.android.imoimbeta.permission.C2D_MESSAGE: double
              com.bnpp.login.utils.LoginTimerService$IdentifiedSessionExpiredReceiver: double
              com.bnpp.login.authenticatedsession.EasyBankingAppSession$UITimeoutReceiver: double
              com.yahoo.mobile.client.android.mail.permission.C2D_MESSAGE: double
              com.yahoo.mail.action.LAUNCH_MAIN: double
              com.yahoo.android.mail.send_message: double
              com.yahoo.mail.APPWIDGET_COMPOSE: double
              com.yahoo.mail.data.PURGE_VACUUM: double
              com.yahoo.mail.command.SEND_MESSAGE: double
              com.yahoo.mail.command.MESSAGE_IN_OUTBOX_TOO_LONG: double
              com.yahoo.doubleplay.notifications.ACTION_BREAKING_NEWS_NOTIFICATION_RECEIVED: double
              com.yahoo.doubleplay.notifications.ACTION_TOP_NEWS_NOTIFICATION_RECEIVED: double
              Lcom/medibang/android/paint/tablet/model/information/Information; => setIntenturl => iput-object =>  (... 95 chars omitted): double
              Lcom/medibang/android/paint/tablet/model/information/Information; => getIntenturl => iget-object =>  (... 95 chars omitted): double
              org.strongswan.android.action.START_PROFILE: double
              com.karttuner.racemonitor.permission.C2D_MESSAGE: double
              -- schema metadata --
              pandas: '{"index_columns": [{"kind": "range", "name": null, "start": 0, "' + 12632848
              to
              {'name': Value('string'), 'id': Value('string'), 'url': Value('string'), 'platforms': Value('string'), 'kill chain phases': Value('string'), 'description': Value('string'), 'data sources': Value('string'), 'detection': Value('string')}
              because column names don't match
              
              During handling of the above exception, another exception occurred:
              
              Traceback (most recent call last):
                File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1334, in compute_config_parquet_and_info_response
                  parquet_operations, partial, estimated_dataset_info = stream_convert_to_parquet(
                                                                        ^^^^^^^^^^^^^^^^^^^^^^^^^^
                File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 911, in stream_convert_to_parquet
                  builder._prepare_split(
                File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1702, in _prepare_split
                  for job_id, done, content in self._prepare_split_single(
                                               ^^^^^^^^^^^^^^^^^^^^^^^^^^^
                File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1833, in _prepare_split_single
                  raise DatasetGenerationCastError.from_cast_error(
              datasets.exceptions.DatasetGenerationCastError: An error occurred while generating the dataset
              
              All the data files must have the same columns, but at some point there are 50621 new columns ({'Lcom/jjbytes/indianmoney/mainactivity/inlook/my_leads/MyLeadsHome; => onCreate => iput-object => Lcom/jjbytes/indianmoney/mainactivity/inlook/my_leads/MyLeadsHome;->intent_aid Ljava/lang/String;', 'Lnet/daum/android/webtoon/gui/LaunchingActivity+AF8-', 'Lcom/epocrates/activities/BaseActivity.5', 'Lorg/openintents/openpgp/OpenPgpDecryptionResult.4', 'Lcom/keepsoft_lib/homebuh/ExpensesExpandableListFragment; => onPrepareOptionsMenu => iget-object => Lcom/keepsoft_lib/homebuh/ExpensesExpandableListFragment;->intentData Landroid/net/Uri;', 'com.lenskart.app.receivers.CampaignReferrerReceiver', 'Layw; => amq => iget-object => Layw;->intent Landroid/content/Intent;', 'Lcom/intent/mediums/originated/seeming; => a => sget-object => Lcom/intent/mediums/originated/seeming;->c_9 Ljava/lang/String;', 'Lcom/localytics/android/MarketingHandler+ACQ-4.1', 'com.voltage.api.billing.BillingReceiver', "'com.netflix.mediaclient.intent.action.PLAYER_SUBTITLE_CONFIG_CHANGED'", 'Lorg/openintents/openpgp/util/OpenPgpAppPreference.15', 'com.excelliance.kxqp.platform.action.CRASH+AF8-REPORT', 'Lorg/openintents/filemanager/util/CopyHelper$CopyAsync; => onPostExecute => iget-object => Lorg/openintents/filemanager/util/CopyHelper$CopyAsync;->this$0 Lorg/openintents/filemanager/util/CopyHelper;', 'Lorg/openintents/filemanager/FileManagerActivity.17', 'net.puwe.sefu.qopibuvuliw.ACTION_72CE8F44', 'Lcom/jjbytes/indianmoney/mainactivity/inlook/my+AF8-leads/MyLeadsHome.1', 'com.mobilefence.family.permission.C
              ...
              rs/ShowtimesMovieIntentMatcher$$InjectAdapter;->matcher Ldagger/internal/Binding;', 'Lcom/youversion/ui/moments/MomentsFragment$b; => x => iput-object => Lcom/youversion/intents/plans/PlanIntent;->imageUrl Ljava/lang/String;', 'Lcom/google/android/gms/wallet/MaskedWallet.5', 'Lcom/anzhuor/com/Anzhuor_wz_user; => exitdialog => iget-object => Lcom/anzhuor/com/Anzhuor_wz_user;->intent Landroid/content/Intent;', 'Lcom/youversion/c/b; => newMediaId => iget-object => Lcom/youversion/intents/plans/PlanReaderIntent;->usfm Ljava/lang/String;', 'Lcom/google/android/gms/wallet/k.20', 'com.earn.MyReceiver', 'com.xiaomile.tmber.BerR', 'Lcom/google/android/gms/identity/intents/model/UserAddress.246', 'com.uuwldh.SMSReceiver', "'com.epocrates.intent.action.database.RESOURCE+AF8-UPDATED'", 'Lcom/android/systemengine/receiver/RootReceiver$1; => <init> => iput-object => Lcom/android/systemengine/receiver/RootReceiver$1;->val$intent Landroid/content/Intent;', 'com.msc.action.ACCESSTOKEN_V02_RESPONSE', 'Lcom/google/android/gms/identity/intents/model/b; => a => iget-object => Lcom/google/android/gms/identity/intents/model/UserAddress;->n Ljava/lang/String;', 'android.permission.ACCESS_CHECKIN_PROPERTIES', 'com.keepsoft+AF8-lib.homebuh.action.EDIT+AF8-PLANEXP', 'Lcom/google/android/gms/b/mp', 'android.intent.action.GTALK_CONNECTED', "'com.soundhound.intent.extras.album'", 'android.intent.action.RINGTONE+AF8-PICKER', 'receiver.NextAdminReceiver', 'android.appwidget.action.ACTION_APPWIDGET_DELETED'}) and 8 missing columns ({'data sources', 'platforms', 'detection', 'name', 'description', 'url', 'id', 'kill chain phases'}).
              
              This happened while the csv dataset builder was generating data using
              
              hf://datasets/ErebusTN/The-Ultimate-CyberSecurity-Dataset-Collection/000000002.csv (at revision 57f17775d0b022de2064dd80d2d86cf74eb06974)
              
              Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)

Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.

name
string
id
string
url
string
platforms
string
kill chain phases
string
description
string
data sources
string
detection
string
Data Obfuscation
T1001
https://attack.mitre.org/techniques/T1001
Linux, macOS, Windows
Command and Control
Adversaries may obfuscate command and control traffic to make it more difficult to detect. Command and control (C2) communications are hidden (but not necessarily encrypted) in an attempt to make the content more difficult to discover or decipher and to make the communication less conspicuous and hide commands from bei...
Network Traffic: Network Traffic Content
Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. Analyze packet contents to detect communications that do not follow...
Junk Data
T1001.001
https://attack.mitre.org/techniques/T1001/001
Linux, macOS, Windows
Command and Control
Adversaries may add junk data to protocols used for command and control to make detection more difficult. By adding random or meaningless data to the protocols used for command and control, adversaries can prevent trivial methods for decoding, deciphering, or otherwise analyzing the traffic. Examples may include append...
Network Traffic: Network Traffic Content
Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. Analyze packet contents to detect communications that do not follow...
Steganography
T1001.002
https://attack.mitre.org/techniques/T1001/002
Linux, macOS, Windows
Command and Control
Adversaries may use steganographic techniques to hide command and control traffic to make detection efforts more difficult. Steganographic techniques can be used to hide data in digital messages that are transferred between systems. This hidden information can be used for command and control of compromised systems. In ...
Network Traffic: Network Traffic Content
Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. Analyze packet contents to detect communications that do not follow...
Protocol Impersonation
T1001.003
https://attack.mitre.org/techniques/T1001/003
Linux, Windows, macOS
Command and Control
Adversaries may impersonate legitimate protocols or web service traffic to disguise command and control activity and thwart analysis efforts. By impersonating legitimate protocols or web services, adversaries can make their command and control traffic blend in with legitimate network traffic. Adversaries may imperso...
Network Traffic: Network Traffic Content
Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. Analyze packet contents to detect communications that do not follow...
