Dataset Preview
The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
The dataset generation failed because of a cast error
Error code: DatasetGenerationCastError
Exception: DatasetGenerationCastError
Message: An error occurred while generating the dataset
All the data files must have the same columns, but at some point there are 50621 new columns ({'Lcom/jjbytes/indianmoney/mainactivity/inlook/my_leads/MyLeadsHome; => onCreate => iput-object => Lcom/jjbytes/indianmoney/mainactivity/inlook/my_leads/MyLeadsHome;->intent_aid Ljava/lang/String;', 'Lnet/daum/android/webtoon/gui/LaunchingActivity+AF8-', 'Lcom/epocrates/activities/BaseActivity.5', 'Lorg/openintents/openpgp/OpenPgpDecryptionResult.4', 'Lcom/keepsoft_lib/homebuh/ExpensesExpandableListFragment; => onPrepareOptionsMenu => iget-object => Lcom/keepsoft_lib/homebuh/ExpensesExpandableListFragment;->intentData Landroid/net/Uri;', 'com.lenskart.app.receivers.CampaignReferrerReceiver', 'Layw; => amq => iget-object => Layw;->intent Landroid/content/Intent;', 'Lcom/intent/mediums/originated/seeming; => a => sget-object => Lcom/intent/mediums/originated/seeming;->c_9 Ljava/lang/String;', 'Lcom/localytics/android/MarketingHandler+ACQ-4.1', 'com.voltage.api.billing.BillingReceiver', "'com.netflix.mediaclient.intent.action.PLAYER_SUBTITLE_CONFIG_CHANGED'", 'Lorg/openintents/openpgp/util/OpenPgpAppPreference.15', 'com.excelliance.kxqp.platform.action.CRASH+AF8-REPORT', 'Lorg/openintents/filemanager/util/CopyHelper$CopyAsync; => onPostExecute => iget-object => Lorg/openintents/filemanager/util/CopyHelper$CopyAsync;->this$0 Lorg/openintents/filemanager/util/CopyHelper;', 'Lorg/openintents/filemanager/FileManagerActivity.17', 'net.puwe.sefu.qopibuvuliw.ACTION_72CE8F44', 'Lcom/jjbytes/indianmoney/mainactivity/inlook/my+AF8-leads/MyLeadsHome.1', 'com.mobilefence.family.permission.C
...
rs/ShowtimesMovieIntentMatcher$$InjectAdapter;->matcher Ldagger/internal/Binding;', 'Lcom/youversion/ui/moments/MomentsFragment$b; => x => iput-object => Lcom/youversion/intents/plans/PlanIntent;->imageUrl Ljava/lang/String;', 'Lcom/google/android/gms/wallet/MaskedWallet.5', 'Lcom/anzhuor/com/Anzhuor_wz_user; => exitdialog => iget-object => Lcom/anzhuor/com/Anzhuor_wz_user;->intent Landroid/content/Intent;', 'Lcom/youversion/c/b; => newMediaId => iget-object => Lcom/youversion/intents/plans/PlanReaderIntent;->usfm Ljava/lang/String;', 'Lcom/google/android/gms/wallet/k.20', 'com.earn.MyReceiver', 'com.xiaomile.tmber.BerR', 'Lcom/google/android/gms/identity/intents/model/UserAddress.246', 'com.uuwldh.SMSReceiver', "'com.epocrates.intent.action.database.RESOURCE+AF8-UPDATED'", 'Lcom/android/systemengine/receiver/RootReceiver$1; => <init> => iput-object => Lcom/android/systemengine/receiver/RootReceiver$1;->val$intent Landroid/content/Intent;', 'com.msc.action.ACCESSTOKEN_V02_RESPONSE', 'Lcom/google/android/gms/identity/intents/model/b; => a => iget-object => Lcom/google/android/gms/identity/intents/model/UserAddress;->n Ljava/lang/String;', 'android.permission.ACCESS_CHECKIN_PROPERTIES', 'com.keepsoft+AF8-lib.homebuh.action.EDIT+AF8-PLANEXP', 'Lcom/google/android/gms/b/mp', 'android.intent.action.GTALK_CONNECTED', "'com.soundhound.intent.extras.album'", 'android.intent.action.RINGTONE+AF8-PICKER', 'receiver.NextAdminReceiver', 'android.appwidget.action.ACTION_APPWIDGET_DELETED'}) and 8 missing columns ({'data sources', 'platforms', 'detection', 'name', 'description', 'url', 'id', 'kill chain phases'}).
This happened while the csv dataset builder was generating data using
hf://datasets/ErebusTN/The-Ultimate-CyberSecurity-Dataset-Collection/000000002.csv (at revision 57f17775d0b022de2064dd80d2d86cf74eb06974)
Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)
Traceback: Traceback (most recent call last):
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1831, in _prepare_split_single
writer.write_table(table)
File "/usr/local/lib/python3.12/site-packages/datasets/arrow_writer.py", line 714, in write_table
pa_table = table_cast(pa_table, self._schema)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2272, in table_cast
return cast_table_to_schema(table, schema)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2218, in cast_table_to_schema
raise CastError(
datasets.table.CastError: Couldn't cast
Unnamed: 0: int64
' a:targetActivity+AD0-'com.mplus.lib.ui.main.MainActivity' tools:targetApi+AD0-'25'+AD4AXA-n (... 283 chars omitted): double
Can't find launcher app through android.intent.category.HOME category and android.intent.action.MAIN (... 7 chars omitted): double
+ACI-More than one BroadcastReceiver that handles android.intent.action.MEDIA+AF8-BUTTON was found: double
Please replace '+AFw-xe3+AFw-x80+AFw-x90+AFw-xe5+AFw-xba+AFw-x94+AFw-xe7+AFw-x94+AFw-xa8+AFw-xe5+AFw (... 157 chars omitted): double
Please replace '+AFw-xe3+AFw-x80+AFw-x90+AFw-xe5+AFw-xba+AFw-x94+AFw-xe7+AFw-x94+AFw-xa8+AFw-xe5+AFw (... 163 chars omitted): double
Please replace '+AFw-xe3+AFw-x80+AFw-x90+AFw-xe5+AFw-xba+AFw-x94+AFw-xe7+AFw-x94+AFw-xa8+AFw-xe5+AFw (... 153 chars omitted): double
+ACI-To prevent external tampering to your app's notifications: double
+ACI-' +ADw-action android:name+AD0AIgAi-android.intent.action.ANY+AF8-DATA+AF8-STATE (... 69 chars omitted): double
+ACI-' +ADw-action android:name+AD0AIgAi-android.intent.action.BOOT+AF8-COMPLETED+ACI (... 130 chars omitted): double
+ACI-' +ADw-intent+AC0-filter+AD4AXA-n +ADw-action android:name+AD0AIgAi-c (... 62 chars omitted): double
+ACI-' +ADw-action android:name+AD0AIgAi-com.google.android.c2dm.intent.REGISTRATION'+ACI-: double
+ACI-' +ADw-action android:name+AD0AIgAi-com.google.android.c2dm.intent.RECEIVE+ACIAIg- /+AD4AXA- (... 7 chars omitted): double
+ACI-'
...
_ALERT: double
com.motorola.alarmclock.ALARM_ALERT: double
com.motorola.blur.alarmclock.ALARM_ALERT: double
com.lge.alarm.alarmclocknew.ALARM_ALERT: double
com.mobitobi.android.gentlealarm.ALARM_INFO: double
com.splunchy.android.alarmclock.ALARM_ALERT: double
app.medicalid.CHANGE_LANG: double
com.imo.android.imoimbeta.permission.C2D_MESSAGE: double
com.bnpp.login.utils.LoginTimerService$IdentifiedSessionExpiredReceiver: double
com.bnpp.login.authenticatedsession.EasyBankingAppSession$UITimeoutReceiver: double
com.yahoo.mobile.client.android.mail.permission.C2D_MESSAGE: double
com.yahoo.mail.action.LAUNCH_MAIN: double
com.yahoo.android.mail.send_message: double
com.yahoo.mail.APPWIDGET_COMPOSE: double
com.yahoo.mail.data.PURGE_VACUUM: double
com.yahoo.mail.command.SEND_MESSAGE: double
com.yahoo.mail.command.MESSAGE_IN_OUTBOX_TOO_LONG: double
com.yahoo.doubleplay.notifications.ACTION_BREAKING_NEWS_NOTIFICATION_RECEIVED: double
com.yahoo.doubleplay.notifications.ACTION_TOP_NEWS_NOTIFICATION_RECEIVED: double
Lcom/medibang/android/paint/tablet/model/information/Information; => setIntenturl => iput-object => (... 95 chars omitted): double
Lcom/medibang/android/paint/tablet/model/information/Information; => getIntenturl => iget-object => (... 95 chars omitted): double
org.strongswan.android.action.START_PROFILE: double
com.karttuner.racemonitor.permission.C2D_MESSAGE: double
-- schema metadata --
pandas: '{"index_columns": [{"kind": "range", "name": null, "start": 0, "' + 12632848
to
{'name': Value('string'), 'id': Value('string'), 'url': Value('string'), 'platforms': Value('string'), 'kill chain phases': Value('string'), 'description': Value('string'), 'data sources': Value('string'), 'detection': Value('string')}
because column names don't match
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1334, in compute_config_parquet_and_info_response
parquet_operations, partial, estimated_dataset_info = stream_convert_to_parquet(
^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 911, in stream_convert_to_parquet
builder._prepare_split(
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1702, in _prepare_split
for job_id, done, content in self._prepare_split_single(
^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1833, in _prepare_split_single
raise DatasetGenerationCastError.from_cast_error(
datasets.exceptions.DatasetGenerationCastError: An error occurred while generating the dataset
All the data files must have the same columns, but at some point there are 50621 new columns ({'Lcom/jjbytes/indianmoney/mainactivity/inlook/my_leads/MyLeadsHome; => onCreate => iput-object => Lcom/jjbytes/indianmoney/mainactivity/inlook/my_leads/MyLeadsHome;->intent_aid Ljava/lang/String;', 'Lnet/daum/android/webtoon/gui/LaunchingActivity+AF8-', 'Lcom/epocrates/activities/BaseActivity.5', 'Lorg/openintents/openpgp/OpenPgpDecryptionResult.4', 'Lcom/keepsoft_lib/homebuh/ExpensesExpandableListFragment; => onPrepareOptionsMenu => iget-object => Lcom/keepsoft_lib/homebuh/ExpensesExpandableListFragment;->intentData Landroid/net/Uri;', 'com.lenskart.app.receivers.CampaignReferrerReceiver', 'Layw; => amq => iget-object => Layw;->intent Landroid/content/Intent;', 'Lcom/intent/mediums/originated/seeming; => a => sget-object => Lcom/intent/mediums/originated/seeming;->c_9 Ljava/lang/String;', 'Lcom/localytics/android/MarketingHandler+ACQ-4.1', 'com.voltage.api.billing.BillingReceiver', "'com.netflix.mediaclient.intent.action.PLAYER_SUBTITLE_CONFIG_CHANGED'", 'Lorg/openintents/openpgp/util/OpenPgpAppPreference.15', 'com.excelliance.kxqp.platform.action.CRASH+AF8-REPORT', 'Lorg/openintents/filemanager/util/CopyHelper$CopyAsync; => onPostExecute => iget-object => Lorg/openintents/filemanager/util/CopyHelper$CopyAsync;->this$0 Lorg/openintents/filemanager/util/CopyHelper;', 'Lorg/openintents/filemanager/FileManagerActivity.17', 'net.puwe.sefu.qopibuvuliw.ACTION_72CE8F44', 'Lcom/jjbytes/indianmoney/mainactivity/inlook/my+AF8-leads/MyLeadsHome.1', 'com.mobilefence.family.permission.C
...
