Description
stringlengths
207
4.68k
Domains
stringclasses
2 values
Name
stringlengths
2
57
References
stringlengths
97
4.83k
Kill Chain
stringclasses
14 values
Platforms
stringclasses
10 values
Adversaries may target user email on local systems to collect sensitive information. Files containing email data can be acquired from a user’s local system, such as Outlook storage or cache files. Outlook stores data locally in offline data files with an extension of .ost. Outlook 2010 and later supports .ost file siz...
enterprise-attack
Local Email Collection
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1114/001 external_id: T1114.001 source_name: Outlook File Sizes description: N. O'Bryan. (2018, May 30). Managing Outlook Cached Mode and OST File Sizes. Retrieved February 19, 2020. url: https://practical365.com/clients/office-365-proplus/outl...
kill_chain_name: mitre-attack phase_name: collection
Windows
Adversaries may acquire credentials from Keychain. Keychain (or Keychain Services) is the macOS credential management system that stores account names, passwords, private keys, certificates, sensitive application data, payment data, and secure notes. There are three types of Keychains: Login Keychain, System Keychain, ...
enterprise-attack
Keychain
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1555/001 external_id: T1555.001 source_name: External to DA, the OS X Way description: Alex Rymdeko-Harvey, Steve Borosh. (2016, May 14). External to DA, the OS X Way. Retrieved July 3, 2017. url: http://www.slideshare.net/StephanBorosh/externa...
kill_chain_name: mitre-attack phase_name: credential-access
macOS
Adversaries may configure system settings to automatically execute a program during system boot or logon to maintain persistence or gain higher-level privileges on compromised systems. Operating systems may have mechanisms for automatically running a program on system boot or account logon.(Citation: Microsoft Run Key)...
enterprise-attack
Boot or Logon Autostart Execution
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1547 external_id: T1547 source_name: Cylance Reg Persistence Sept 2013 description: Langendorf, S. (2013, September 24). Windows Registry Persistence, Part 2: The Run Keys and Search-Order. Retrieved April 11, 2018. url: https://blog.cylance.co...
kill_chain_name: mitre-attack phase_name: privilege-escalation
Linux
Adversaries with SYSTEM access to a host may attempt to access Local Security Authority (LSA) secrets, which can contain a variety of different credential materials, such as credentials for service accounts.(Citation: Passcape LSA Secrets)(Citation: Microsoft AD Admin Tier Model)(Citation: Tilbury Windows Credentials) ...
enterprise-attack
LSA Secrets
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1003/004 external_id: T1003.004 source_name: Passcape LSA Secrets description: Passcape. (n.d.). Windows LSA secrets. Retrieved February 21, 2020. url: https://www.passcape.com/index.php?section=docsys&cmd=details&id=23 source_name: Microso...
kill_chain_name: mitre-attack phase_name: credential-access
Windows
Adversaries may compromise a network device’s encryption capability in order to bypass encryption that would otherwise protect data communications. (Citation: Cisco Synful Knock Evolution) Encryption can be used to protect transmitted network traffic to maintain its confidentiality (protect against unauthorized disclo...
enterprise-attack
Weaken Encryption
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1600 external_id: T1600 source_name: Cisco Synful Knock Evolution description: Graham Holmes. (2015, October 8). Evolution of attacks on Cisco IOS devices. Retrieved October 19, 2020. url: https://blogs.cisco.com/security/evolution-of-attacks-o...
kill_chain_name: mitre-attack phase_name: defense-evasion
Network
An adversary may forge SAML tokens with any permissions claims and lifetimes if they possess a valid SAML token-signing certificate.(Citation: Microsoft SolarWinds Steps) The default lifetime of a SAML token is one hour, but the validity period can be specified in the <code>NotOnOrAfter</code> value of the <code>condit...
enterprise-attack
SAML Tokens
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1606/002 external_id: T1606.002 source_name: Microsoft SolarWinds Steps description: Lambert, J. (2020, December 13). Important steps for customers to protect themselves from recent nation-state cyberattacks. Retrieved December 17, 2020. url: h...
kill_chain_name: mitre-attack phase_name: credential-access
Azure AD
Adversaries may masquerade malicious payloads as legitimate files through changes to the payload's formatting, including the file’s signature, extension, and contents. Various file types have a typical standard format, including how they are encoded and organized. For example, a file’s signature (also known as header o...