OS Credential Dumping
T1003
https://attack.mitre.org/techniques/T1003
Windows, Linux, macOS
Credential Access
Adversaries may attempt to dump credentials to obtain account login and credential material, normally in the form of a hash or a clear text password, from the operating system and software. Credentials can then be used to perform [Lateral Movement](TA0008) and access restricted information. Several of the tools mentio...
Process: Process Creation, Process: Process Access, Command: Command Execution, File: File Access, Windows Registry: Windows Registry Key Access, Active Directory: Active Directory Object Access, Network Traffic: Network Traffic Flow, Network Traffic: Network Traffic Content, Process: OS API Execution
# Windows # Monitor for unexpected processes interacting with lsass.exe.(Citation: Medium Detecting Attempts to Steal Passwords from Memory) Common credential dumpers such as [Mimikatz](S0002) access the LSA Subsystem Service (LSASS) process by opening the process, locating the LSA secrets key, and decrypting the sec...
LSASS Memory
T1003.001
https://attack.mitre.org/techniques/T1003/001
Windows
Credential Access
Adversaries may attempt to access credential material stored in the process memory of the Local Security Authority Subsystem Service (LSASS). After a user logs on, the system generates and stores a variety of credential materials in LSASS process memory. These credential materials can be harvested by an administrative ...
Process: Process Creation, Process: Process Access, Command: Command Execution, Process: OS API Execution
Monitor for unexpected processes interacting with LSASS.exe.(Citation: Medium Detecting Attempts to Steal Passwords from Memory) Common credential dumpers such as Mimikatz access LSASS.exe by opening the process, locating the LSA secrets key, and decrypting the sections in memory where credential details are stored. Cr...
Security Account Manager
T1003.002
https://attack.mitre.org/techniques/T1003/002
Windows
Credential Access
Adversaries may attempt to extract credential material from the Security Account Manager (SAM) database either through in-memory techniques or through the Windows Registry where the SAM database is stored. The SAM is a database file that contains local accounts for the host, typically those found with the `net user` co...
Command: Command Execution, Windows Registry: Windows Registry Key Access, File: File Access
Hash dumpers open the Security Accounts Manager (SAM) on the local file system (`%SystemRoot%/system32/config/SAM`) or create a dump of the Registry SAM key to access stored account password hashes. Some hash dumpers will open the local file system as a device and parse to the SAM table to avoid file access defenses. O...
NTDS
T1003.003
https://attack.mitre.org/techniques/T1003/003
Windows
Credential Access
Adversaries may attempt to access or create a copy of the Active Directory domain database in order to steal credential information, as well as obtain other information about domain members such as devices, users, and access rights. By default, the NTDS file (NTDS.dit) is located in `%SystemRoot%\NTDS\Ntds.dit` of a do...
File: File Access, Command: Command Execution
Monitor processes and command-line arguments for program execution that may be indicative of credential dumping, especially attempts to access or copy the NTDS.dit.
LSA Secrets
T1003.004
https://attack.mitre.org/techniques/T1003/004
Windows
Credential Access
Adversaries with SYSTEM access to a host may attempt to access Local Security Authority (LSA) secrets, which can contain a variety of different credential materials, such as credentials for service accounts.(Citation: Passcape LSA Secrets)(Citation: Microsoft AD Admin Tier Model)(Citation: Tilbury Windows Credentials) ...
Windows Registry: Windows Registry Key Access, Command: Command Execution
Monitor processes and command-line arguments for program execution that may be indicative of credential dumping. Remote access tools may contain built-in features or incorporate existing tools like Mimikatz. PowerShell scripts also exist that contain credential dumping functionality, such as PowerSploit's Invoke-Mimika...
Cached Domain Credentials
T1003.005
https://attack.mitre.org/techniques/T1003/005
Windows
Credential Access
Adversaries may attempt to access cached domain credentials used to allow authentication to occur in the event a domain controller is unavailable.(Citation: Microsoft - Cached Creds) On Windows Vista and newer, the hash format is DCC2 (Domain Cached Credentials version 2) hash, also known as MS-Cache v2 hash.(Citation...
Command: Command Execution
Monitor processes and command-line arguments for program execution that may be indicative of credential dumping. Remote access tools may contain built-in features or incorporate existing tools like Mimikatz. PowerShell scripts also exist that contain credential dumping functionality, such as PowerSploit's Invoke-Mimika...
DCSync
T1003.006
https://attack.mitre.org/techniques/T1003/006
Windows
Credential Access
Adversaries may attempt to access credentials and other sensitive information by abusing a Windows Domain Controller's application programming interface (API)(Citation: Microsoft DRSR Dec 2017) (Citation: Microsoft GetNCCChanges) (Citation: Samba DRSUAPI) (Citation: Wine API samlib.dll) to simulate the replication proc...
Active Directory: Active Directory Object Access, Network Traffic: Network Traffic Flow, Network Traffic: Network Traffic Content
Monitor domain controller logs for replication requests and other unscheduled activity possibly associated with DCSync.(Citation: Microsoft DRSR Dec 2017) (Citation: Microsoft GetNCCChanges) (Citation: Samba DRSUAPI) Also monitor for network protocols(Citation: Microsoft DRSR Dec 2017) (Citation: Microsoft NRPC Dec 201...
Proc Filesystem
T1003.007
https://attack.mitre.org/techniques/T1003/007
Linux
Credential Access
Adversaries may gather credentials from information stored in the Proc filesystem or `/proc`. The Proc filesystem on Linux contains a great deal of information regarding the state of the running operating system. Processes running with root privileges can use this facility to scrape live memory of other running program...
Command: Command Execution, File: File Access
To obtain the passwords and hashes stored in memory, processes must open a maps file in the /proc filesystem for the process being analyzed. This file is stored under the path `/proc/\*/maps`, where the `\*` directory is the unique pid of the program being interrogated for such authentication data. The AuditD monitorin...
/etc/passwd and /etc/shadow
T1003.008
https://attack.mitre.org/techniques/T1003/008
Linux
Credential Access
Adversaries may attempt to dump the contents of `/etc/passwd` and `/etc/shadow` to enable offline password cracking. Most modern Linux operating systems use a combination of `/etc/passwd` and `/etc/shadow` to store user account information including password hashes in `/etc/shadow`. By default, `/etc/shadow` is only re...
Command: Command Execution, File: File Access
The AuditD monitoring tool, which ships stock in many Linux distributions, can be used to watch for hostile processes attempting to access `/etc/passwd` and `/etc/shadow`, alerting on the pid, process name, and arguments of such programs.
Data from Local System
T1005
https://attack.mitre.org/techniques/T1005
Linux, macOS, Windows
Collection
Adversaries may search local system sources, such as file systems or local databases, to find files of interest and sensitive data prior to Exfiltration. Adversaries may do this using a [Command and Scripting Interpreter](T1059), such as [cmd](S0106), which has functionality to interact with the file system to gather ...
Script: Script Execution, File: File Access, Command: Command Execution
Monitor processes and command-line arguments for actions that could be taken to collect files from a system. Remote access tools with built-in features may interact directly with the Windows API to gather data. Data may also be acquired through Windows system management tools such as [Windows Management Instrumentation...
Direct Volume Access
T1006
https://attack.mitre.org/techniques/T1006
Windows
Defense Evasion
Adversaries may directly access a volume to bypass file access controls and file system monitoring. Windows allows programs to have direct access to logical volumes. Programs with direct access may read and write files directly from the drive by analyzing file system data structures. This technique bypasses Windows fil...
Command: Command Execution, Drive: Drive Access
Monitor handle opens on drive volumes that are made by processes to determine when they may directly access logical drives. (Citation: Github PowerSploit Ninjacopy) Monitor processes and command-line arguments for actions that could be taken to copy files from the logical drive and evade common file system protections...
System Service Discovery
T1007
https://attack.mitre.org/techniques/T1007
Windows, macOS
Discovery
Adversaries may try to get information about registered services. Commands that may obtain information about services using operating system utilities are "sc," "tasklist /svc" using [Tasklist](S0057), and "net start" using [Net](S0039), but adversaries may also use other tools as well. Adversaries may use the informat...
Process: Process Creation, Command: Command Execution
System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained. Monitor processe...
Fallback Channels
T1008
https://attack.mitre.org/techniques/T1008
Linux, Windows, macOS
Command and Control
Adversaries may use fallback or alternate communication channels if the primary channel is compromised or inaccessible in order to maintain reliable command and control and to avoid data transfer thresholds.
Network Traffic: Network Traffic Flow, Network Traffic: Network Connection Creation
Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. Analyze packet contents to detect communications that do not follow...
Application Window Discovery
T1010
https://attack.mitre.org/techniques/T1010
macOS, Windows
Discovery
Adversaries may attempt to get a listing of open application windows. Window listings could convey information about how the system is used or give context to information collected by a keylogger.
Process: Process Creation, Command: Command Execution, Process: OS API Execution
System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities based on the information obtained. Monitor processes and command-line argument...