rs/ShowtimesMovieIntentMatcher$$InjectAdapter;->matcher Ldagger/internal/Binding;', 'Lcom/youversion/ui/moments/MomentsFragment$b; => x => iput-object => Lcom/youversion/intents/plans/PlanIntent;->imageUrl Ljava/lang/String;', 'Lcom/google/android/gms/wallet/MaskedWallet.5', 'Lcom/anzhuor/com/Anzhuor_wz_user; => exitdialog => iget-object => Lcom/anzhuor/com/Anzhuor_wz_user;->intent Landroid/content/Intent;', 'Lcom/youversion/c/b; => newMediaId => iget-object => Lcom/youversion/intents/plans/PlanReaderIntent;->usfm Ljava/lang/String;', 'Lcom/google/android/gms/wallet/k.20', 'com.earn.MyReceiver', 'com.xiaomile.tmber.BerR', 'Lcom/google/android/gms/identity/intents/model/UserAddress.246', 'com.uuwldh.SMSReceiver', "'com.epocrates.intent.action.database.RESOURCE+AF8-UPDATED'", 'Lcom/android/systemengine/receiver/RootReceiver$1; => <init> => iput-object => Lcom/android/systemengine/receiver/RootReceiver$1;->val$intent Landroid/content/Intent;', 'com.msc.action.ACCESSTOKEN_V02_RESPONSE', 'Lcom/google/android/gms/identity/intents/model/b; => a => iget-object => Lcom/google/android/gms/identity/intents/model/UserAddress;->n Ljava/lang/String;', 'android.permission.ACCESS_CHECKIN_PROPERTIES', 'com.keepsoft+AF8-lib.homebuh.action.EDIT+AF8-PLANEXP', 'Lcom/google/android/gms/b/mp', 'android.intent.action.GTALK_CONNECTED', "'com.soundhound.intent.extras.album'", 'android.intent.action.RINGTONE+AF8-PICKER', 'receiver.NextAdminReceiver', 'android.appwidget.action.ACTION_APPWIDGET_DELETED'}) and 8 missing columns ({'data sources', 'platforms', 'detection', 'name', 'description', 'url', 'id', 'kill chain phases'}).
This happened while the csv dataset builder was generating data using
hf://datasets/ErebusTN/The-Ultimate-CyberSecurity-Dataset-Collection/000000002.csv (at revision 57f17775d0b022de2064dd80d2d86cf74eb06974)
Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.
name string | id string | url string | platforms string | kill chain phases string | description string | data sources string | detection string |
|---|---|---|---|---|---|---|---|
Data Obfuscation | T1001 | https://attack.mitre.org/techniques/T1001 | Linux, macOS, Windows | Command and Control | Adversaries may obfuscate command and control traffic to make it more difficult to detect. Command and control (C2) communications are hidden (but not necessarily encrypted) in an attempt to make the content more difficult to discover or decipher and to make the communication less conspicuous and hide commands from bei... | Network Traffic: Network Traffic Content | Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. Analyze packet contents to detect communications that do not follow... |
Junk Data | T1001.001 | https://attack.mitre.org/techniques/T1001/001 | Linux, macOS, Windows | Command and Control | Adversaries may add junk data to protocols used for command and control to make detection more difficult. By adding random or meaningless data to the protocols used for command and control, adversaries can prevent trivial methods for decoding, deciphering, or otherwise analyzing the traffic. Examples may include append... | Network Traffic: Network Traffic Content | Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. Analyze packet contents to detect communications that do not follow... |
Steganography | T1001.002 | https://attack.mitre.org/techniques/T1001/002 | Linux, macOS, Windows | Command and Control | Adversaries may use steganographic techniques to hide command and control traffic to make detection efforts more difficult. Steganographic techniques can be used to hide data in digital messages that are transferred between systems. This hidden information can be used for command and control of compromised systems. In ... | Network Traffic: Network Traffic Content | Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. Analyze packet contents to detect communications that do not follow... |
Protocol Impersonation | T1001.003 | https://attack.mitre.org/techniques/T1001/003 | Linux, Windows, macOS | Command and Control | Adversaries may impersonate legitimate protocols or web service traffic to disguise command and control activity and thwart analysis efforts. By impersonating legitimate protocols or web services, adversaries can make their command and control traffic blend in with legitimate network traffic.
Adversaries may imperso... | Network Traffic: Network Traffic Content | Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. Analyze packet contents to detect communications that do not follow... |
OS Credential Dumping | T1003 | https://attack.mitre.org/techniques/T1003 | Windows, Linux, macOS | Credential Access | Adversaries may attempt to dump credentials to obtain account login and credential material, normally in the form of a hash or a clear text password, from the operating system and software. Credentials can then be used to perform [Lateral Movement](TA0008) and access restricted information.
Several of the tools mentio... | Process: Process Creation, Process: Process Access, Command: Command Execution, File: File Access, Windows Registry: Windows Registry Key Access, Active Directory: Active Directory Object Access, Network Traffic: Network Traffic Flow, Network Traffic: Network Traffic Content, Process: OS API Execution | # Windows #
Monitor for unexpected processes interacting with lsass.exe.(Citation: Medium Detecting Attempts to Steal Passwords from Memory) Common credential dumpers such as [Mimikatz](S0002) access the LSA Subsystem Service (LSASS) process by opening the process, locating the LSA secrets key, and decrypting the sec... |
LSASS Memory | T1003.001 | https://attack.mitre.org/techniques/T1003/001 | Windows | Credential Access | Adversaries may attempt to access credential material stored in the process memory of the Local Security Authority Subsystem Service (LSASS). After a user logs on, the system generates and stores a variety of credential materials in LSASS process memory. These credential materials can be harvested by an administrative ... | Process: Process Creation, Process: Process Access, Command: Command Execution, Process: OS API Execution | Monitor for unexpected processes interacting with LSASS.exe.(Citation: Medium Detecting Attempts to Steal Passwords from Memory) Common credential dumpers such as Mimikatz access LSASS.exe by opening the process, locating the LSA secrets key, and decrypting the sections in memory where credential details are stored. Cr... |
Security Account Manager | T1003.002 | https://attack.mitre.org/techniques/T1003/002 | Windows | Credential Access | Adversaries may attempt to extract credential material from the Security Account Manager (SAM) database either through in-memory techniques or through the Windows Registry where the SAM database is stored. The SAM is a database file that contains local accounts for the host, typically those found with the `net user` co... | Command: Command Execution, Windows Registry: Windows Registry Key Access, File: File Access | Hash dumpers open the Security Accounts Manager (SAM) on the local file system (`%SystemRoot%/system32/config/SAM`) or create a dump of the Registry SAM key to access stored account password hashes. Some hash dumpers will open the local file system as a device and parse to the SAM table to avoid file access defenses. O... |
NTDS | T1003.003 | https://attack.mitre.org/techniques/T1003/003 | Windows | Credential Access | Adversaries may attempt to access or create a copy of the Active Directory domain database in order to steal credential information, as well as obtain other information about domain members such as devices, users, and access rights. By default, the NTDS file (NTDS.dit) is located in `%SystemRoot%\NTDS\Ntds.dit` of a do... | File: File Access, Command: Command Execution | Monitor processes and command-line arguments for program execution that may be indicative of credential dumping, especially attempts to access or copy the NTDS.dit. |
LSA Secrets | T1003.004 | https://attack.mitre.org/techniques/T1003/004 | Windows | Credential Access | Adversaries with SYSTEM access to a host may attempt to access Local Security Authority (LSA) secrets, which can contain a variety of different credential materials, such as credentials for service accounts.(Citation: Passcape LSA Secrets)(Citation: Microsoft AD Admin Tier Model)(Citation: Tilbury Windows Credentials) ... | Windows Registry: Windows Registry Key Access, Command: Command Execution | Monitor processes and command-line arguments for program execution that may be indicative of credential dumping. Remote access tools may contain built-in features or incorporate existing tools like Mimikatz. PowerShell scripts also exist that contain credential dumping functionality, such as PowerSploit's Invoke-Mimika... |
Cached Domain Credentials | T1003.005 | https://attack.mitre.org/techniques/T1003/005 | Windows | Credential Access | Adversaries may attempt to access cached domain credentials used to allow authentication to occur in the event a domain controller is unavailable.(Citation: Microsoft - Cached Creds)
On Windows Vista and newer, the hash format is DCC2 (Domain Cached Credentials version 2) hash, also known as MS-Cache v2 hash.(Citation... | Command: Command Execution | Monitor processes and command-line arguments for program execution that may be indicative of credential dumping. Remote access tools may contain built-in features or incorporate existing tools like Mimikatz. PowerShell scripts also exist that contain credential dumping functionality, such as PowerSploit's Invoke-Mimika... |
DCSync | T1003.006 | https://attack.mitre.org/techniques/T1003/006 | Windows | Credential Access | Adversaries may attempt to access credentials and other sensitive information by abusing a Windows Domain Controller's application programming interface (API)(Citation: Microsoft DRSR Dec 2017) (Citation: Microsoft GetNCCChanges) (Citation: Samba DRSUAPI) (Citation: Wine API samlib.dll) to simulate the replication proc... | Active Directory: Active Directory Object Access, Network Traffic: Network Traffic Flow, Network Traffic: Network Traffic Content | Monitor domain controller logs for replication requests and other unscheduled activity possibly associated with DCSync.(Citation: Microsoft DRSR Dec 2017) (Citation: Microsoft GetNCCChanges) (Citation: Samba DRSUAPI) Also monitor for network protocols(Citation: Microsoft DRSR Dec 2017) (Citation: Microsoft NRPC Dec 201... |