enterprise-attack
Masquerade File Type
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1036/008 external_id: T1036.008 source_name: polygot_icedID description: Lim, M. (2022, September 27). More Than Meets the Eye: Exposing a Polyglot File That Delivers IcedID. Retrieved September 29, 2022. url: https://unit42.paloaltonetworks.co...
kill_chain_name: mitre-attack phase_name: defense-evasion
Linux
Adversaries may stop or disable services on a system to render those services unavailable to legitimate users. Stopping critical services or processes can inhibit or stop response to an incident or aid in the adversary's overall objectives to cause damage to the environment.(Citation: Talos Olympic Destroyer 2018)(Cita...
enterprise-attack
Service Stop
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1489 external_id: T1489 source_name: SecureWorks WannaCry Analysis description: Counter Threat Unit Research Team. (2017, May 18). WCry Ransomware Analysis. Retrieved March 26, 2019. url: https://www.secureworks.com/research/wcry-ransomware-ana...
kill_chain_name: mitre-attack phase_name: impact
Windows
Adversaries may develop malware and malware components that can be used during targeting. Building malicious software can include the development of payloads, droppers, post-compromise tools, backdoors (including backdoored images), packers, C2 protocols, and the creation of infected removable media. Adversaries may de...
enterprise-attack
Malware
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1587/001 external_id: T1587.001 source_name: Mandiant APT1 description: Mandiant. (n.d.). APT1 Exposing One of China’s Cyber Espionage Units. Retrieved July 18, 2016. url: https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-a...
kill_chain_name: mitre-attack phase_name: resource-development
PRE
Adversaries may attempt to enumerate local device drivers on a victim host. Information about device drivers may highlight various insights that shape follow-on behaviors, such as the function/purpose of the host, present security tools (i.e. [Security Software Discovery](https://attack.mitre.org/techniques/T1518/001))...
enterprise-attack
Device Driver Discovery
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1652 external_id: T1652 source_name: lsmod man description: Kerrisk, M. (2022, December 18). lsmod(8) — Linux manual page. Retrieved March 28, 2023. url: https://man7.org/linux/man-pages/man8/lsmod.8.html source_name: Microsoft Registry Dri...
kill_chain_name: mitre-attack phase_name: discovery
Linux
Adversaries may attempt to get a listing of domain accounts. This information can help adversaries determine which domain accounts exist to aid in follow-on behavior such as targeting specific accounts which possess particular privileges. Commands such as <code>net user /domain</code> and <code>net group /domain</code...
enterprise-attack
Domain Account
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1087/002 external_id: T1087.002 source_name: CrowdStrike StellarParticle January 2022 description: CrowdStrike. (2022, January 27). Early Bird Catches the Wormhole: Observations from the StellarParticle Campaign. Retrieved February 7, 2022. url...
kill_chain_name: mitre-attack phase_name: discovery
Linux
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine. Active Setup is a Windows mechanism that is used to execute programs when a user logs in. The value stored in the Registry key will be executed after a user logs into the computer.(Citation: Klein Active Setup 2010) T...
enterprise-attack
Active Setup
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1547/014 external_id: T1547.014 source_name: SECURELIST Bright Star 2015 description: Baumgartner, K., Guerrero-Saade, J. (2015, March 4). Who’s Really Spreading through the Bright Star?. Retrieved December 18, 2020. url: https://securelist.com...
kill_chain_name: mitre-attack phase_name: privilege-escalation
Windows
Adversaries may attempt to hide artifacts associated with their behaviors to evade detection. Operating systems may have features to hide various artifacts, such as important system files and administrative task execution, to avoid disrupting user work environments and prevent users from changing files or features on t...
enterprise-attack
Hide Artifacts
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1564 external_id: T1564 source_name: Cybereason OSX Pirrit description: Amit Serper. (2016). Cybereason Lab Analysis OSX.Pirrit. Retrieved December 10, 2021. url: https://cdn2.hubspot.net/hubfs/3354902/Content%20PDFs/Cybereason-Lab-Analysis-OSX...
kill_chain_name: mitre-attack phase_name: defense-evasion
Linux
Adversaries may use Windows Dynamic Data Exchange (DDE) to execute arbitrary commands. DDE is a client-server protocol for one-time and/or continuous inter-process communication (IPC) between applications. Once a link is established, applications can autonomously exchange transactions consisting of strings, warm data l...
enterprise-attack
Dynamic Data Exchange
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1559/002 external_id: T1559.002 source_name: OWASP CSV Injection description: Albinowax Timo Goosen. (n.d.). CSV Injection. Retrieved February 7, 2022. url: https://owasp.org/www-community/attacks/CSV_Injection source_name: CSV Excel Macro...