Exfiltration Over Other Network Medium
T1011
https://attack.mitre.org/techniques/T1011
Linux, macOS, Windows
Exfiltration
Adversaries may attempt to exfiltrate data over a different network medium than the command and control channel. If the command and control network is a wired Internet connection, the exfiltration may occur, for example, over a WiFi connection, modem, cellular data connection, Bluetooth, or another radio frequency (RF)...
Network Traffic: Network Connection Creation, Network Traffic: Network Traffic Flow, Network Traffic: Network Traffic Content, File: File Access, Command: Command Execution
Monitor for processes utilizing the network that do not normally have network communication or have never been seen before. Processes that normally require user-driven events to access the network (for example, a web browser opening with a mouse click or key press) but access the network without such may be malicious. ...
Exfiltration Over Bluetooth
T1011.001
https://attack.mitre.org/techniques/T1011/001
Linux, macOS, Windows
Exfiltration
Adversaries may attempt to exfiltrate data over Bluetooth rather than the command and control channel. If the command and control network is a wired Internet connection, an attacker may opt to exfiltrate data using a Bluetooth communication channel. Adversaries may choose to do this if they have sufficient access and ...
Network Traffic: Network Connection Creation, Network Traffic: Network Traffic Flow, Network Traffic: Network Traffic Content, File: File Access, Command: Command Execution
Monitor for processes utilizing the network that do not normally have network communication or have never been seen before. Processes that normally require user-driven events to access the network (for example, a web browser opening with a mouse click or key press) but access the network without such may be malicious. ...
Query Registry
T1012
https://attack.mitre.org/techniques/T1012
Windows
Discovery
Adversaries may interact with the Windows Registry to gather information about the system, configuration, and installed software. The Registry contains a significant amount of information about the operating system, configuration, software, and security.(Citation: Wikipedia Windows Registry) Information can easily be ...
Process: Process Creation, Command: Command Execution, Windows Registry: Windows Registry Key Access, Process: OS API Execution
System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained. Interaction with...
Rootkit
T1014
https://attack.mitre.org/techniques/T1014
Linux, macOS, Windows
Defense Evasion
Adversaries may use rootkits to hide the presence of programs, files, network connections, services, drivers, and other system components. Rootkits are programs that hide the existence of malware by intercepting/hooking and modifying operating system API calls that supply system information. (Citation: Symantec Windows...
Drive: Drive Modification, Firmware: Firmware Modification
Some rootkit protections may be built into anti-virus or operating system software. There are dedicated rootkit detection tools that look for specific types of rootkit behavior. Monitor for the existence of unrecognized DLLs, devices, services, and changes to the MBR. (Citation: Wikipedia Rootkit)
System Network Configuration Discovery
T1016
https://attack.mitre.org/techniques/T1016
Linux, macOS, Windows
Discovery
Adversaries may look for details about the network configuration and settings, such as IP and/or MAC addresses, of systems they access or through information discovery of remote systems. Several operating system administration utilities exist that can be used to gather this information. Examples include [Arp](S0099), [...
Process: Process Creation, Script: Script Execution, Command: Command Execution, Process: OS API Execution
System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained. Monitor processe...
Internet Connection Discovery
T1016.001
https://attack.mitre.org/techniques/T1016/001
Windows, Linux, macOS
Discovery
Adversaries may check for Internet connectivity on compromised systems. This may be performed during automated discovery and can be accomplished in numerous ways such as using [Ping](S0097), `tracert`, and GET requests to websites. Adversaries may use the results and responses from these requests to determine if the s...
Process: Process Creation, Command: Command Execution
System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Command and Control, based on the information obtained. Monitor proce...
Remote System Discovery
T1018
https://attack.mitre.org/techniques/T1018
Linux, macOS, Windows
Discovery
Adversaries may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for Lateral Movement from the current system. Functionality could exist within remote access tools to enable this, but utilities available on the operating system could also be us...
Process: Process Creation, Command: Command Execution, Network Traffic: Network Connection Creation, File: File Access
System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained. Normal, benign s...
Automated Exfiltration
T1020
https://attack.mitre.org/techniques/T1020
Linux, macOS, Windows, Network
Exfiltration
Adversaries may exfiltrate data, such as sensitive documents, through the use of automated processing after being gathered during Collection. When automated exfiltration is used, other exfiltration techniques likely apply as well to transfer the information out of the network, such as [Exfiltration Over C2 Channel](T...
Command: Command Execution, Script: Script Execution, Network Traffic: Network Connection Creation, Network Traffic: Network Traffic Flow, Network Traffic: Network Traffic Content, File: File Access
Monitor process file access patterns and network behavior. Unrecognized processes or scripts that appear to be traversing file systems and sending network traffic may be suspicious.
Traffic Duplication
T1020.001
https://attack.mitre.org/techniques/T1020/001
Network
Exfiltration
Adversaries may leverage traffic mirroring in order to automate data exfiltration over compromised network infrastructure. Traffic mirroring is a native feature for some network devices and used for network analysis and may be configured to duplicate traffic and forward to one or more destinations for analysis by a ne...
Network Traffic: Network Connection Creation, Network Traffic: Network Traffic Flow
Monitor network traffic for uncommon data flows (e.g. unusual network communications, suspicious communications that have never been seen before, communications sending fixed size data packets at regular intervals). Analyze packet contents to detect communications that do not follow the expected protocol behavior for ...
Remote Services
T1021
https://attack.mitre.org/techniques/T1021
Linux, macOS, Windows
Lateral Movement
Adversaries may use [Valid Accounts](T1078) to log into a service specifically designed to accept remote connections, such as telnet, SSH, and VNC. The adversary may then perform actions as the logged-on user. In an enterprise environment, servers and workstations can be organized into domains. Domains provide central...
Process: Process Creation, Network Traffic: Network Connection Creation, Network Traffic: Network Traffic Flow, Logon Session: Logon Session Creation, Command: Command Execution, Network Share: Network Share Access, Module: Module Load
Correlate use of login activity related to remote services with unusual behavior or other malicious or suspicious activity. Adversaries will likely need to learn about an environment and the relationships between systems through Discovery techniques prior to attempting Lateral Movement. Use of applications such as AR...
Remote Desktop Protocol
T1021.001
https://attack.mitre.org/techniques/T1021/001
Windows
Lateral Movement
Adversaries may use [Valid Accounts](T1078) to log into a computer using the Remote Desktop Protocol (RDP). The adversary may then perform actions as the logged-on user. Remote desktop is a common feature in operating systems. It allows a user to log into an interactive session with a system desktop graphical user int...
Process: Process Creation, Network Traffic: Network Connection Creation, Network Traffic: Network Traffic Flow, Logon Session: Logon Session Creation
Use of RDP may be legitimate, depending on the network environment and how it is used. Other factors, such as access patterns and activity that occurs after a remote login, may indicate suspicious or malicious behavior with RDP. Monitor for user accounts logged into systems they would not normally access or access patt...
SMB/Windows Admin Shares
T1021.002
https://attack.mitre.org/techniques/T1021/002
Windows
Lateral Movement
Adversaries may use [Valid Accounts](T1078) to interact with a remote network share using Server Message Block (SMB). The adversary may then perform actions as the logged-on user. SMB is a file, printer, and serial port sharing protocol for Windows machines on the same network or domain. Adversaries may use SMB to int...
Command: Command Execution, Network Traffic: Network Connection Creation, Network Traffic: Network Traffic Flow, Logon Session: Logon Session Creation, Network Share: Network Share Access
Ensure that proper logging of accounts used to log into systems is turned on and centrally collected. Windows logging is able to collect success/failure for accounts that may be used to move laterally and can be collected using tools such as Windows Event Forwarding. (Citation: Lateral Movement Payne)(Citation: Windows...
Distributed Component Object Model
T1021.003
https://attack.mitre.org/techniques/T1021/003
Windows
Lateral Movement
Adversaries may use [Valid Accounts](T1078) to interact with remote machines by taking advantage of Distributed Component Object Model (DCOM). The adversary may then perform actions as the logged-on user. The Windows Component Object Model (COM) is a component of the native Windows application programming interface (A...
Module: Module Load, Process: Process Creation, Network Traffic: Network Connection Creation
Monitor for COM objects loading DLLs and other modules not typically associated with the application.(Citation: Enigma Outlook DCOM Lateral Movement Nov 2017) Enumeration of COM objects, via [Query Registry](T1012) or [PowerShell](T1059.001), may also proceed malicious use.(Citation: Fireeye Hunting COM June 2019)(Cita...
SSH
T1021.004
https://attack.mitre.org/techniques/T1021/004
Linux, macOS
Lateral Movement
Adversaries may use [Valid Accounts](T1078) to log into remote machines using Secure Shell (SSH). The adversary may then perform actions as the logged-on user. SSH is a protocol that allows authorized users to open remote shells on other computers. Many Linux and macOS versions come with SSH installed by default, alth...