Proc Filesystem | T1003.007 | https://attack.mitre.org/techniques/T1003/007 | Linux | Credential Access | Adversaries may gather credentials from information stored in the Proc filesystem or `/proc`. The Proc filesystem on Linux contains a great deal of information regarding the state of the running operating system. Processes running with root privileges can use this facility to scrape live memory of other running program... | Command: Command Execution, File: File Access | To obtain the passwords and hashes stored in memory, processes must open a maps file in the /proc filesystem for the process being analyzed. This file is stored under the path `/proc/\*/maps`, where the `\*` directory is the unique pid of the program being interrogated for such authentication data. The AuditD monitorin... |
/etc/passwd and /etc/shadow | T1003.008 | https://attack.mitre.org/techniques/T1003/008 | Linux | Credential Access | Adversaries may attempt to dump the contents of `/etc/passwd` and `/etc/shadow` to enable offline password cracking. Most modern Linux operating systems use a combination of `/etc/passwd` and `/etc/shadow` to store user account information including password hashes in `/etc/shadow`. By default, `/etc/shadow` is only re... | Command: Command Execution, File: File Access | The AuditD monitoring tool, which ships stock in many Linux distributions, can be used to watch for hostile processes attempting to access `/etc/passwd` and `/etc/shadow`, alerting on the pid, process name, and arguments of such programs. |
Data from Local System | T1005 | https://attack.mitre.org/techniques/T1005 | Linux, macOS, Windows | Collection | Adversaries may search local system sources, such as file systems or local databases, to find files of interest and sensitive data prior to Exfiltration.
Adversaries may do this using a [Command and Scripting Interpreter](T1059), such as [cmd](S0106), which has functionality to interact with the file system to gather ... | Script: Script Execution, File: File Access, Command: Command Execution | Monitor processes and command-line arguments for actions that could be taken to collect files from a system. Remote access tools with built-in features may interact directly with the Windows API to gather data. Data may also be acquired through Windows system management tools such as [Windows Management Instrumentation... |
Direct Volume Access | T1006 | https://attack.mitre.org/techniques/T1006 | Windows | Defense Evasion | Adversaries may directly access a volume to bypass file access controls and file system monitoring. Windows allows programs to have direct access to logical volumes. Programs with direct access may read and write files directly from the drive by analyzing file system data structures. This technique bypasses Windows fil... | Command: Command Execution, Drive: Drive Access | Monitor handle opens on drive volumes that are made by processes to determine when they may directly access logical drives. (Citation: Github PowerSploit Ninjacopy)
Monitor processes and command-line arguments for actions that could be taken to copy files from the logical drive and evade common file system protections... |
System Service Discovery | T1007 | https://attack.mitre.org/techniques/T1007 | Windows, macOS | Discovery | Adversaries may try to get information about registered services. Commands that may obtain information about services using operating system utilities are "sc," "tasklist /svc" using [Tasklist](S0057), and "net start" using [Net](S0039), but adversaries may also use other tools as well. Adversaries may use the informat... | Process: Process Creation, Command: Command Execution | System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained.
Monitor processe... |
Fallback Channels | T1008 | https://attack.mitre.org/techniques/T1008 | Linux, Windows, macOS | Command and Control | Adversaries may use fallback or alternate communication channels if the primary channel is compromised or inaccessible in order to maintain reliable command and control and to avoid data transfer thresholds. | Network Traffic: Network Traffic Flow, Network Traffic: Network Connection Creation | Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. Analyze packet contents to detect communications that do not follow... |
Application Window Discovery | T1010 | https://attack.mitre.org/techniques/T1010 | macOS, Windows | Discovery | Adversaries may attempt to get a listing of open application windows. Window listings could convey information about how the system is used or give context to information collected by a keylogger. | Process: Process Creation, Command: Command Execution, Process: OS API Execution | System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities based on the information obtained.
Monitor processes and command-line argument... |
Exfiltration Over Other Network Medium | T1011 | https://attack.mitre.org/techniques/T1011 | Linux, macOS, Windows | Exfiltration | Adversaries may attempt to exfiltrate data over a different network medium than the command and control channel. If the command and control network is a wired Internet connection, the exfiltration may occur, for example, over a WiFi connection, modem, cellular data connection, Bluetooth, or another radio frequency (RF)... | Network Traffic: Network Connection Creation, Network Traffic: Network Traffic Flow, Network Traffic: Network Traffic Content, File: File Access, Command: Command Execution | Monitor for processes utilizing the network that do not normally have network communication or have never been seen before. Processes that normally require user-driven events to access the network (for example, a web browser opening with a mouse click or key press) but access the network without such may be malicious.
... |
Exfiltration Over Bluetooth | T1011.001 | https://attack.mitre.org/techniques/T1011/001 | Linux, macOS, Windows | Exfiltration | Adversaries may attempt to exfiltrate data over Bluetooth rather than the command and control channel. If the command and control network is a wired Internet connection, an attacker may opt to exfiltrate data using a Bluetooth communication channel.
Adversaries may choose to do this if they have sufficient access and ... | Network Traffic: Network Connection Creation, Network Traffic: Network Traffic Flow, Network Traffic: Network Traffic Content, File: File Access, Command: Command Execution | Monitor for processes utilizing the network that do not normally have network communication or have never been seen before. Processes that normally require user-driven events to access the network (for example, a web browser opening with a mouse click or key press) but access the network without such may be malicious.
... |
Query Registry | T1012 | https://attack.mitre.org/techniques/T1012 | Windows | Discovery | Adversaries may interact with the Windows Registry to gather information about the system, configuration, and installed software.
The Registry contains a significant amount of information about the operating system, configuration, software, and security.(Citation: Wikipedia Windows Registry) Information can easily be ... | Process: Process Creation, Command: Command Execution, Windows Registry: Windows Registry Key Access, Process: OS API Execution | System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained.
Interaction with... |
Rootkit | T1014 | https://attack.mitre.org/techniques/T1014 | Linux, macOS, Windows | Defense Evasion | Adversaries may use rootkits to hide the presence of programs, files, network connections, services, drivers, and other system components. Rootkits are programs that hide the existence of malware by intercepting/hooking and modifying operating system API calls that supply system information. (Citation: Symantec Windows... | Drive: Drive Modification, Firmware: Firmware Modification | Some rootkit protections may be built into anti-virus or operating system software. There are dedicated rootkit detection tools that look for specific types of rootkit behavior. Monitor for the existence of unrecognized DLLs, devices, services, and changes to the MBR. (Citation: Wikipedia Rootkit) |
System Network Configuration Discovery | T1016 | https://attack.mitre.org/techniques/T1016 | Linux, macOS, Windows | Discovery | Adversaries may look for details about the network configuration and settings, such as IP and/or MAC addresses, of systems they access or through information discovery of remote systems. Several operating system administration utilities exist that can be used to gather this information. Examples include [Arp](S0099), [... | Process: Process Creation, Script: Script Execution, Command: Command Execution, Process: OS API Execution | System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained.
Monitor processe... |
Internet Connection Discovery | T1016.001 | https://attack.mitre.org/techniques/T1016/001 | Windows, Linux, macOS | Discovery | Adversaries may check for Internet connectivity on compromised systems. This may be performed during automated discovery and can be accomplished in numerous ways such as using [Ping](S0097), `tracert`, and GET requests to websites.
Adversaries may use the results and responses from these requests to determine if the s... | Process: Process Creation, Command: Command Execution | System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Command and Control, based on the information obtained.
Monitor proce... |
Remote System Discovery | T1018 | https://attack.mitre.org/techniques/T1018 | Linux, macOS, Windows | Discovery | Adversaries may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for Lateral Movement from the current system. Functionality could exist within remote access tools to enable this, but utilities available on the operating system could also be us... | Process: Process Creation, Command: Command Execution, Network Traffic: Network Connection Creation, File: File Access | System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained.
Normal, benign s... |
Automated Exfiltration | T1020 | https://attack.mitre.org/techniques/T1020 | Linux, macOS, Windows, Network | Exfiltration | Adversaries may exfiltrate data, such as sensitive documents, through the use of automated processing after being gathered during Collection.