kill_chain_name: mitre-attack phase_name: execution
Windows
An adversary may rely upon a user opening a malicious file in order to gain execution. Users may be subjected to social engineering to get them to open a file that will lead to code execution. This user action will typically be observed as follow-on behavior from [Spearphishing Attachment](https://attack.mitre.org/tech...
enterprise-attack
Malicious File
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1204/002 external_id: T1204.002 source_name: Password Protected Word Docs description: Lawrence Abrams. (2017, July 12). PSA: Don't Open SPAM Containing Password Protected Word Docs. Retrieved January 5, 2022. url: https://www.bleepingcomputer....
kill_chain_name: mitre-attack phase_name: execution
Linux
Adversaries may gather information about the victim's business tempo that can be used during targeting. Information about an organization’s business tempo may include a variety of details, including operational hours/days of the week. This information may also reveal times/dates of purchases and shipments of the victim...
enterprise-attack
Identify Business Tempo
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1591/003 external_id: T1591.003 source_name: ThreatPost Broadvoice Leak description: Seals, T. (2020, October 15). Broadvoice Leak Exposes 350M Records, Personal Voicemail Transcripts. Retrieved October 20, 2020. url: https://threatpost.com/bro...
kill_chain_name: mitre-attack phase_name: reconnaissance
PRE
Adversaries may gather information about the victim's host hardware that can be used during targeting. Information about hardware infrastructure may include a variety of details such as types and versions on specific hosts, as well as the presence of additional components that might be indicative of added defensive pro...
enterprise-attack
Hardware
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1592/001 external_id: T1592.001 source_name: ATT ScanBox description: Blasco, J. (2014, August 28). Scanbox: A Reconnaissance Framework Used with Watering Hole Attacks. Retrieved October 19, 2020. url: https://cybersecurity.att.com/blogs/labs-r...
kill_chain_name: mitre-attack phase_name: reconnaissance
PRE
Adversaries may deliver payloads to remote systems by adding content to shared storage locations, such as network drives or internal code repositories. Content stored on network drives or in other shared locations may be tainted by adding malicious programs, scripts, or exploit code to otherwise valid files. Once a us...
enterprise-attack
Taint Shared Content
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1080 external_id: T1080 source_name: Retwin Directory Share Pivot description: Routin, D. (2017, November 13). Abusing network shares for efficient lateral movements and privesc (DirSharePivot). Retrieved April 12, 2018. url: https://rewtin.blo...
kill_chain_name: mitre-attack phase_name: lateral-movement
Windows
Adversaries may add new domain trusts, modify the properties of existing domain trusts, or otherwise change the configuration of trust relationships between domains and tenants to evade defenses and/or elevate privileges.Trust details, such as whether or not user identities are federated, allow authentication and autho...
enterprise-attack
Trust Modification
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1484/002 external_id: T1484.002 source_name: CISA SolarWinds Cloud Detection description: CISA. (2021, January 8). Detecting Post-Compromise Threat Activity in Microsoft Cloud Environments. Retrieved January 8, 2021. url: https://us-cert.cisa.g...
kill_chain_name: mitre-attack phase_name: privilege-escalation
Windows
Adversaries may employ a known symmetric encryption algorithm to conceal command and control traffic rather than relying on any inherent protections provided by a communication protocol. Symmetric encryption algorithms use the same key for plaintext encryption and ciphertext decryption. Common symmetric encryption algo...
enterprise-attack
Symmetric Cryptography
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1573/001 external_id: T1573.001 source_name: University of Birmingham C2 description: Gardiner, J., Cova, M., Nagaraja, S. (2014, February). Command & Control Understanding, Denying and Detecting. Retrieved April 20, 2016. url: https://arxiv.o...
kill_chain_name: mitre-attack phase_name: command-and-control
Linux
Adversaries may attempt to get a listing of local system accounts. This information can help adversaries determine which local accounts exist on a system to aid in follow-on behavior. Commands such as <code>net user</code> and <code>net localgroup</code> of the [Net](https://attack.mitre.org/software/S0039) utility an...
enterprise-attack
Local Account
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1087/001 external_id: T1087.001 source_name: id man page description: MacKenzie, D. and Robbins, A. (n.d.). id(1) - Linux man page. Retrieved January 11, 2024. url: https://linux.die.net/man/1/id source_name: groups man page description: M...