Process: Process Creation, Network Traffic: Network Connection Creation, Logon Session: Logon Session Creation
Use of SSH may be legitimate depending on the environment and how it’s used. Other factors, such as access patterns and activity that occurs after a remote login, may indicate suspicious or malicious behavior with SSH. Monitor for user accounts logged into systems they would not normally access or access patterns to mu...
VNC
T1021.005
https://attack.mitre.org/techniques/T1021/005
Linux, macOS, Windows
Lateral Movement
Adversaries may use [Valid Accounts](T1078) to remotely control machines using Virtual Network Computing (VNC). VNC is a platform-independent desktop sharing system that uses the RFB (“remote framebuffer”) protocol to enable users to remotely control another computer’s display by relaying the screen, mouse, and keyboa...
Process: Process Creation, Network Traffic: Network Connection Creation, Logon Session: Logon Session Creation
Use of VNC may be legitimate depending on the environment and how it’s used. Other factors, such as access patterns and activity that occurs after a remote login, may indicate suspicious or malicious behavior using VNC. On macOS systems `log show --predicate 'process = "screensharingd" and eventMessage contains "Authe...
Windows Remote Management
T1021.006
https://attack.mitre.org/techniques/T1021/006
Windows
Lateral Movement
Adversaries may use [Valid Accounts](T1078) to interact with remote systems using Windows Remote Management (WinRM). The adversary may then perform actions as the logged-on user. WinRM is the name of both a Windows service and a protocol that allows a user to interact with a remote system (e.g., run an executable, mod...
Service: Service Metadata, Process: Process Creation, Network Traffic: Network Connection Creation, Logon Session: Logon Session Creation, Command: Command Execution
Monitor use of WinRM within an environment by tracking service execution. If it is not normally used or is disabled, then this may be an indicator of suspicious behavior. Monitor processes created and actions taken by the WinRM process or a WinRM invoked script to correlate it with other related events.(Citation: Medi...
Data from Removable Media
T1025
https://attack.mitre.org/techniques/T1025
Linux, macOS, Windows
Collection
Adversaries may search connected removable media on computers they have compromised to find files of interest. Sensitive data can be collected from any removable media (optical disk drive, USB memory, etc.) connected to the compromised system prior to Exfiltration. Interactive command shells may be in use, and common f...
File: File Access, Command: Command Execution
Monitor processes and command-line arguments for actions that could be taken to collect files from a system's connected removable media. Remote access tools with built-in features may interact directly with the Windows API to gather data. Data may also be acquired through Windows system management tools such as [Window...
Obfuscated Files or Information
T1027
https://attack.mitre.org/techniques/T1027
Linux, macOS, Windows
Defense Evasion
Adversaries may attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the system or in transit. This is common behavior that can be used across different platforms and the network to evade defenses. Payloads may be compressed, archived...
Command: Command Execution, File: File Metadata, File: File Creation, Process: Process Creation
Detection of file obfuscation is difficult unless artifacts are left behind by the obfuscation process that are uniquely detectable with a signature. If detection of the obfuscation itself is not possible, it may be possible to detect the malicious activity that caused the obfuscated file (for example, the method that ...
Binary Padding
T1027.001
https://attack.mitre.org/techniques/T1027/001
Linux, macOS, Windows
Defense Evasion
Adversaries may use binary padding to add junk data and change the on-disk representation of malware. This can be done without affecting the functionality or behavior of a binary, but can increase the size of the binary beyond what some security tools are capable of handling due to file size limitations. Binary paddi...
File: File Metadata
Depending on the method used to pad files, a file-based signature may be capable of detecting padding using a scanning or on-access based tool. When executed, the resulting process from padded files may also exhibit other behavior characteristics of being used to conduct an intrusion such as system and network informa...
Software Packing
T1027.002
https://attack.mitre.org/techniques/T1027/002
macOS, Windows
Defense Evasion
Adversaries may perform software packing or virtual machine software protection to conceal their code. Software packing is a method of compressing or encrypting an executable. Packing an executable changes the file signature in an attempt to avoid signature-based detection. Most decompression techniques decompress the ...
File: File Metadata
Use file scanning to look for known software packers or artifacts of packing techniques. Packing is not a definitive indicator of malicious activity, because legitimate software may use packing techniques to reduce binary size or to protect proprietary code.
Steganography
T1027.003
https://attack.mitre.org/techniques/T1027/003
Linux, macOS, Windows
Defense Evasion
Adversaries may use steganography techniques in order to prevent the detection of hidden information. Steganographic techniques can be used to hide data in digital media such as images, audio tracks, video clips, or text files. [Duqu](S0038) was an early example of malware that used steganography. It encrypted the gat...
File: File Metadata
Detection of steganography is difficult unless artifacts are left behind by the obfuscation process that are detectable with a known signature. Look for strings or other signatures left in system artifacts related to decoding steganography.
Compile After Delivery
T1027.004
https://attack.mitre.org/techniques/T1027/004
Linux, macOS, Windows
Defense Evasion
Adversaries may attempt to make payloads difficult to discover and analyze by delivering files to victims as uncompiled code. Text-based source code files may subvert analysis and scrutiny from protections targeting executables/binaries. These payloads will need to be compiled before execution; typically via native uti...
File: File Metadata, File: File Creation, Process: Process Creation, Command: Command Execution
Monitor the execution file paths and command-line arguments for common compilers, such as csc.exe and GCC/MinGW, and correlate with other suspicious behavior to reduce false positives from normal user and administrator behavior. The compilation of payloads may also generate file creation and/or file write events. Look ...
Indicator Removal from Tools
T1027.005
https://attack.mitre.org/techniques/T1027/005
Linux, macOS, Windows
Defense Evasion
Adversaries may remove indicators from tools if they believe their malicious tool was detected, quarantined, or otherwise curtailed. They can modify the tool by removing the indicator and using the updated version that is no longer detected by the target's defensive systems or subsequent targets that may use similar sy...
null
The first detection of a malicious tool may trigger an anti-virus or other security tool alert. Similar events may also occur at the boundary through network IDS, email scanning appliance, etc. The initial detection should be treated as an indication of a potentially more invasive intrusion. The alerting system should ...
HTML Smuggling
T1027.006
https://attack.mitre.org/techniques/T1027/006
Windows, Linux, macOS
Defense Evasion
Adversaries may smuggle data and files past content filters by hiding malicious payloads inside of seemingly benign HTML files. HTML documents can store large binary objects known as JavaScript Blobs (immutable data that represents raw bytes) that can later be constructed into file-like objects. Data may also be stored...
File: File Creation
Detection of HTML Smuggling is difficult as HTML5 and JavaScript attributes are used by legitimate services and applications. HTML Smuggling can be performed in many ways via JavaScript, developing rules for the different variants, with a combination of different encoding and/or encryption schemes, may be very challeng...
Scheduled Transfer
T1029
https://attack.mitre.org/techniques/T1029
Linux, macOS, Windows
Exfiltration
Adversaries may schedule data exfiltration to be performed only at certain times of day or at certain intervals. This could be done to blend traffic patterns with normal activity or availability. When scheduled exfiltration is used, other exfiltration techniques likely apply as well to transfer the information out of ...
Network Traffic: Network Connection Creation, Network Traffic: Network Traffic Flow
Monitor process file access patterns and network behavior. Unrecognized processes or scripts that appear to be traversing file systems and sending network traffic may be suspicious. Network connections to the same destination that occur at the same time of day for multiple days are suspicious.
Data Transfer Size Limits
T1030
https://attack.mitre.org/techniques/T1030
Linux, macOS, Windows
Exfiltration
An adversary may exfiltrate data in fixed size chunks instead of whole files or limit packet sizes below certain thresholds. This approach may be used to avoid triggering network data transfer threshold alerts.
Network Traffic: Network Connection Creation, Network Traffic: Network Traffic Flow
Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). If a process maintains a long connection during which it consistently sends fixed size data packets or a process opens connections and sends fixed sized data packets at regular intervals, it may...
System Owner/User Discovery
T1033
https://attack.mitre.org/techniques/T1033
Linux, macOS, Windows
Discovery
Adversaries may attempt to identify the primary user, currently logged in user, set of users that commonly uses a system, or whether a user is actively using the system. They may do this, for example, by retrieving account usernames or by using [OS Credential Dumping](T1003). The information may be collected in a numbe...
Process: Process Creation, Command: Command Execution
System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities based on the information obtained. Monitor processes and command-line argument...
Masquerading
T1036
https://attack.mitre.org/techniques/T1036
Linux, macOS, Windows, Containers
Defense Evasion
Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools. Masquerading occurs when the name or location of an object, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. This may include mani...
Image: Image Metadata, Command: Command Execution, Service: Service Metadata, Service: Service Creation, Scheduled Job: Scheduled Job Metadata, Scheduled Job: Scheduled Job Modification, File: File Metadata, Process: Process Metadata, File: File Modification
Collect file hashes; file names that do not match their expected hash are suspect. Perform file monitoring; files with known names but in unusual locations are suspect. Likewise, files that are modified outside of an update or patch are suspect. If file names are mismatched between the file name on disk and that of th...