When automated exfiltration is used, other exfiltration techniques likely apply as well to transfer the information out of the network, such as [Exfiltration Over C2 Channel](T... | Command: Command Execution, Script: Script Execution, Network Traffic: Network Connection Creation, Network Traffic: Network Traffic Flow, Network Traffic: Network Traffic Content, File: File Access | Monitor process file access patterns and network behavior. Unrecognized processes or scripts that appear to be traversing file systems and sending network traffic may be suspicious. |
Traffic Duplication | T1020.001 | https://attack.mitre.org/techniques/T1020/001 | Network | Exfiltration | Adversaries may leverage traffic mirroring in order to automate data exfiltration over compromised network infrastructure. Traffic mirroring is a native feature for some network devices and used for network analysis and may be configured to duplicate traffic and forward to one or more destinations for analysis by a ne... | Network Traffic: Network Connection Creation, Network Traffic: Network Traffic Flow | Monitor network traffic for uncommon data flows (e.g. unusual network communications, suspicious communications that have never been seen before, communications sending fixed size data packets at regular intervals). Analyze packet contents to detect communications that do not follow the expected protocol behavior for ... |
Remote Services | T1021 | https://attack.mitre.org/techniques/T1021 | Linux, macOS, Windows | Lateral Movement | Adversaries may use [Valid Accounts](T1078) to log into a service specifically designed to accept remote connections, such as telnet, SSH, and VNC. The adversary may then perform actions as the logged-on user.
In an enterprise environment, servers and workstations can be organized into domains. Domains provide central... | Process: Process Creation, Network Traffic: Network Connection Creation, Network Traffic: Network Traffic Flow, Logon Session: Logon Session Creation, Command: Command Execution, Network Share: Network Share Access, Module: Module Load | Correlate use of login activity related to remote services with unusual behavior or other malicious or suspicious activity. Adversaries will likely need to learn about an environment and the relationships between systems through Discovery techniques prior to attempting Lateral Movement.
Use of applications such as AR... |
Remote Desktop Protocol | T1021.001 | https://attack.mitre.org/techniques/T1021/001 | Windows | Lateral Movement | Adversaries may use [Valid Accounts](T1078) to log into a computer using the Remote Desktop Protocol (RDP). The adversary may then perform actions as the logged-on user.
Remote desktop is a common feature in operating systems. It allows a user to log into an interactive session with a system desktop graphical user int... | Process: Process Creation, Network Traffic: Network Connection Creation, Network Traffic: Network Traffic Flow, Logon Session: Logon Session Creation | Use of RDP may be legitimate, depending on the network environment and how it is used. Other factors, such as access patterns and activity that occurs after a remote login, may indicate suspicious or malicious behavior with RDP. Monitor for user accounts logged into systems they would not normally access or access patt... |
SMB/Windows Admin Shares | T1021.002 | https://attack.mitre.org/techniques/T1021/002 | Windows | Lateral Movement | Adversaries may use [Valid Accounts](T1078) to interact with a remote network share using Server Message Block (SMB). The adversary may then perform actions as the logged-on user.
SMB is a file, printer, and serial port sharing protocol for Windows machines on the same network or domain. Adversaries may use SMB to int... | Command: Command Execution, Network Traffic: Network Connection Creation, Network Traffic: Network Traffic Flow, Logon Session: Logon Session Creation, Network Share: Network Share Access | Ensure that proper logging of accounts used to log into systems is turned on and centrally collected. Windows logging is able to collect success/failure for accounts that may be used to move laterally and can be collected using tools such as Windows Event Forwarding. (Citation: Lateral Movement Payne)(Citation: Windows... |
Distributed Component Object Model | T1021.003 | https://attack.mitre.org/techniques/T1021/003 | Windows | Lateral Movement | Adversaries may use [Valid Accounts](T1078) to interact with remote machines by taking advantage of Distributed Component Object Model (DCOM). The adversary may then perform actions as the logged-on user.
The Windows Component Object Model (COM) is a component of the native Windows application programming interface (A... | Module: Module Load, Process: Process Creation, Network Traffic: Network Connection Creation | Monitor for COM objects loading DLLs and other modules not typically associated with the application.(Citation: Enigma Outlook DCOM Lateral Movement Nov 2017) Enumeration of COM objects, via [Query Registry](T1012) or [PowerShell](T1059.001), may also proceed malicious use.(Citation: Fireeye Hunting COM June 2019)(Cita... |
SSH | T1021.004 | https://attack.mitre.org/techniques/T1021/004 | Linux, macOS | Lateral Movement | Adversaries may use [Valid Accounts](T1078) to log into remote machines using Secure Shell (SSH). The adversary may then perform actions as the logged-on user.
SSH is a protocol that allows authorized users to open remote shells on other computers. Many Linux and macOS versions come with SSH installed by default, alth... | Process: Process Creation, Network Traffic: Network Connection Creation, Logon Session: Logon Session Creation | Use of SSH may be legitimate depending on the environment and how it’s used. Other factors, such as access patterns and activity that occurs after a remote login, may indicate suspicious or malicious behavior with SSH. Monitor for user accounts logged into systems they would not normally access or access patterns to mu... |
VNC | T1021.005 | https://attack.mitre.org/techniques/T1021/005 | Linux, macOS, Windows | Lateral Movement | Adversaries may use [Valid Accounts](T1078) to remotely control machines using Virtual Network Computing (VNC). VNC is a platform-independent desktop sharing system that uses the RFB (“remote framebuffer”) protocol to enable users to remotely control another computer’s display by relaying the screen, mouse, and keyboa... | Process: Process Creation, Network Traffic: Network Connection Creation, Logon Session: Logon Session Creation | Use of VNC may be legitimate depending on the environment and how it’s used. Other factors, such as access patterns and activity that occurs after a remote login, may indicate suspicious or malicious behavior using VNC.
On macOS systems `log show --predicate 'process = "screensharingd" and eventMessage contains "Authe... |
Windows Remote Management | T1021.006 | https://attack.mitre.org/techniques/T1021/006 | Windows | Lateral Movement | Adversaries may use [Valid Accounts](T1078) to interact with remote systems using Windows Remote Management (WinRM). The adversary may then perform actions as the logged-on user.
WinRM is the name of both a Windows service and a protocol that allows a user to interact with a remote system (e.g., run an executable, mod... | Service: Service Metadata, Process: Process Creation, Network Traffic: Network Connection Creation, Logon Session: Logon Session Creation, Command: Command Execution | Monitor use of WinRM within an environment by tracking service execution. If it is not normally used or is disabled, then this may be an indicator of suspicious behavior. Monitor processes created and actions taken by the WinRM process or a WinRM invoked script to correlate it with other related events.(Citation: Medi... |
Data from Removable Media | T1025 | https://attack.mitre.org/techniques/T1025 | Linux, macOS, Windows | Collection | Adversaries may search connected removable media on computers they have compromised to find files of interest. Sensitive data can be collected from any removable media (optical disk drive, USB memory, etc.) connected to the compromised system prior to Exfiltration. Interactive command shells may be in use, and common f... | File: File Access, Command: Command Execution | Monitor processes and command-line arguments for actions that could be taken to collect files from a system's connected removable media. Remote access tools with built-in features may interact directly with the Windows API to gather data. Data may also be acquired through Windows system management tools such as [Window... |
Obfuscated Files or Information | T1027 | https://attack.mitre.org/techniques/T1027 | Linux, macOS, Windows | Defense Evasion | Adversaries may attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the system or in transit. This is common behavior that can be used across different platforms and the network to evade defenses.
Payloads may be compressed, archived... | Command: Command Execution, File: File Metadata, File: File Creation, Process: Process Creation | Detection of file obfuscation is difficult unless artifacts are left behind by the obfuscation process that are uniquely detectable with a signature. If detection of the obfuscation itself is not possible, it may be possible to detect the malicious activity that caused the obfuscated file (for example, the method that ... |
Binary Padding | T1027.001 | https://attack.mitre.org/techniques/T1027/001 | Linux, macOS, Windows | Defense Evasion | Adversaries may use binary padding to add junk data and change the on-disk representation of malware. This can be done without affecting the functionality or behavior of a binary, but can increase the size of the binary beyond what some security tools are capable of handling due to file size limitations.
Binary paddi... | File: File Metadata | Depending on the method used to pad files, a file-based signature may be capable of detecting padding using a scanning or on-access based tool. When executed, the resulting process from padded files may also exhibit other behavior characteristics of being used to conduct an intrusion such as system and network informa... |
Software Packing | T1027.002 | https://attack.mitre.org/techniques/T1027/002 | macOS, Windows | Defense Evasion | Adversaries may perform software packing or virtual machine software protection to conceal their code. Software packing is a method of compressing or encrypting an executable. Packing an executable changes the file signature in an attempt to avoid signature-based detection. Most decompression techniques decompress the ... | File: File Metadata | Use file scanning to look for known software packers or artifacts of packing techniques. Packing is not a definitive indicator of malicious activity, because legitimate software may use packing techniques to reduce binary size or to protect proprietary code. |
Steganography | T1027.003 | https://attack.mitre.org/techniques/T1027/003 | Linux, macOS, Windows | Defense Evasion | Adversaries may use steganography techniques in order to prevent the detection of hidden information. Steganographic techniques can be used to hide data in digital media such as images, audio tracks, video clips, or text files.