kill_chain_name: mitre-attack phase_name: discovery
Linux
Adversaries may compromise social media accounts that can be used during targeting. For operations incorporating social engineering, the utilization of an online persona may be important. Rather than creating and cultivating social media profiles (i.e. [Social Media Accounts](https://attack.mitre.org/techniques/T1585/0...
enterprise-attack
Social Media Accounts
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1586/001 external_id: T1586.001 source_name: AnonHBGary description: Bright, P. (2011, February 15). Anonymous speaks: the inside story of the HBGary hack. Retrieved March 9, 2017. url: https://arstechnica.com/tech-policy/2011/02/anonymous-spea...
kill_chain_name: mitre-attack phase_name: resource-development
PRE
Adversaries may abuse Windows safe mode to disable endpoint defenses. Safe mode starts up the Windows operating system with a limited set of drivers and services. Third-party security software such as endpoint detection and response (EDR) tools may not start after booting Windows in safe mode. There are two versions of...
enterprise-attack
Safe Mode Boot
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1562/009 external_id: T1562.009 source_name: Microsoft Safe Mode description: Microsoft. (n.d.). Start your PC in safe mode in Windows 10. Retrieved June 23, 2021. url: https://support.microsoft.com/en-us/windows/start-your-pc-in-safe-mode-in-w...
kill_chain_name: mitre-attack phase_name: defense-evasion
Windows
Adversaries may abuse netbooting to load an unauthorized network device operating system from a Trivial File Transfer Protocol (TFTP) server. TFTP boot (netbooting) is commonly used by network administrators to load configuration-controlled network device images from a centralized management server. Netbooting is one o...
enterprise-attack
TFTP Boot
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1542/005 external_id: T1542.005 source_name: Cisco Blog Legacy Device Attacks description: Omar Santos. (2020, October 19). Attackers Continue to Target Legacy Devices. Retrieved October 20, 2020. url: https://community.cisco.com/t5/security-bl...
kill_chain_name: mitre-attack phase_name: persistence
Network
Adversaries may create or modify Windows services to repeatedly execute malicious payloads as part of persistence. When Windows boots up, it starts programs or applications called services that perform background system functions.(Citation: TechNet Services) Windows service configuration information, including the file...
enterprise-attack
Windows Service
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1543/003 external_id: T1543.003 source_name: Microsoft Windows Event Forwarding FEB 2018 description: Hardy, T. & Hall, J. (2018, February 15). Use Windows Event Forwarding to help with intrusion detection. Retrieved August 7, 2018. url: https:...
kill_chain_name: mitre-attack phase_name: privilege-escalation
Windows
Adversaries may use Fast Flux DNS to hide a command and control channel behind an array of rapidly changing IP addresses linked to a single domain resolution. This technique uses a fully qualified domain name, with multiple IP addresses assigned to it which are swapped with high frequency, using a combination of round ...
enterprise-attack
Fast Flux DNS
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1568/001 external_id: T1568.001 source_name: MehtaFastFluxPt1 description: Mehta, L. (2014, December 17). Fast Flux Networks Working and Detection, Part 1. Retrieved March 6, 2017. url: https://resources.infosecinstitute.com/fast-flux-networks-...
kill_chain_name: mitre-attack phase_name: command-and-control
Linux
Adversaries may employ various system checks to detect and avoid virtualization and analysis environments. This may include changing behaviors based on the results of checks for the presence of artifacts indicative of a virtual machine environment (VME) or sandbox. If the adversary detects a VME, they may alter their m...
enterprise-attack
System Checks
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1497/001 external_id: T1497.001 source_name: Unit 42 OilRig Sept 2018 description: Falcone, R., et al. (2018, September 04). OilRig Targets a Middle Eastern Government and Adds Evasion Techniques to OopsIE. Retrieved September 24, 2018. url: ht...
kill_chain_name: mitre-attack phase_name: discovery
Linux
Adversaries may abuse the <code>cron</code> utility to perform task scheduling for initial or recurring execution of malicious code.(Citation: 20 macOS Common Tools and Techniques) The <code>cron</code> utility is a time-based job scheduler for Unix-like operating systems. The <code> crontab</code> file contains the s...
enterprise-attack
Cron
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1053/003 external_id: T1053.003 source_name: 20 macOS Common Tools and Techniques description: Phil Stokes. (2021, February 16). 20 Common Tools & Techniques Used by macOS Threat Actors & Malware. Retrieved August 23, 2021. url: https://labs.se...