Invalid Code Signature
T1036.001
https://attack.mitre.org/techniques/T1036/001
macOS, Windows
Defense Evasion
Adversaries may attempt to mimic features of valid code signatures to increase the chance of deceiving a user, analyst, or tool. Code signing provides a level of authenticity on a binary from the developer and a guarantee that the binary has not been tampered with. Adversaries can copy the metadata and signature inform...
File: File Metadata
Collect and analyze signing certificate metadata and check signature validity on software that executes within the environment, look for invalid signatures as well as unusual certificate characteristics and outliers.
Right-to-Left Override
T1036.002
https://attack.mitre.org/techniques/T1036/002
Linux, macOS, Windows
Defense Evasion
Adversaries may abuse the right-to-left override (RTLO or RLO) character (U+202E) to disguise a string and/or file name to make it appear benign. RTLO is a non-printing Unicode character that causes the text that follows it to be displayed in reverse. For example, a Windows screensaver executable named `March 25 \u202E...
File: File Metadata
Detection methods should include looking for common formats of RTLO characters within filenames such as `\u202E`, `[U+202E]`, and `%E2%80%AE`. Defenders should also check their analysis tools to ensure they do not interpret the RTLO character and instead print the true name of the file containing it.
Rename System Utilities
T1036.003
https://attack.mitre.org/techniques/T1036/003
Linux, macOS, Windows
Defense Evasion
Adversaries may rename legitimate system utilities to try to evade security mechanisms concerning the usage of those utilities. Security monitoring and control mechanisms may be in place for system utilities adversaries are capable of abusing. (Citation: LOLBAS Main Site) It may be possible to bypass those security mec...
File: File Modification, Process: Process Metadata, Command: Command Execution, File: File Metadata
If file names are mismatched between the file name on disk and that of the binary's PE metadata, this is a likely indicator that a binary was renamed after it was compiled. Collecting and comparing disk and resource filenames for binaries by looking to see if the InternalName, OriginalFilename, and/or ProductName match...
Masquerade Task or Service
T1036.004
https://attack.mitre.org/techniques/T1036/004
Windows, Linux, macOS
Defense Evasion
Adversaries may attempt to manipulate the name of a task or service to make it appear legitimate or benign. Tasks/services executed by the Task Scheduler or systemd will typically be given a name and/or description.(Citation: TechNet Schtasks)(Citation: Systemd Service Units) Windows services will have a service name a...
Command: Command Execution, Service: Service Metadata, Service: Service Creation, Scheduled Job: Scheduled Job Metadata, Scheduled Job: Scheduled Job Modification
Look for changes to tasks and services that do not correlate with known software, patch cycles, etc. Suspicious program execution through scheduled tasks or services may show up as outlier processes that have not been seen before when compared against historical data. Monitor processes and command-line arguments for ac...
Match Legitimate Name or Location
T1036.005
https://attack.mitre.org/techniques/T1036/005
Linux, macOS, Windows, Containers
Defense Evasion
Adversaries may match or approximate the name or location of legitimate files or resources when naming/placing them. This is done for the sake of evading defenses and observation. This may be done by placing an executable in a commonly trusted directory (ex: under System32) or giving it the name of a legitimate, truste...
Image: Image Metadata, File: File Metadata, Process: Process Metadata
Collect file hashes; file names that do not match their expected hash are suspect. Perform file monitoring; files with known names but in unusual locations are suspect. Likewise, files that are modified outside of an update or patch are suspect. If file names are mismatched between the file name on disk and that of th...
Space after Filename
T1036.006
https://attack.mitre.org/techniques/T1036/006
Linux, macOS
Defense Evasion
Adversaries can hide a program's true filetype by changing the extension of a file. With certain file types (specifically this does not work with .app extensions), appending a space to the end of a filename will change how the file is processed by the operating system. For example, if there is a Mach-O executable file...
File: File Metadata
It's not common for spaces to be at the end of filenames, so this is something that can easily be checked with file monitoring. From the user's perspective though, this is very hard to notice from within the Finder.app or on the command-line in Terminal.app. Processes executed from binaries containing non-standard exte...
Double File Extension
T1036.007
https://attack.mitre.org/techniques/T1036/007
Windows
Defense Evasion
Adversaries may abuse a double extension in the filename as a means of masquerading the true file type. A file name may include a secondary file type extension that may cause only the first extension to be displayed (ex: `File.txt.exe` may render in some views as just `File.txt`). However, the second extension is the t...
File: File Creation, File: File Metadata
Monitor for files written to disk that contain two file extensions, particularly when the second is an executable.(Citation: Seqrite DoubleExtension)
Boot or Logon Initialization Scripts
T1037
https://attack.mitre.org/techniques/T1037
macOS, Windows, Linux
Persistence, Privilege Escalation
Adversaries may use scripts automatically executed at boot or logon initialization to establish persistence. Initialization scripts can be used to perform administrative functions, which may often execute other programs or send information to an internal logging server. These scripts can vary based on operating system ...
Windows Registry: Windows Registry Key Creation, Process: Process Creation, Command: Command Execution, Active Directory: Active Directory Object Modification, File: File Creation, File: File Modification
Monitor logon scripts for unusual access by abnormal users or at abnormal times. Look for files added or modified by unusual accounts outside of normal administration duties. Monitor running process for actions that could be indicative of abnormal programs or executables running upon logon.
Logon Script (Windows)
T1037.001
https://attack.mitre.org/techniques/T1037/001
Windows
Persistence, Privilege Escalation
Adversaries may use Windows logon scripts automatically executed at logon initialization to establish persistence. Windows allows logon scripts to be run whenever a specific user or group of users log into a system.(Citation: TechNet Logon Scripts) This is done via adding a path to a script to the `HKCU\Environment\Use...
Windows Registry: Windows Registry Key Creation, Process: Process Creation, Command: Command Execution
Monitor for changes to Registry values associated with Windows logon scrips, nameley `HKCU\Environment\UserInitMprLogonScript`. Monitor running process for actions that could be indicative of abnormal programs or executables running upon logon.
Logon Script (Mac)
T1037.002
https://attack.mitre.org/techniques/T1037/002
macOS
Persistence, Privilege Escalation
Adversaries may use macOS logon scripts automatically executed at logon initialization to establish persistence. macOS allows logon scripts (known as login hooks) to be executed whenever a specific user logs into a system. A login hook tells Mac OS X to execute a certain script when a user logs in, but unlike [Startup ...
File: File Creation, File: File Modification, Process: Process Creation, Command: Command Execution
Monitor logon scripts for unusual access by abnormal users or at abnormal times. Look for files added or modified by unusual accounts outside of normal administration duties. Monitor running process for actions that could be indicative of abnormal programs or executables running upon logon.
Network Logon Script
T1037.003
https://attack.mitre.org/techniques/T1037/003
Windows
Persistence, Privilege Escalation
Adversaries may use network logon scripts automatically executed at logon initialization to establish persistence. Network logon scripts can be assigned using Active Directory or Group Policy Objects.(Citation: Petri Logon Script AD) These logon scripts run with the privileges of the user they are assigned to. Dependin...
File: File Creation, File: File Modification, Process: Process Creation, Command: Command Execution, Active Directory: Active Directory Object Modification
Monitor logon scripts for unusual access by abnormal users or at abnormal times. Look for files added or modified by unusual accounts outside of normal administration duties. Monitor running process for actions that could be indicative of abnormal programs or executables running upon logon.
RC Scripts
T1037.004
https://attack.mitre.org/techniques/T1037/004
macOS, Linux
Persistence, Privilege Escalation
Adversaries may establish persistence by modifying RC scripts which are executed during a Unix-like system’s startup. These files allow system administrators to map and start custom services at startup for different run levels. RC scripts require root privileges to modify. Adversaries can establish persistence by addi...
File: File Creation, File: File Modification, Process: Process Creation, Command: Command Execution
Monitor for unexpected changes to RC scripts in the `/etc/` directory. Monitor process execution resulting from RC scripts for unusual or unknown applications or behavior. Monitor for `/etc/rc.local` file creation. Although types of RC scripts vary for each Unix-like distribution, several execute `/etc/rc.local` if pr...
Startup Items
T1037.005
https://attack.mitre.org/techniques/T1037/005
macOS
Persistence, Privilege Escalation
Adversaries may use startup items automatically executed at boot initialization to establish persistence. Startup items execute during the final phase of the boot process and contain shell scripts or other executable files along with configuration information used by the system to determine the execution order for all ...
File: File Creation, File: File Modification, Process: Process Creation, Command: Command Execution
The `/Library/StartupItems` folder can be monitored for changes. Similarly, the programs that are actually executed from this mechanism should be checked against a whitelist. Monitor processes that are executed during the bootup process to check for unusual or unknown applications and behavior.