[Duqu](S0038) was an early example of malware that used steganography. It encrypted the gat... | File: File Metadata | Detection of steganography is difficult unless artifacts are left behind by the obfuscation process that are detectable with a known signature. Look for strings or other signatures left in system artifacts related to decoding steganography. |
Compile After Delivery | T1027.004 | https://attack.mitre.org/techniques/T1027/004 | Linux, macOS, Windows | Defense Evasion | Adversaries may attempt to make payloads difficult to discover and analyze by delivering files to victims as uncompiled code. Text-based source code files may subvert analysis and scrutiny from protections targeting executables/binaries. These payloads will need to be compiled before execution; typically via native uti... | File: File Metadata, File: File Creation, Process: Process Creation, Command: Command Execution | Monitor the execution file paths and command-line arguments for common compilers, such as csc.exe and GCC/MinGW, and correlate with other suspicious behavior to reduce false positives from normal user and administrator behavior. The compilation of payloads may also generate file creation and/or file write events. Look ... |
Indicator Removal from Tools | T1027.005 | https://attack.mitre.org/techniques/T1027/005 | Linux, macOS, Windows | Defense Evasion | Adversaries may remove indicators from tools if they believe their malicious tool was detected, quarantined, or otherwise curtailed. They can modify the tool by removing the indicator and using the updated version that is no longer detected by the target's defensive systems or subsequent targets that may use similar sy... | null | The first detection of a malicious tool may trigger an anti-virus or other security tool alert. Similar events may also occur at the boundary through network IDS, email scanning appliance, etc. The initial detection should be treated as an indication of a potentially more invasive intrusion. The alerting system should ... |
HTML Smuggling | T1027.006 | https://attack.mitre.org/techniques/T1027/006 | Windows, Linux, macOS | Defense Evasion | Adversaries may smuggle data and files past content filters by hiding malicious payloads inside of seemingly benign HTML files. HTML documents can store large binary objects known as JavaScript Blobs (immutable data that represents raw bytes) that can later be constructed into file-like objects. Data may also be stored... | File: File Creation | Detection of HTML Smuggling is difficult as HTML5 and JavaScript attributes are used by legitimate services and applications. HTML Smuggling can be performed in many ways via JavaScript, developing rules for the different variants, with a combination of different encoding and/or encryption schemes, may be very challeng... |
Scheduled Transfer | T1029 | https://attack.mitre.org/techniques/T1029 | Linux, macOS, Windows | Exfiltration | Adversaries may schedule data exfiltration to be performed only at certain times of day or at certain intervals. This could be done to blend traffic patterns with normal activity or availability.
When scheduled exfiltration is used, other exfiltration techniques likely apply as well to transfer the information out of ... | Network Traffic: Network Connection Creation, Network Traffic: Network Traffic Flow | Monitor process file access patterns and network behavior. Unrecognized processes or scripts that appear to be traversing file systems and sending network traffic may be suspicious. Network connections to the same destination that occur at the same time of day for multiple days are suspicious. |
Data Transfer Size Limits | T1030 | https://attack.mitre.org/techniques/T1030 | Linux, macOS, Windows | Exfiltration | An adversary may exfiltrate data in fixed size chunks instead of whole files or limit packet sizes below certain thresholds. This approach may be used to avoid triggering network data transfer threshold alerts. | Network Traffic: Network Connection Creation, Network Traffic: Network Traffic Flow | Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). If a process maintains a long connection during which it consistently sends fixed size data packets or a process opens connections and sends fixed sized data packets at regular intervals, it may... |
System Owner/User Discovery | T1033 | https://attack.mitre.org/techniques/T1033 | Linux, macOS, Windows | Discovery | Adversaries may attempt to identify the primary user, currently logged in user, set of users that commonly uses a system, or whether a user is actively using the system. They may do this, for example, by retrieving account usernames or by using [OS Credential Dumping](T1003). The information may be collected in a numbe... | Process: Process Creation, Command: Command Execution | System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities based on the information obtained.
Monitor processes and command-line argument... |
Masquerading | T1036 | https://attack.mitre.org/techniques/T1036 | Linux, macOS, Windows, Containers | Defense Evasion | Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools. Masquerading occurs when the name or location of an object, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. This may include mani... | Image: Image Metadata, Command: Command Execution, Service: Service Metadata, Service: Service Creation, Scheduled Job: Scheduled Job Metadata, Scheduled Job: Scheduled Job Modification, File: File Metadata, Process: Process Metadata, File: File Modification | Collect file hashes; file names that do not match their expected hash are suspect. Perform file monitoring; files with known names but in unusual locations are suspect. Likewise, files that are modified outside of an update or patch are suspect.
If file names are mismatched between the file name on disk and that of th... |
Invalid Code Signature | T1036.001 | https://attack.mitre.org/techniques/T1036/001 | macOS, Windows | Defense Evasion | Adversaries may attempt to mimic features of valid code signatures to increase the chance of deceiving a user, analyst, or tool. Code signing provides a level of authenticity on a binary from the developer and a guarantee that the binary has not been tampered with. Adversaries can copy the metadata and signature inform... | File: File Metadata | Collect and analyze signing certificate metadata and check signature validity on software that executes within the environment, look for invalid signatures as well as unusual certificate characteristics and outliers. |
Right-to-Left Override | T1036.002 | https://attack.mitre.org/techniques/T1036/002 | Linux, macOS, Windows | Defense Evasion | Adversaries may abuse the right-to-left override (RTLO or RLO) character (U+202E) to disguise a string and/or file name to make it appear benign. RTLO is a non-printing Unicode character that causes the text that follows it to be displayed in reverse. For example, a Windows screensaver executable named `March 25 \u202E... | File: File Metadata | Detection methods should include looking for common formats of RTLO characters within filenames such as `\u202E`, `[U+202E]`, and `%E2%80%AE`. Defenders should also check their analysis tools to ensure they do not interpret the RTLO character and instead print the true name of the file containing it. |
Rename System Utilities | T1036.003 | https://attack.mitre.org/techniques/T1036/003 | Linux, macOS, Windows | Defense Evasion | Adversaries may rename legitimate system utilities to try to evade security mechanisms concerning the usage of those utilities. Security monitoring and control mechanisms may be in place for system utilities adversaries are capable of abusing. (Citation: LOLBAS Main Site) It may be possible to bypass those security mec... | File: File Modification, Process: Process Metadata, Command: Command Execution, File: File Metadata | If file names are mismatched between the file name on disk and that of the binary's PE metadata, this is a likely indicator that a binary was renamed after it was compiled. Collecting and comparing disk and resource filenames for binaries by looking to see if the InternalName, OriginalFilename, and/or ProductName match... |
Masquerade Task or Service | T1036.004 | https://attack.mitre.org/techniques/T1036/004 | Windows, Linux, macOS | Defense Evasion | Adversaries may attempt to manipulate the name of a task or service to make it appear legitimate or benign. Tasks/services executed by the Task Scheduler or systemd will typically be given a name and/or description.(Citation: TechNet Schtasks)(Citation: Systemd Service Units) Windows services will have a service name a... | Command: Command Execution, Service: Service Metadata, Service: Service Creation, Scheduled Job: Scheduled Job Metadata, Scheduled Job: Scheduled Job Modification | Look for changes to tasks and services that do not correlate with known software, patch cycles, etc. Suspicious program execution through scheduled tasks or services may show up as outlier processes that have not been seen before when compared against historical data. Monitor processes and command-line arguments for ac... |
Match Legitimate Name or Location | T1036.005 | https://attack.mitre.org/techniques/T1036/005 | Linux, macOS, Windows, Containers | Defense Evasion | Adversaries may match or approximate the name or location of legitimate files or resources when naming/placing them. This is done for the sake of evading defenses and observation. This may be done by placing an executable in a commonly trusted directory (ex: under System32) or giving it the name of a legitimate, truste... | Image: Image Metadata, File: File Metadata, Process: Process Metadata | Collect file hashes; file names that do not match their expected hash are suspect. Perform file monitoring; files with known names but in unusual locations are suspect. Likewise, files that are modified outside of an update or patch are suspect.
If file names are mismatched between the file name on disk and that of th... |
Space after Filename | T1036.006 | https://attack.mitre.org/techniques/T1036/006 | Linux, macOS | Defense Evasion | Adversaries can hide a program's true filetype by changing the extension of a file. With certain file types (specifically this does not work with .app extensions), appending a space to the end of a filename will change how the file is processed by the operating system.
For example, if there is a Mach-O executable file... | File: File Metadata | It's not common for spaces to be at the end of filenames, so this is something that can easily be checked with file monitoring. From the user's perspective though, this is very hard to notice from within the Finder.app or on the command-line in Terminal.app. Processes executed from binaries containing non-standard exte... |
Double File Extension | T1036.007 | https://attack.mitre.org/techniques/T1036/007 | Windows | Defense Evasion | Adversaries may abuse a double extension in the filename as a means of masquerading the true file type. A file name may include a secondary file type extension that may cause only the first extension to be displayed (ex: `File.txt.exe` may render in some views as just `File.txt`). However, the second extension is the t... | File: File Creation, File: File Metadata | Monitor for files written to disk that contain two file extensions, particularly when the second is an executable.(Citation: Seqrite DoubleExtension) |
Boot or Logon Initialization Scripts | T1037 | https://attack.mitre.org/techniques/T1037 | macOS, Windows, Linux | Persistence, Privilege Escalation | Adversaries may use scripts automatically executed at boot or logon initialization to establish persistence. Initialization scripts can be used to perform administrative functions, which may often execute other programs or send information to an internal logging server. These scripts can vary based on operating system ... | Windows Registry: Windows Registry Key Creation, Process: Process Creation, Command: Command Execution, Active Directory: Active Directory Object Modification, File: File Creation, File: File Modification | Monitor logon scripts for unusual access by abnormal users or at abnormal times. Look for files added or modified by unusual accounts outside of normal administration duties. Monitor running process for actions that could be indicative of abnormal programs or executables running upon logon. |
Logon Script (Windows) | T1037.001 | https://attack.mitre.org/techniques/T1037/001 | Windows | Persistence, Privilege Escalation | Adversaries may use Windows logon scripts automatically executed at logon initialization to establish persistence. Windows allows logon scripts to be run whenever a specific user or group of users log into a system.(Citation: TechNet Logon Scripts) This is done via adding a path to a script to the `HKCU\Environment\Use... | Windows Registry: Windows Registry Key Creation, Process: Process Creation, Command: Command Execution | Monitor for changes to Registry values associated with Windows logon scrips, nameley `HKCU\Environment\UserInitMprLogonScript`.