kill_chain_name: mitre-attack phase_name: privilege-escalation
Linux
Adversaries may attempt to find domain-level groups and permission settings. The knowledge of domain-level permission groups can help adversaries determine which groups exist and which users belong to a particular group. Adversaries may use this information to determine which users have elevated permissions, such as do...
enterprise-attack
Domain Groups
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1069/002 external_id: T1069.002
kill_chain_name: mitre-attack phase_name: discovery
Linux
Adversaries may acquire information about vulnerabilities that can be used during targeting. A vulnerability is a weakness in computer hardware or software that can, potentially, be exploited by an adversary to cause unintended or unanticipated behavior to occur. Adversaries may find vulnerability information by search...
enterprise-attack
Vulnerabilities
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1588/006 external_id: T1588.006 source_name: National Vulnerability Database description: National Vulnerability Database. (n.d.). National Vulnerability Database. Retrieved October 15, 2020. url: https://nvd.nist.gov/
kill_chain_name: mitre-attack phase_name: resource-development
PRE
Adversaries may send spearphishing emails with a malicious link in an attempt to gain access to victim systems. Spearphishing with a link is a specific variant of spearphishing. It is different from other forms of spearphishing in that it employs the use of links to download malware contained in email, instead of attac...
enterprise-attack
Spearphishing Link
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1566/002 external_id: T1566.002 source_name: ACSC Email Spoofing description: Australian Cyber Security Centre. (2012, December). Mitigating Spoofed Emails Using Sender Policy Framework. Retrieved October 19, 2020. url: https://www.cyber.gov.au...
kill_chain_name: mitre-attack phase_name: initial-access
Linux
Adversaries may clear system logs to hide evidence of an intrusion. macOS and Linux both keep track of system or user-initiated actions via system logs. The majority of native system logging is stored under the <code>/var/log/</code> directory. Subfolders in this directory categorize logs by their related functions, su...
enterprise-attack
Clear Linux or Mac System Logs
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1070/002 external_id: T1070.002 source_name: Linux Logs description: Marcel. (2018, April 19). 12 Critical Linux Log Files You Must be Monitoring. Retrieved March 29, 2020. url: https://www.eurovps.com/blog/important-linux-log-files-you-must-be...
kill_chain_name: mitre-attack phase_name: defense-evasion
Linux
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users. (Citation: Sucuri BIND9 August 2015) Some systems may automatically restart critical applications and services when crashes occur, but they can likely be re-exploited to cause a persistent d...
enterprise-attack
Application or System Exploitation
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1499/004 external_id: T1499.004 source_name: Sucuri BIND9 August 2015 description: Cid, D.. (2015, August 2). BIND9 – Denial of Service Exploit in the Wild. Retrieved April 26, 2019. url: https://blog.sucuri.net/2015/08/bind9-denial-of-service-...
kill_chain_name: mitre-attack phase_name: impact
Windows
Adversaries may leverage Microsoft Office-based applications for persistence between startups. Microsoft Office is a fairly common application suite on Windows-based operating systems within an enterprise network. There are multiple mechanisms that can be used with Office for persistence when an Office-based applicatio...
enterprise-attack
Office Application Startup
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1137 external_id: T1137 source_name: SensePost Ruler GitHub description: SensePost. (2016, August 18). Ruler: A tool to abuse Exchange services. Retrieved February 4, 2019. url: https://github.com/sensepost/ruler source_name: TechNet O365 O...
kill_chain_name: mitre-attack phase_name: persistence
Windows
Adversaries may use InstallUtil to proxy execution of code through a trusted Windows utility. InstallUtil is a command-line utility that allows for installation and uninstallation of resources by executing specific installer components specified in .NET binaries. (Citation: MSDN InstallUtil) The InstallUtil binary may ...
enterprise-attack
InstallUtil
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1218/004 external_id: T1218.004 source_name: MSDN InstallUtil description: Microsoft. (n.d.). Installutil.exe (Installer Tool). Retrieved July 1, 2016. url: https://msdn.microsoft.com/en-us/library/50614e95.aspx source_name: LOLBAS Installu...
kill_chain_name: mitre-attack phase_name: defense-evasion
Windows
Adversaries may send spearphishing messages with a malicious link to elicit sensitive information that can be used during targeting. Spearphishing for information is an attempt to trick targets into divulging information, frequently credentials or other actionable information. Spearphishing for information frequently i...