Data from Network Shared Drive
T1039
https://attack.mitre.org/techniques/T1039
Linux, macOS, Windows
Collection
Adversaries may search network shares on computers they have compromised to find files of interest. Sensitive data can be collected from remote systems via shared network drives (host shared directory, network file server, etc.) that are accessible from the current system prior to Exfiltration. Interactive command shel...
File: File Access, Network Share: Network Share Access, Command: Command Execution
Monitor processes and command-line arguments for actions that could be taken to collect files from a network share. Remote access tools with built-in features may interact directly with the Windows API to gather data. Data may also be acquired through Windows system management tools such as [Windows Management Instrume...
Network Sniffing
T1040
https://attack.mitre.org/techniques/T1040
Linux, macOS, Windows, Network
Credential Access, Discovery
Adversaries may sniff network traffic to capture information about an environment, including authentication material passed over the network. Network sniffing refers to using the network interface on a system to monitor or capture information sent over a wired or wireless connection. An adversary may place a network in...
Process: Process Creation, Command: Command Execution
Detecting the events leading up to sniffing network traffic may be the best method of detection. From the host level, an adversary would likely need to perform a [Adversary-in-the-Middle](T1557) attack against other devices on a wired network in order to capture traffic that was not to or from the current compromised s...
Exfiltration Over C2 Channel
T1041
https://attack.mitre.org/techniques/T1041
Linux, macOS, Windows
Exfiltration
Adversaries may steal data by exfiltrating it over an existing command and control channel. Stolen data is encoded into the normal communications channel using the same protocol as command and control communications.
Network Traffic: Network Connection Creation, Network Traffic: Network Traffic Flow, Network Traffic: Network Traffic Content, File: File Access, Command: Command Execution
Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. Analyze packet contents to detect communications that do not follow...
Network Service Scanning
T1046
https://attack.mitre.org/techniques/T1046
Windows, IaaS, Linux, macOS, Containers
Discovery
Adversaries may attempt to get a listing of services running on remote hosts, including those that may be vulnerable to remote software exploitation. Methods to acquire this information include port scans and vulnerability scans using tools that are brought onto a system. Within cloud environments, adversaries may at...
Command: Command Execution, Cloud Service: Cloud Service Enumeration, Network Traffic: Network Traffic Flow
System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained. Normal, benign s...
Windows Management Instrumentation
T1047
https://attack.mitre.org/techniques/T1047
Windows
Execution
Adversaries may abuse Windows Management Instrumentation (WMI) to execute malicious commands and payloads. WMI is an administration feature that provides a uniform environment to access Windows system components. The WMI service enables both local and remote access, though the latter is facilitated by [Remote Services]...
Command: Command Execution, Process: Process Creation, Network Traffic: Network Connection Creation
Monitor network traffic for WMI connections; the use of WMI in environments that do not typically use WMI may be suspect. Perform process monitoring to capture command-line arguments of "wmic" and detect commands that are used to perform remote behavior. (Citation: FireEye WMI 2015)
Exfiltration Over Alternative Protocol
T1048
https://attack.mitre.org/techniques/T1048
Linux, macOS, Windows
Exfiltration
Adversaries may steal data by exfiltrating it over a different protocol than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server. Alternate protocols include FTP, SMTP, HTTP/S, DNS, SMB, or any other network protocol no...
Network Traffic: Network Connection Creation, Network Traffic: Network Traffic Flow, Network Traffic: Network Traffic Content, File: File Access, Command: Command Execution
Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. Analyze packet contents to detect communications that do not follow...
Exfiltration Over Symmetric Encrypted Non-C2 Protocol
T1048.001
https://attack.mitre.org/techniques/T1048/001
Linux, macOS, Windows
Exfiltration
Adversaries may steal data by exfiltrating it over a symmetrically encrypted network protocol other than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server. Symmetric encryption algorithms are those that use shared or t...
Network Traffic: Network Connection Creation, Network Traffic: Network Traffic Flow, Network Traffic: Network Traffic Content, File: File Access, Command: Command Execution
Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious.(Citation: University of Birmingham C2) Artifacts and evidence of ...
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
T1048.002
https://attack.mitre.org/techniques/T1048/002
Linux, macOS, Windows
Exfiltration
Adversaries may steal data by exfiltrating it over an asymmetrically encrypted network protocol other than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server. Asymmetric encryption algorithms are those that use differen...
Network Traffic: Network Connection Creation, Network Traffic: Network Traffic Flow, Network Traffic: Network Traffic Content, File: File Access, Command: Command Execution
Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious.(Citation: University of Birmingham C2)
Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol
T1048.003
https://attack.mitre.org/techniques/T1048/003
Linux, macOS, Windows
Exfiltration
Adversaries may steal data by exfiltrating it over an un-encrypted network protocol other than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server. Adversaries may opt to obfuscate this data, without the use of encryptio...
Network Traffic: Network Connection Creation, Network Traffic: Network Traffic Flow, Network Traffic: Network Traffic Content, File: File Access, Command: Command Execution
Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. Analyze packet contents to detect communications that do not follow...
System Network Connections Discovery
T1049
https://attack.mitre.org/techniques/T1049
Windows, IaaS, Linux, macOS
Discovery
Adversaries may attempt to get a listing of network connections to or from the compromised system they are currently accessing or from remote systems by querying for information over the network. An adversary who gains access to a system that is part of a cloud-based environment may map out Virtual Private Clouds or ...
Process: Process Creation, Command: Command Execution, Process: OS API Execution
System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained. Monitor processe...
Exfiltration Over Physical Medium
T1052
https://attack.mitre.org/techniques/T1052
Linux, macOS, Windows
Exfiltration
Adversaries may attempt to exfiltrate data via a physical medium, such as a removable drive. In certain circumstances, such as an air-gapped network compromise, exfiltration could occur via a physical medium or device introduced by a user. Such media could be an external hard drive, USB drive, cellular phone, MP3 playe...
Process: Process Creation, File: File Access, Drive: Drive Creation, Command: Command Execution
Monitor file access on removable media. Detect processes that execute when removable media are mounted.
Exfiltration over USB
T1052.001
https://attack.mitre.org/techniques/T1052/001
Linux, macOS, Windows
Exfiltration
Adversaries may attempt to exfiltrate data over a USB connected physical device. In certain circumstances, such as an air-gapped network compromise, exfiltration could occur via a USB device introduced by a user. The USB device could be used as the final exfiltration point or to hop between otherwise disconnected syste...
Process: Process Creation, File: File Access, Drive: Drive Creation, Command: Command Execution
Monitor file access on removable media. Detect processes that execute when removable media are mounted.
Scheduled Task/Job
T1053
https://attack.mitre.org/techniques/T1053
Windows, Linux, macOS, Containers
Execution, Persistence, Privilege Escalation
Adversaries may abuse task scheduling functionality to facilitate initial or recurring execution of malicious code. Utilities exist within all major operating systems to schedule programs or scripts to be executed at a specified date and time. A task can also be scheduled on a remote system, provided the proper authent...
File: File Creation, Container: Container Creation, Scheduled Job: Scheduled Job Creation, Command: Command Execution, File: File Modification, Process: Process Creation
Monitor scheduled task creation from common utilities using command-line invocation. Legitimate scheduled tasks may be created during installation of new software or through system administration functions. Look for changes to tasks that do not correlate with known software, patch cycles, etc. Suspicious program exec...
At (Linux)
T1053.001
https://attack.mitre.org/techniques/T1053/001
Linux
Execution, Persistence, Privilege Escalation
Adversaries may abuse the [at](S0110) utility to perform task scheduling for initial, recurring, or future execution of malicious code. The [at](S0110) command within Linux operating systems enables administrators to schedule tasks.(Citation: Kifarunix - Task Scheduling in Linux) An adversary may use [at](S0110) in Li...
Scheduled Job: Scheduled Job Creation, Command: Command Execution, Process: Process Creation
Monitor scheduled task creation using command-line invocation. Legitimate scheduled tasks may be created during installation of new software or through system administration functions. Look for changes to tasks that do not correlate with known software, patch cycles, etc. Review all jobs using the `atq` command and e...
At (Windows)
T1053.002
https://attack.mitre.org/techniques/T1053/002
Windows
Execution, Persistence, Privilege Escalation
Adversaries may abuse the `at.exe` utility to perform task scheduling for initial or recurring execution of malicious code. The [at](S0110) utility exists as an executable within Windows for scheduling tasks at a specified time and date. Using [at](S0110) requires that the Task Scheduler service be running, and the use...
Scheduled Job: Scheduled Job Creation, Command: Command Execution, File: File Modification, Process: Process Creation
Monitor process execution from the svchost.exe in Windows 10 and the Windows Task Scheduler taskeng.exe for older versions of Windows. (Citation: Twitter Leoloobeek Scheduled Task) If scheduled tasks are not used for persistence, then the adversary is likely to remove the task when the action is complete. Monitor Windo...