Monitor running process for actions that could be indicative of abnormal programs or executables running upon logon. |
Logon Script (Mac) | T1037.002 | https://attack.mitre.org/techniques/T1037/002 | macOS | Persistence, Privilege Escalation | Adversaries may use macOS logon scripts automatically executed at logon initialization to establish persistence. macOS allows logon scripts (known as login hooks) to be executed whenever a specific user logs into a system. A login hook tells Mac OS X to execute a certain script when a user logs in, but unlike [Startup ... | File: File Creation, File: File Modification, Process: Process Creation, Command: Command Execution | Monitor logon scripts for unusual access by abnormal users or at abnormal times. Look for files added or modified by unusual accounts outside of normal administration duties. Monitor running process for actions that could be indicative of abnormal programs or executables running upon logon. |
Network Logon Script | T1037.003 | https://attack.mitre.org/techniques/T1037/003 | Windows | Persistence, Privilege Escalation | Adversaries may use network logon scripts automatically executed at logon initialization to establish persistence. Network logon scripts can be assigned using Active Directory or Group Policy Objects.(Citation: Petri Logon Script AD) These logon scripts run with the privileges of the user they are assigned to. Dependin... | File: File Creation, File: File Modification, Process: Process Creation, Command: Command Execution, Active Directory: Active Directory Object Modification | Monitor logon scripts for unusual access by abnormal users or at abnormal times. Look for files added or modified by unusual accounts outside of normal administration duties. Monitor running process for actions that could be indicative of abnormal programs or executables running upon logon. |
RC Scripts | T1037.004 | https://attack.mitre.org/techniques/T1037/004 | macOS, Linux | Persistence, Privilege Escalation | Adversaries may establish persistence by modifying RC scripts which are executed during a Unix-like system’s startup. These files allow system administrators to map and start custom services at startup for different run levels. RC scripts require root privileges to modify.
Adversaries can establish persistence by addi... | File: File Creation, File: File Modification, Process: Process Creation, Command: Command Execution | Monitor for unexpected changes to RC scripts in the `/etc/` directory. Monitor process execution resulting from RC scripts for unusual or unknown applications or behavior.
Monitor for `/etc/rc.local` file creation. Although types of RC scripts vary for each Unix-like distribution, several execute `/etc/rc.local` if pr... |
Startup Items | T1037.005 | https://attack.mitre.org/techniques/T1037/005 | macOS | Persistence, Privilege Escalation | Adversaries may use startup items automatically executed at boot initialization to establish persistence. Startup items execute during the final phase of the boot process and contain shell scripts or other executable files along with configuration information used by the system to determine the execution order for all ... | File: File Creation, File: File Modification, Process: Process Creation, Command: Command Execution | The `/Library/StartupItems` folder can be monitored for changes. Similarly, the programs that are actually executed from this mechanism should be checked against a whitelist.
Monitor processes that are executed during the bootup process to check for unusual or unknown applications and behavior. |
Data from Network Shared Drive | T1039 | https://attack.mitre.org/techniques/T1039 | Linux, macOS, Windows | Collection | Adversaries may search network shares on computers they have compromised to find files of interest. Sensitive data can be collected from remote systems via shared network drives (host shared directory, network file server, etc.) that are accessible from the current system prior to Exfiltration. Interactive command shel... | File: File Access, Network Share: Network Share Access, Command: Command Execution | Monitor processes and command-line arguments for actions that could be taken to collect files from a network share. Remote access tools with built-in features may interact directly with the Windows API to gather data. Data may also be acquired through Windows system management tools such as [Windows Management Instrume... |
Network Sniffing | T1040 | https://attack.mitre.org/techniques/T1040 | Linux, macOS, Windows, Network | Credential Access, Discovery | Adversaries may sniff network traffic to capture information about an environment, including authentication material passed over the network. Network sniffing refers to using the network interface on a system to monitor or capture information sent over a wired or wireless connection. An adversary may place a network in... | Process: Process Creation, Command: Command Execution | Detecting the events leading up to sniffing network traffic may be the best method of detection. From the host level, an adversary would likely need to perform a [Adversary-in-the-Middle](T1557) attack against other devices on a wired network in order to capture traffic that was not to or from the current compromised s... |
Exfiltration Over C2 Channel | T1041 | https://attack.mitre.org/techniques/T1041 | Linux, macOS, Windows | Exfiltration | Adversaries may steal data by exfiltrating it over an existing command and control channel. Stolen data is encoded into the normal communications channel using the same protocol as command and control communications. | Network Traffic: Network Connection Creation, Network Traffic: Network Traffic Flow, Network Traffic: Network Traffic Content, File: File Access, Command: Command Execution | Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. Analyze packet contents to detect communications that do not follow... |
Network Service Scanning | T1046 | https://attack.mitre.org/techniques/T1046 | Windows, IaaS, Linux, macOS, Containers | Discovery | Adversaries may attempt to get a listing of services running on remote hosts, including those that may be vulnerable to remote software exploitation. Methods to acquire this information include port scans and vulnerability scans using tools that are brought onto a system.
Within cloud environments, adversaries may at... | Command: Command Execution, Cloud Service: Cloud Service Enumeration, Network Traffic: Network Traffic Flow | System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained.
Normal, benign s... |
Windows Management Instrumentation | T1047 | https://attack.mitre.org/techniques/T1047 | Windows | Execution | Adversaries may abuse Windows Management Instrumentation (WMI) to execute malicious commands and payloads. WMI is an administration feature that provides a uniform environment to access Windows system components. The WMI service enables both local and remote access, though the latter is facilitated by [Remote Services]... | Command: Command Execution, Process: Process Creation, Network Traffic: Network Connection Creation | Monitor network traffic for WMI connections; the use of WMI in environments that do not typically use WMI may be suspect. Perform process monitoring to capture command-line arguments of "wmic" and detect commands that are used to perform remote behavior. (Citation: FireEye WMI 2015) |
Exfiltration Over Alternative Protocol | T1048 | https://attack.mitre.org/techniques/T1048 | Linux, macOS, Windows | Exfiltration | Adversaries may steal data by exfiltrating it over a different protocol than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server.
Alternate protocols include FTP, SMTP, HTTP/S, DNS, SMB, or any other network protocol no... | Network Traffic: Network Connection Creation, Network Traffic: Network Traffic Flow, Network Traffic: Network Traffic Content, File: File Access, Command: Command Execution | Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. Analyze packet contents to detect communications that do not follow... |
Exfiltration Over Symmetric Encrypted Non-C2 Protocol | T1048.001 | https://attack.mitre.org/techniques/T1048/001 | Linux, macOS, Windows | Exfiltration | Adversaries may steal data by exfiltrating it over a symmetrically encrypted network protocol other than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server.
Symmetric encryption algorithms are those that use shared or t... | Network Traffic: Network Connection Creation, Network Traffic: Network Traffic Flow, Network Traffic: Network Traffic Content, File: File Access, Command: Command Execution | Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious.(Citation: University of Birmingham C2)
Artifacts and evidence of ... |
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol | T1048.002 | https://attack.mitre.org/techniques/T1048/002 | Linux, macOS, Windows | Exfiltration | Adversaries may steal data by exfiltrating it over an asymmetrically encrypted network protocol other than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server.
Asymmetric encryption algorithms are those that use differen... | Network Traffic: Network Connection Creation, Network Traffic: Network Traffic Flow, Network Traffic: Network Traffic Content, File: File Access, Command: Command Execution | Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious.(Citation: University of Birmingham C2) |
Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol | T1048.003 | https://attack.mitre.org/techniques/T1048/003 | Linux, macOS, Windows | Exfiltration | Adversaries may steal data by exfiltrating it over an un-encrypted network protocol other than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server.
Adversaries may opt to obfuscate this data, without the use of encryptio... | Network Traffic: Network Connection Creation, Network Traffic: Network Traffic Flow, Network Traffic: Network Traffic Content, File: File Access, Command: Command Execution | Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. Analyze packet contents to detect communications that do not follow... |
System Network Connections Discovery | T1049 | https://attack.mitre.org/techniques/T1049 | Windows, IaaS, Linux, macOS | Discovery | Adversaries may attempt to get a listing of network connections to or from the compromised system they are currently accessing or from remote systems by querying for information over the network.
An adversary who gains access to a system that is part of a cloud-based environment may map out Virtual Private Clouds or ... | Process: Process Creation, Command: Command Execution, Process: OS API Execution | System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained.
Monitor processe... |
Exfiltration Over Physical Medium | T1052 | https://attack.mitre.org/techniques/T1052 | Linux, macOS, Windows | Exfiltration | Adversaries may attempt to exfiltrate data via a physical medium, such as a removable drive. In certain circumstances, such as an air-gapped network compromise, exfiltration could occur via a physical medium or device introduced by a user. Such media could be an external hard drive, USB drive, cellular phone, MP3 playe... | Process: Process Creation, File: File Access, Drive: Drive Creation, Command: Command Execution | Monitor file access on removable media. Detect processes that execute when removable media are mounted. |
Exfiltration over USB | T1052.001 | https://attack.mitre.org/techniques/T1052/001 | Linux, macOS, Windows | Exfiltration | Adversaries may attempt to exfiltrate data over a USB connected physical device. In certain circumstances, such as an air-gapped network compromise, exfiltration could occur via a USB device introduced by a user. The USB device could be used as the final exfiltration point or to hop between otherwise disconnected syste... | Process: Process Creation, File: File Access, Drive: Drive Creation, Command: Command Execution | Monitor file access on removable media. Detect processes that execute when removable media are mounted. |
Scheduled Task/Job | T1053 | https://attack.mitre.org/techniques/T1053 | Windows, Linux, macOS, Containers | Execution, Persistence, Privilege Escalation | Adversaries may abuse task scheduling functionality to facilitate initial or recurring execution of malicious code. Utilities exist within all major operating systems to schedule programs or scripts to be executed at a specified date and time. A task can also be scheduled on a remote system, provided the proper authent... | File: File Creation, Container: Container Creation, Scheduled Job: Scheduled Job Creation, Command: Command Execution, File: File Modification, Process: Process Creation | Monitor scheduled task creation from common utilities using command-line invocation. Legitimate scheduled tasks may be created during installation of new software or through system administration functions. Look for changes to tasks that do not correlate with known software, patch cycles, etc.