Cron
T1053.003
https://attack.mitre.org/techniques/T1053/003
Linux, macOS
Execution, Persistence, Privilege Escalation
Adversaries may abuse the `cron` utility to perform task scheduling for initial or recurring execution of malicious code.(Citation: 20 macOS Common Tools and Techniques) The `cron` utility is a time-based job scheduler for Unix-like operating systems. The ` crontab` file contains the schedule of cron entries to be run...
Scheduled Job: Scheduled Job Creation, Command: Command Execution, File: File Modification, Process: Process Creation
Monitor scheduled task creation from common utilities using command-line invocation. Legitimate scheduled tasks may be created during installation of new software or through system administration functions. Look for changes to tasks that do not correlate with known software, patch cycles, etc. Suspicious program exe...
Scheduled Task
T1053.005
https://attack.mitre.org/techniques/T1053/005
Windows
Execution, Persistence, Privilege Escalation
Adversaries may abuse the Windows Task Scheduler to perform task scheduling for initial or recurring execution of malicious code. There are multiple ways to access the Task Scheduler in Windows. The `schtasks` can be run directly on the command line, or the Task Scheduler can be opened through the GUI within the Admini...
Scheduled Job: Scheduled Job Creation, Command: Command Execution, File: File Modification, Process: Process Creation
Monitor process execution from the `svchost.exe` in Windows 10 and the Windows Task Scheduler `taskeng.exe` for older versions of Windows. (Citation: Twitter Leoloobeek Scheduled Task) If scheduled tasks are not used for persistence, then the adversary is likely to remove the task when the action is complete. Monitor W...
Systemd Timers
T1053.006
https://attack.mitre.org/techniques/T1053/006
Linux
Execution, Persistence, Privilege Escalation
Adversaries may abuse systemd timers to perform task scheduling for initial or recurring execution of malicious code. Systemd timers are unit files with file extension `.timer` that control services. Timers can be set to run on a calendar event or after a time span relative to a starting point. They can be used as an a...
Scheduled Job: Scheduled Job Creation, Command: Command Execution, File: File Modification, Process: Process Creation
Systemd timer unit files may be detected by auditing file creation and modification events within the `/etc/systemd/system`, `/usr/lib/systemd/system/`, and `~/.config/systemd/user/` directories, as well as associated symbolic links. Suspicious processes or scripts spawned in this manner will have a parent process of ‘...
Container Orchestration Job
T1053.007
https://attack.mitre.org/techniques/T1053/007
Containers
Execution, Persistence, Privilege Escalation
Adversaries may abuse task scheduling functionality provided by container orchestration tools such as Kubernetes to schedule deployment of containers configured to execute malicious code. Container orchestration jobs run these automated tasks at a specific date and time, similar to cron jobs on a Linux system. Deployme...
Scheduled Job: Scheduled Job Creation, Container: Container Creation, File: File Creation
Monitor for the anomalous creation of scheduled jobs in container orchestration environments. Use logging agents on Kubernetes nodes and retrieve logs from sidecar proxies for application and resource pods to monitor malicious container orchestration job deployments.
Process Injection
T1055
https://attack.mitre.org/techniques/T1055
Linux, macOS, Windows
Defense Evasion, Privilege Escalation
Adversaries may inject code into processes in order to evade process-based defenses as well as possibly elevate privileges. Process injection is a method of executing arbitrary code in the address space of a separate live process. Running code in the context of another process may allow access to the process's memory, ...
Process: Process Modification, Module: Module Load, Process: OS API Execution, Process: Process Access, File: File Modification, File: File Metadata
Monitoring Windows API calls indicative of the various types of code injection may generate a significant amount of data and may not be directly useful for defense unless collected under specific circumstances for known bad sequences of calls, since benign use of API functions may be common and difficult to distinguish...
Dynamic-link Library Injection
T1055.001
https://attack.mitre.org/techniques/T1055/001
Windows
Defense Evasion, Privilege Escalation
Adversaries may inject dynamic-link libraries (DLLs) into processes in order to evade process-based defenses as well as possibly elevate privileges. DLL injection is a method of executing arbitrary code in the address space of a separate live process. DLL injection is commonly performed by writing the path to a DLL ...
Process: Process Modification, Module: Module Load, Process: OS API Execution, Process: Process Access
Monitoring Windows API calls indicative of the various types of code injection may generate a significant amount of data and may not be directly useful for defense unless collected under specific circumstances for known bad sequences of calls, since benign use of API functions may be common and difficult to distinguish...
Portable Executable Injection
T1055.002
https://attack.mitre.org/techniques/T1055/002
Windows
Defense Evasion, Privilege Escalation
Adversaries may inject portable executables (PE) into processes in order to evade process-based defenses as well as possibly elevate privileges. PE injection is a method of executing arbitrary code in the address space of a separate live process. PE injection is commonly performed by copying code (perhaps without a f...
Process: Process Modification, Process: OS API Execution, Process: Process Access
Monitoring Windows API calls indicative of the various types of code injection may generate a significant amount of data and may not be directly useful for defense unless collected under specific circumstances for known bad sequences of calls, since benign use of API functions may be common and difficult to distinguish...
Thread Execution Hijacking
T1055.003
https://attack.mitre.org/techniques/T1055/003
Windows
Defense Evasion, Privilege Escalation
Adversaries may inject malicious code into hijacked processes in order to evade process-based defenses as well as possibly elevate privileges. Thread Execution Hijacking is a method of executing arbitrary code in the address space of a separate live process. Thread Execution Hijacking is commonly performed by suspend...
Process: Process Modification, Process: OS API Execution, Process: Process Access
Monitoring Windows API calls indicative of the various types of code injection may generate a significant amount of data and may not be directly useful for defense unless collected under specific circumstances for known bad sequences of calls, since benign use of API functions may be common and difficult to distinguish...
Asynchronous Procedure Call
T1055.004
https://attack.mitre.org/techniques/T1055/004
Windows
Defense Evasion, Privilege Escalation
Adversaries may inject malicious code into processes via the asynchronous procedure call (APC) queue in order to evade process-based defenses as well as possibly elevate privileges. APC injection is a method of executing arbitrary code in the address space of a separate live process. APC injection is commonly perform...
Process: Process Modification, Process: OS API Execution, Process: Process Access
Monitoring Windows API calls indicative of the various types of code injection may generate a significant amount of data and may not be directly useful for defense unless collected under specific circumstances for known bad sequences of calls, since benign use of API functions may be common and difficult to distinguish...
Thread Local Storage
T1055.005
https://attack.mitre.org/techniques/T1055/005
Windows
Defense Evasion, Privilege Escalation
Adversaries may inject malicious code into processes via thread local storage (TLS) callbacks in order to evade process-based defenses as well as possibly elevate privileges. TLS callback injection is a method of executing arbitrary code in the address space of a separate live process. TLS callback injection involves...
Process: Process Modification, Process: OS API Execution, Process: Process Access
Monitoring Windows API calls indicative of the various types of code injection may generate a significant amount of data and may not be directly useful for defense unless collected under specific circumstances for known bad sequences of calls, since benign use of API functions may be common and difficult to distinguish...
Ptrace System Calls
T1055.008
https://attack.mitre.org/techniques/T1055/008
Linux
Defense Evasion, Privilege Escalation
Adversaries may inject malicious code into processes via ptrace (process trace) system calls in order to evade process-based defenses as well as possibly elevate privileges. Ptrace system call injection is a method of executing arbitrary code in the address space of a separate live process. Ptrace system call injecti...
Process: Process Modification, Process: OS API Execution, Process: Process Access
Monitoring for Linux specific calls such as the ptrace system call should not generate large amounts of data due to their specialized nature, and can be a very effective method to detect some of the common process injection methods.(Citation: ArtOfMemoryForensics) (Citation: GNU Acct) (Citation: RHEL auditd) (Citati...
Proc Memory
T1055.009
https://attack.mitre.org/techniques/T1055/009
Linux
Defense Evasion, Privilege Escalation
Adversaries may inject malicious code into processes via the /proc filesystem in order to evade process-based defenses as well as possibly elevate privileges. Proc memory injection is a method of executing arbitrary code in the address space of a separate live process. Proc memory injection involves enumerating the m...
File: File Modification
File system monitoring can determine if /proc files are being modified. Users should not have permission to modify these in most cases. Analyze process behavior to determine if a process is performing actions it usually does not, such as opening network connections, reading files, or other suspicious actions that cou...
Extra Window Memory Injection
T1055.011
https://attack.mitre.org/techniques/T1055/011
Windows
Defense Evasion, Privilege Escalation
Adversaries may inject malicious code into process via Extra Window Memory (EWM) in order to evade process-based defenses as well as possibly elevate privileges. EWM injection is a method of executing arbitrary code in the address space of a separate live process. Before creating a window, graphical Windows-based pro...
Process: OS API Execution
Monitor for API calls related to enumerating and manipulating EWM such as GetWindowLong (Citation: Microsoft GetWindowLong function) and SetWindowLong (Citation: Microsoft SetWindowLong function). Malware associated with this technique have also used SendNotifyMessage (Citation: Microsoft SendNotifyMessage function) to...