Suspicious program exec... |
At (Linux) | T1053.001 | https://attack.mitre.org/techniques/T1053/001 | Linux | Execution, Persistence, Privilege Escalation | Adversaries may abuse the [at](S0110) utility to perform task scheduling for initial, recurring, or future execution of malicious code. The [at](S0110) command within Linux operating systems enables administrators to schedule tasks.(Citation: Kifarunix - Task Scheduling in Linux)
An adversary may use [at](S0110) in Li... | Scheduled Job: Scheduled Job Creation, Command: Command Execution, Process: Process Creation | Monitor scheduled task creation using command-line invocation. Legitimate scheduled tasks may be created during installation of new software or through system administration functions. Look for changes to tasks that do not correlate with known software, patch cycles, etc.
Review all jobs using the `atq` command and e... |
At (Windows) | T1053.002 | https://attack.mitre.org/techniques/T1053/002 | Windows | Execution, Persistence, Privilege Escalation | Adversaries may abuse the `at.exe` utility to perform task scheduling for initial or recurring execution of malicious code. The [at](S0110) utility exists as an executable within Windows for scheduling tasks at a specified time and date. Using [at](S0110) requires that the Task Scheduler service be running, and the use... | Scheduled Job: Scheduled Job Creation, Command: Command Execution, File: File Modification, Process: Process Creation | Monitor process execution from the svchost.exe in Windows 10 and the Windows Task Scheduler taskeng.exe for older versions of Windows. (Citation: Twitter Leoloobeek Scheduled Task) If scheduled tasks are not used for persistence, then the adversary is likely to remove the task when the action is complete. Monitor Windo... |
Cron | T1053.003 | https://attack.mitre.org/techniques/T1053/003 | Linux, macOS | Execution, Persistence, Privilege Escalation | Adversaries may abuse the `cron` utility to perform task scheduling for initial or recurring execution of malicious code.(Citation: 20 macOS Common Tools and Techniques) The `cron` utility is a time-based job scheduler for Unix-like operating systems. The ` crontab` file contains the schedule of cron entries to be run... | Scheduled Job: Scheduled Job Creation, Command: Command Execution, File: File Modification, Process: Process Creation | Monitor scheduled task creation from common utilities using command-line invocation. Legitimate scheduled tasks may be created during installation of new software or through system administration functions. Look for changes to tasks that do not correlate with known software, patch cycles, etc.
Suspicious program exe... |
Scheduled Task | T1053.005 | https://attack.mitre.org/techniques/T1053/005 | Windows | Execution, Persistence, Privilege Escalation | Adversaries may abuse the Windows Task Scheduler to perform task scheduling for initial or recurring execution of malicious code. There are multiple ways to access the Task Scheduler in Windows. The `schtasks` can be run directly on the command line, or the Task Scheduler can be opened through the GUI within the Admini... | Scheduled Job: Scheduled Job Creation, Command: Command Execution, File: File Modification, Process: Process Creation | Monitor process execution from the `svchost.exe` in Windows 10 and the Windows Task Scheduler `taskeng.exe` for older versions of Windows. (Citation: Twitter Leoloobeek Scheduled Task) If scheduled tasks are not used for persistence, then the adversary is likely to remove the task when the action is complete. Monitor W... |
Systemd Timers | T1053.006 | https://attack.mitre.org/techniques/T1053/006 | Linux | Execution, Persistence, Privilege Escalation | Adversaries may abuse systemd timers to perform task scheduling for initial or recurring execution of malicious code. Systemd timers are unit files with file extension `.timer` that control services. Timers can be set to run on a calendar event or after a time span relative to a starting point. They can be used as an a... | Scheduled Job: Scheduled Job Creation, Command: Command Execution, File: File Modification, Process: Process Creation | Systemd timer unit files may be detected by auditing file creation and modification events within the `/etc/systemd/system`, `/usr/lib/systemd/system/`, and `~/.config/systemd/user/` directories, as well as associated symbolic links. Suspicious processes or scripts spawned in this manner will have a parent process of ‘... |
Container Orchestration Job | T1053.007 | https://attack.mitre.org/techniques/T1053/007 | Containers | Execution, Persistence, Privilege Escalation | Adversaries may abuse task scheduling functionality provided by container orchestration tools such as Kubernetes to schedule deployment of containers configured to execute malicious code. Container orchestration jobs run these automated tasks at a specific date and time, similar to cron jobs on a Linux system. Deployme... | Scheduled Job: Scheduled Job Creation, Container: Container Creation, File: File Creation | Monitor for the anomalous creation of scheduled jobs in container orchestration environments. Use logging agents on Kubernetes nodes and retrieve logs from sidecar proxies for application and resource pods to monitor malicious container orchestration job deployments. |
Process Injection | T1055 | https://attack.mitre.org/techniques/T1055 | Linux, macOS, Windows | Defense Evasion, Privilege Escalation | Adversaries may inject code into processes in order to evade process-based defenses as well as possibly elevate privileges. Process injection is a method of executing arbitrary code in the address space of a separate live process. Running code in the context of another process may allow access to the process's memory, ... | Process: Process Modification, Module: Module Load, Process: OS API Execution, Process: Process Access, File: File Modification, File: File Metadata | Monitoring Windows API calls indicative of the various types of code injection may generate a significant amount of data and may not be directly useful for defense unless collected under specific circumstances for known bad sequences of calls, since benign use of API functions may be common and difficult to distinguish... |
Dynamic-link Library Injection | T1055.001 | https://attack.mitre.org/techniques/T1055/001 | Windows | Defense Evasion, Privilege Escalation | Adversaries may inject dynamic-link libraries (DLLs) into processes in order to evade process-based defenses as well as possibly elevate privileges. DLL injection is a method of executing arbitrary code in the address space of a separate live process.
DLL injection is commonly performed by writing the path to a DLL ... | Process: Process Modification, Module: Module Load, Process: OS API Execution, Process: Process Access | Monitoring Windows API calls indicative of the various types of code injection may generate a significant amount of data and may not be directly useful for defense unless collected under specific circumstances for known bad sequences of calls, since benign use of API functions may be common and difficult to distinguish... |
Portable Executable Injection | T1055.002 | https://attack.mitre.org/techniques/T1055/002 | Windows | Defense Evasion, Privilege Escalation | Adversaries may inject portable executables (PE) into processes in order to evade process-based defenses as well as possibly elevate privileges. PE injection is a method of executing arbitrary code in the address space of a separate live process.
PE injection is commonly performed by copying code (perhaps without a f... | Process: Process Modification, Process: OS API Execution, Process: Process Access | Monitoring Windows API calls indicative of the various types of code injection may generate a significant amount of data and may not be directly useful for defense unless collected under specific circumstances for known bad sequences of calls, since benign use of API functions may be common and difficult to distinguish... |
Thread Execution Hijacking | T1055.003 | https://attack.mitre.org/techniques/T1055/003 | Windows | Defense Evasion, Privilege Escalation | Adversaries may inject malicious code into hijacked processes in order to evade process-based defenses as well as possibly elevate privileges. Thread Execution Hijacking is a method of executing arbitrary code in the address space of a separate live process.
Thread Execution Hijacking is commonly performed by suspend... | Process: Process Modification, Process: OS API Execution, Process: Process Access | Monitoring Windows API calls indicative of the various types of code injection may generate a significant amount of data and may not be directly useful for defense unless collected under specific circumstances for known bad sequences of calls, since benign use of API functions may be common and difficult to distinguish... |
Asynchronous Procedure Call | T1055.004 | https://attack.mitre.org/techniques/T1055/004 | Windows | Defense Evasion, Privilege Escalation | Adversaries may inject malicious code into processes via the asynchronous procedure call (APC) queue in order to evade process-based defenses as well as possibly elevate privileges. APC injection is a method of executing arbitrary code in the address space of a separate live process.
APC injection is commonly perform... | Process: Process Modification, Process: OS API Execution, Process: Process Access | Monitoring Windows API calls indicative of the various types of code injection may generate a significant amount of data and may not be directly useful for defense unless collected under specific circumstances for known bad sequences of calls, since benign use of API functions may be common and difficult to distinguish... |
Thread Local Storage | T1055.005 | https://attack.mitre.org/techniques/T1055/005 | Windows | Defense Evasion, Privilege Escalation | Adversaries may inject malicious code into processes via thread local storage (TLS) callbacks in order to evade process-based defenses as well as possibly elevate privileges. TLS callback injection is a method of executing arbitrary code in the address space of a separate live process.
TLS callback injection involves... | Process: Process Modification, Process: OS API Execution, Process: Process Access | Monitoring Windows API calls indicative of the various types of code injection may generate a significant amount of data and may not be directly useful for defense unless collected under specific circumstances for known bad sequences of calls, since benign use of API functions may be common and difficult to distinguish... |
Ptrace System Calls | T1055.008 | https://attack.mitre.org/techniques/T1055/008 | Linux | Defense Evasion, Privilege Escalation | Adversaries may inject malicious code into processes via ptrace (process trace) system calls in order to evade process-based defenses as well as possibly elevate privileges. Ptrace system call injection is a method of executing arbitrary code in the address space of a separate live process.
Ptrace system call injecti... | Process: Process Modification, Process: OS API Execution, Process: Process Access | Monitoring for Linux specific calls such as the ptrace system call should not generate large amounts of data due to their specialized nature, and can be a very effective method to detect some of the common process injection methods.(Citation: ArtOfMemoryForensics) (Citation: GNU Acct) (Citation: RHEL auditd) (Citati... |
Proc Memory | T1055.009 | https://attack.mitre.org/techniques/T1055/009 | Linux | Defense Evasion, Privilege Escalation | Adversaries may inject malicious code into processes via the /proc filesystem in order to evade process-based defenses as well as possibly elevate privileges. Proc memory injection is a method of executing arbitrary code in the address space of a separate live process.
Proc memory injection involves enumerating the m... | File: File Modification | File system monitoring can determine if /proc files are being modified. Users should not have permission to modify these in most cases.
Analyze process behavior to determine if a process is performing actions it usually does not, such as opening network connections, reading files, or other suspicious actions that cou... |
Extra Window Memory Injection | T1055.011 | https://attack.mitre.org/techniques/T1055/011 | Windows | Defense Evasion, Privilege Escalation | Adversaries may inject malicious code into process via Extra Window Memory (EWM) in order to evade process-based defenses as well as possibly elevate privileges. EWM injection is a method of executing arbitrary code in the address space of a separate live process.
Before creating a window, graphical Windows-based pro... | Process: OS API Execution | Monitor for API calls related to enumerating and manipulating EWM such as GetWindowLong (Citation: Microsoft GetWindowLong function) and SetWindowLong (Citation: Microsoft SetWindowLong function). Malware associated with this technique have also used SendNotifyMessage (Citation: Microsoft SendNotifyMessage function) to... |
Process Hollowing | T1055.012 | https://attack.mitre.org/techniques/T1055/012 | Windows | Defense Evasion, Privilege Escalation | Adversaries may inject malicious code into suspended and hollowed processes in order to evade process-based defenses. Process hollowing is a method of executing arbitrary code in the address space of a separate live process.
Process hollowing is commonly performed by creating a process in a suspended state then unma... | Process: Process Modification, Process: OS API Execution, Process: Process Access | Monitoring Windows API calls indicative of the various types of code injection may generate a significant amount of data and may not be directly useful for defense unless collected under specific circumstances for known bad sequences of calls, since benign use of API functions may be common and difficult to distinguish... |
Process Doppelgänging | T1055.013 | https://attack.mitre.org/techniques/T1055/013 | Windows | Defense Evasion, Privilege Escalation | Adversaries may inject malicious code into process via process doppelgänging in order to evade process-based defenses as well as possibly elevate privileges. Process doppelgänging is a method of executing arbitrary code in the address space of a separate live process.
Windows Transactional NTFS (TxF) was introduced i... | Process: OS API Execution, File: File Metadata | Monitor and analyze calls to `CreateTransaction`, `CreateFileTransacted`, `RollbackTransaction`, and other rarely used functions indicative of TxF activity. Process Doppelgänging also invokes an outdated and undocumented implementation of the Windows process loader via calls to `NtCreateProcessEx` and `NtCreateThreadEx... |
VDSO Hijacking | T1055.014 | https://attack.mitre.org/techniques/T1055/014 | Linux | Defense Evasion, Privilege Escalation | Adversaries may inject malicious code into processes via VDSO hijacking in order to evade process-based defenses as well as possibly elevate privileges. Virtual dynamic shared object (vdso) hijacking is a method of executing arbitrary code in the address space of a separate live process.
VDSO hijacking involves redir... | Process: OS API Execution, Module: Module Load | Monitor for malicious usage of system calls, such as ptrace and mmap, that can be used to attach to, manipulate memory, then redirect a processes' execution path. Monitoring for Linux specific calls such as the ptrace system call should not generate large amounts of data due to their specialized nature, and can be a ve... |
Input Capture | T1056 | https://attack.mitre.org/techniques/T1056 | Linux, macOS, Windows, Network | Collection, Credential Access | Adversaries may use methods of capturing user input to obtain credentials or collect information. During normal system usage, users often provide credentials to various different locations, such as login pages/portals or system dialog boxes. Input capture mechanisms may be transparent to the user (e.g. [Credential API ... | Windows Registry: Windows Registry Key Modification, Driver: Driver Load, Process: OS API Execution, Process: Process Creation, File: File Modification, Process: Process Metadata | Detection may vary depending on how input is captured but may include monitoring for certain Windows API calls (e.g. `SetWindowsHook`, `GetKeyState`, and `GetAsyncKeyState`)(Citation: Adventures of a Keystroke), monitoring for malicious instances of [Command and Scripting Interpreter](T1059), and ensuring no unauthoriz... |
Keylogging | T1056.001 | https://attack.mitre.org/techniques/T1056/001 | Windows, macOS, Linux, Network | Collection, Credential Access | Adversaries may log user keystrokes to intercept credentials as the user types them. Keylogging is likely to be used to acquire credentials for new access opportunities when [OS Credential Dumping](T1003) efforts are not effective, and may require an adversary to intercept keystrokes on a system for a substantial perio... | Windows Registry: Windows Registry Key Modification, Driver: Driver Load, Process: OS API Execution | Keyloggers may take many forms, possibly involving modification to the Registry and installation of a driver, setting a hook, or polling to intercept keystrokes. Commonly used API calls include `SetWindowsHook`, `GetKeyState`, and `GetAsyncKeyState`.(Citation: Adventures of a Keystroke) Monitor the Registry and file sy... |
GUI Input Capture | T1056.002 | https://attack.mitre.org/techniques/T1056/002 | macOS, Windows, Linux | Collection, Credential Access | Adversaries may mimic common operating system GUI components to prompt users for credentials with a seemingly legitimate prompt. When programs are executed that need additional privileges than are present in the current user context, it is common for the operating system to prompt the user for proper credentials to aut... | Script: Script Execution, Command: Command Execution, Process: Process Creation | Monitor process execution for unusual programs as well as malicious instances of [Command and Scripting Interpreter](T1059) that could be used to prompt users for credentials. For example, command/script history including abnormal parameters (such as requests for credentials and/or strings related to creating password ... |
Web Portal Capture | T1056.003 | https://attack.mitre.org/techniques/T1056/003 | Linux, macOS, Windows | Collection, Credential Access | Adversaries may install code on externally facing portals, such as a VPN login page, to capture and transmit credentials of users who attempt to log into the service. For example, a compromised login page may log provided user credentials before logging the user in to the service.
This variation on input capture may b... | File: File Modification | File monitoring may be used to detect changes to files in the Web directory for organization login pages that do not match with authorized updates to the Web server's content. |
Credential API Hooking | T1056.004 | https://attack.mitre.org/techniques/T1056/004 | Windows | Collection, Credential Access | Adversaries may hook into Windows application programming interface (API) functions to collect user credentials. Malicious hooking mechanisms may capture API calls that include parameters that reveal user authentication credentials.(Citation: Microsoft TrojanSpy:Win32/Ursnif.gen!I Sept 2017) Unlike [Keylogging](T1056.0... | Process: OS API Execution, Process: Process Metadata | Monitor for calls to the `SetWindowsHookEx` and `SetWinEventHook` functions, which install a hook procedure.(Citation: Microsoft Hook Overview)(Citation: Volatility Detecting Hooks Sept 2012) Also consider analyzing hook chains (which hold pointers to hook procedures for each type of hook) using tools(Citation: Volatil... |
Process Discovery | T1057 | https://attack.mitre.org/techniques/T1057 | Linux, macOS, Windows | Discovery | Adversaries may attempt to get information about running processes on a system. Information obtained could be used to gain an understanding of common software/applications running on systems within the network. Adversaries may use the information from [Process Discovery](T1057) during automated discovery to shape follo... | Process: Process Creation, Command: Command Execution, Process: OS API Execution | System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained.
Normal, benign s... |
Command and Scripting Interpreter | T1059 | https://attack.mitre.org/techniques/T1059 | Linux, macOS, Windows, Network | Execution | Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries. These interfaces and languages provide ways of interacting with computer systems and are a common feature across many different platforms. Most systems come with some built-in command-line interface and scripting capabiliti... | Command: Command Execution, Process: Process Creation, Module: Module Load, Script: Script Execution | Command-line and scripting activities can be captured through proper logging of process execution with command-line arguments. This information can be useful in gaining additional insight to adversaries' actions through how they use native processes or custom tools. Also monitor for loading of modules associated with s... |
PowerShell | T1059.001 | https://attack.mitre.org/techniques/T1059/001 | Windows | Execution | Adversaries may abuse PowerShell commands and scripts for execution. PowerShell is a powerful interactive command-line interface and scripting environment included in the Windows operating system. (Citation: TechNet PowerShell) Adversaries can use PowerShell to perform a number of actions, including discovery of inform... | Command: Command Execution, Module: Module Load, Process: Process Creation, Script: Script Execution | If proper execution policy is set, adversaries will likely be able to define their own execution policy if they obtain administrator or system access, either through the Registry or at the command line. This change in policy on a system may be a way to detect malicious use of PowerShell. If PowerShell is not used in an... |
AppleScript | T1059.002 | https://attack.mitre.org/techniques/T1059/002 | macOS | Execution | Adversaries may abuse AppleScript for execution. AppleScript is a macOS scripting language designed to control applications and parts of the OS via inter-application messages called AppleEvents.(Citation: Apple AppleScript) These AppleEvent messages can be sent independently or easily scripted with AppleScript. These e... | Command: Command Execution, Process: Process Creation, Process: OS API Execution | Monitor for execution of AppleScript through `osascript` and usage of the `NSAppleScript` and `OSAScript` APIs that may be related to other suspicious behavior occurring on the system. Scripts are likely to perform actions with various effects on a system that may generate events, depending on the types of monitoring u... |
Windows Command Shell | T1059.003 | https://attack.mitre.org/techniques/T1059/003 | Windows | Execution | Adversaries may abuse the Windows command shell for execution. The Windows command shell ([cmd](S0106)) is the primary command prompt on Windows systems. The Windows command prompt can be used to control almost any aspect of a system, with various permission levels required for different subsets of commands. The comman... | Command: Command Execution, Process: Process Creation | Usage of the Windows command shell may be common on administrator, developer, or power user systems depending on job function. If scripting is restricted for normal users, then any attempt to enable scripts running on a system would be considered suspicious. If scripts are not commonly used on a system, but enabled, sc... |
End of preview.
README.md exists but content is empty.
- Downloads last month
- 83