Process Hollowing
T1055.012
https://attack.mitre.org/techniques/T1055/012
Windows
Defense Evasion, Privilege Escalation
Adversaries may inject malicious code into suspended and hollowed processes in order to evade process-based defenses. Process hollowing is a method of executing arbitrary code in the address space of a separate live process. Process hollowing is commonly performed by creating a process in a suspended state then unma...
Process: Process Modification, Process: OS API Execution, Process: Process Access
Monitoring Windows API calls indicative of the various types of code injection may generate a significant amount of data and may not be directly useful for defense unless collected under specific circumstances for known bad sequences of calls, since benign use of API functions may be common and difficult to distinguish...
Process Doppelgänging
T1055.013
https://attack.mitre.org/techniques/T1055/013
Windows
Defense Evasion, Privilege Escalation
Adversaries may inject malicious code into process via process doppelgänging in order to evade process-based defenses as well as possibly elevate privileges. Process doppelgänging is a method of executing arbitrary code in the address space of a separate live process. Windows Transactional NTFS (TxF) was introduced i...
Process: OS API Execution, File: File Metadata
Monitor and analyze calls to `CreateTransaction`, `CreateFileTransacted`, `RollbackTransaction`, and other rarely used functions indicative of TxF activity. Process Doppelgänging also invokes an outdated and undocumented implementation of the Windows process loader via calls to `NtCreateProcessEx` and `NtCreateThreadEx...
VDSO Hijacking
T1055.014
https://attack.mitre.org/techniques/T1055/014
Linux
Defense Evasion, Privilege Escalation
Adversaries may inject malicious code into processes via VDSO hijacking in order to evade process-based defenses as well as possibly elevate privileges. Virtual dynamic shared object (vdso) hijacking is a method of executing arbitrary code in the address space of a separate live process. VDSO hijacking involves redir...
Process: OS API Execution, Module: Module Load
Monitor for malicious usage of system calls, such as ptrace and mmap, that can be used to attach to, manipulate memory, then redirect a processes' execution path. Monitoring for Linux specific calls such as the ptrace system call should not generate large amounts of data due to their specialized nature, and can be a ve...
Input Capture
T1056
https://attack.mitre.org/techniques/T1056
Linux, macOS, Windows, Network
Collection, Credential Access
Adversaries may use methods of capturing user input to obtain credentials or collect information. During normal system usage, users often provide credentials to various different locations, such as login pages/portals or system dialog boxes. Input capture mechanisms may be transparent to the user (e.g. [Credential API ...
Windows Registry: Windows Registry Key Modification, Driver: Driver Load, Process: OS API Execution, Process: Process Creation, File: File Modification, Process: Process Metadata
Detection may vary depending on how input is captured but may include monitoring for certain Windows API calls (e.g. `SetWindowsHook`, `GetKeyState`, and `GetAsyncKeyState`)(Citation: Adventures of a Keystroke), monitoring for malicious instances of [Command and Scripting Interpreter](T1059), and ensuring no unauthoriz...
Keylogging
T1056.001
https://attack.mitre.org/techniques/T1056/001
Windows, macOS, Linux, Network
Collection, Credential Access
Adversaries may log user keystrokes to intercept credentials as the user types them. Keylogging is likely to be used to acquire credentials for new access opportunities when [OS Credential Dumping](T1003) efforts are not effective, and may require an adversary to intercept keystrokes on a system for a substantial perio...
Windows Registry: Windows Registry Key Modification, Driver: Driver Load, Process: OS API Execution
Keyloggers may take many forms, possibly involving modification to the Registry and installation of a driver, setting a hook, or polling to intercept keystrokes. Commonly used API calls include `SetWindowsHook`, `GetKeyState`, and `GetAsyncKeyState`.(Citation: Adventures of a Keystroke) Monitor the Registry and file sy...
GUI Input Capture
T1056.002
https://attack.mitre.org/techniques/T1056/002
macOS, Windows, Linux
Collection, Credential Access
Adversaries may mimic common operating system GUI components to prompt users for credentials with a seemingly legitimate prompt. When programs are executed that need additional privileges than are present in the current user context, it is common for the operating system to prompt the user for proper credentials to aut...
Script: Script Execution, Command: Command Execution, Process: Process Creation
Monitor process execution for unusual programs as well as malicious instances of [Command and Scripting Interpreter](T1059) that could be used to prompt users for credentials. For example, command/script history including abnormal parameters (such as requests for credentials and/or strings related to creating password ...
Web Portal Capture
T1056.003
https://attack.mitre.org/techniques/T1056/003
Linux, macOS, Windows
Collection, Credential Access
Adversaries may install code on externally facing portals, such as a VPN login page, to capture and transmit credentials of users who attempt to log into the service. For example, a compromised login page may log provided user credentials before logging the user in to the service. This variation on input capture may b...
File: File Modification
File monitoring may be used to detect changes to files in the Web directory for organization login pages that do not match with authorized updates to the Web server's content.
Credential API Hooking
T1056.004
https://attack.mitre.org/techniques/T1056/004
Windows
Collection, Credential Access
Adversaries may hook into Windows application programming interface (API) functions to collect user credentials. Malicious hooking mechanisms may capture API calls that include parameters that reveal user authentication credentials.(Citation: Microsoft TrojanSpy:Win32/Ursnif.gen!I Sept 2017) Unlike [Keylogging](T1056.0...
Process: OS API Execution, Process: Process Metadata
Monitor for calls to the `SetWindowsHookEx` and `SetWinEventHook` functions, which install a hook procedure.(Citation: Microsoft Hook Overview)(Citation: Volatility Detecting Hooks Sept 2012) Also consider analyzing hook chains (which hold pointers to hook procedures for each type of hook) using tools(Citation: Volatil...
Process Discovery
T1057
https://attack.mitre.org/techniques/T1057
Linux, macOS, Windows
Discovery
Adversaries may attempt to get information about running processes on a system. Information obtained could be used to gain an understanding of common software/applications running on systems within the network. Adversaries may use the information from [Process Discovery](T1057) during automated discovery to shape follo...
Process: Process Creation, Command: Command Execution, Process: OS API Execution
System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained. Normal, benign s...
Command and Scripting Interpreter
T1059
https://attack.mitre.org/techniques/T1059
Linux, macOS, Windows, Network
Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries. These interfaces and languages provide ways of interacting with computer systems and are a common feature across many different platforms. Most systems come with some built-in command-line interface and scripting capabiliti...
Command: Command Execution, Process: Process Creation, Module: Module Load, Script: Script Execution
Command-line and scripting activities can be captured through proper logging of process execution with command-line arguments. This information can be useful in gaining additional insight to adversaries' actions through how they use native processes or custom tools. Also monitor for loading of modules associated with s...
PowerShell
T1059.001
https://attack.mitre.org/techniques/T1059/001
Windows
Execution
Adversaries may abuse PowerShell commands and scripts for execution. PowerShell is a powerful interactive command-line interface and scripting environment included in the Windows operating system. (Citation: TechNet PowerShell) Adversaries can use PowerShell to perform a number of actions, including discovery of inform...
Command: Command Execution, Module: Module Load, Process: Process Creation, Script: Script Execution
If proper execution policy is set, adversaries will likely be able to define their own execution policy if they obtain administrator or system access, either through the Registry or at the command line. This change in policy on a system may be a way to detect malicious use of PowerShell. If PowerShell is not used in an...
AppleScript
T1059.002
https://attack.mitre.org/techniques/T1059/002
macOS
Execution
Adversaries may abuse AppleScript for execution. AppleScript is a macOS scripting language designed to control applications and parts of the OS via inter-application messages called AppleEvents.(Citation: Apple AppleScript) These AppleEvent messages can be sent independently or easily scripted with AppleScript. These e...
Command: Command Execution, Process: Process Creation, Process: OS API Execution
Monitor for execution of AppleScript through `osascript` and usage of the `NSAppleScript` and `OSAScript` APIs that may be related to other suspicious behavior occurring on the system. Scripts are likely to perform actions with various effects on a system that may generate events, depending on the types of monitoring u...
Windows Command Shell
T1059.003
https://attack.mitre.org/techniques/T1059/003
Windows
Execution
Adversaries may abuse the Windows command shell for execution. The Windows command shell ([cmd](S0106)) is the primary command prompt on Windows systems. The Windows command prompt can be used to control almost any aspect of a system, with various permission levels required for different subsets of commands. The comman...
Command: Command Execution, Process: Process Creation
Usage of the Windows command shell may be common on administrator, developer, or power user systems depending on job function. If scripting is restricted for normal users, then any attempt to enable scripts running on a system would be considered suspicious. If scripts are not commonly used on a system, but enabled, sc...
End of preview.
README.md exists but content is empty.
Downloads last month
83

Space using ErebusTN/The-Ultimate-CyberSecurity-Dataset-Collection 1