enterprise-attack
Spearphishing Link
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1598/003 external_id: T1598.003 source_name: ACSC Email Spoofing description: Australian Cyber Security Centre. (2012, December). Mitigating Spoofed Emails Using Sender Policy Framework. Retrieved October 19, 2020. url: https://www.cyber.gov.au...
kill_chain_name: mitre-attack phase_name: reconnaissance
PRE
Adversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to log into remote machines using Secure Shell (SSH). The adversary may then perform actions as the logged-on user. SSH is a protocol that allows authorized users to open remote shells on other computers. Many Linux and macOS versions come...
enterprise-attack
SSH
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1021/004 external_id: T1021.004 source_name: Apple Unified Log Analysis Remote Login and Screen Sharing description: Sarah Edwards. (2020, April 30). Analysis of Apple Unified Logs: Quarantine Edition [Entry 6] – Working From Home? Remote Logins...
kill_chain_name: mitre-attack phase_name: lateral-movement
Linux
An adversary may add additional roles or permissions to an adversary-controlled cloud account to maintain persistent access to a tenant. For example, adversaries may update IAM policies in cloud-based environments or add a new global administrator in Office 365 environments.(Citation: AWS IAM Policies and Permissions)(...
enterprise-attack
Additional Cloud Roles
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1098/003 external_id: T1098.003 source_name: Expel AWS Attacker description: Brian Bahtiarian, David Blanton, Britton Manahan and Kyle Pellett. (2022, April 5). Incident report: From CLI to console, chasing an attacker in AWS. Retrieved April 7...
kill_chain_name: mitre-attack phase_name: privilege-escalation
Office 365
Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation. Print processors are DLLs that are loaded by the print spooler service, `spoolsv.exe`, during boot.(Citation: Microsoft Intro Print Processors) Adversaries may abuse the print spooler service by...
enterprise-attack
Print Processors
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1547/012 external_id: T1547.012 source_name: Microsoft AddPrintProcessor May 2018 description: Microsoft. (2018, May 31). AddPrintProcessor function. Retrieved October 5, 2020. url: https://docs.microsoft.com/en-us/windows/win32/printdocs/addpr...
kill_chain_name: mitre-attack phase_name: privilege-escalation
Windows
Adversaries may send spearphishing emails with a malicious attachment in an attempt to gain access to victim systems. Spearphishing attachment is a specific variant of spearphishing. Spearphishing attachment is different from other forms of spearphishing in that it employs the use of malware attached to an email. All f...
enterprise-attack
Spearphishing Attachment
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1566/001 external_id: T1566.001 source_name: ACSC Email Spoofing description: Australian Cyber Security Centre. (2012, December). Mitigating Spoofed Emails Using Sender Policy Framework. Retrieved October 19, 2020. url: https://www.cyber.gov.au...
kill_chain_name: mitre-attack phase_name: initial-access
macOS
Adversaries may attempt to make a payload difficult to analyze by removing symbols, strings, and other human readable information. Scripts and executables may contain variables names and other strings that help developers document code functionality. Symbols are often created by an operating system’s `linker` when exec...
enterprise-attack
Stripped Payloads
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1027/008 external_id: T1027.008 source_name: intezer stripped binaries elf files 2018 description: Ignacio Sanmillan. (2018, February 7). Executable and Linkable Format 101. Part 2: Symbols. Retrieved September 29, 2022. url: https://www.inteze...
kill_chain_name: mitre-attack phase_name: defense-evasion
macOS
Adversaries may use the Windows Component Object Model (COM) for local code execution. COM is an inter-process communication (IPC) component of the native Windows application programming interface (API) that enables interaction between software objects, or executable code that implements one or more interfaces.(Citatio...
enterprise-attack
Component Object Model
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1559/001 external_id: T1559.001 source_name: Fireeye Hunting COM June 2019 description: Hamilton, C. (2019, June 4). Hunting COM Objects. Retrieved June 10, 2019. url: https://www.fireeye.com/blog/threat-research/2019/06/hunting-com-objects.htm...
kill_chain_name: mitre-attack phase_name: execution
Windows
Adversaries may execute their own malicious payloads by hijacking the search order used to load DLLs. Windows systems use a common method to look for required DLLs to load into a program. (Citation: Microsoft Dynamic Link Library Search Order)(Citation: FireEye Hijacking July 2010) Hijacking DLL loads may be for the pu...
enterprise-attack
DLL Search Order Hijacking
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1574/001 external_id: T1574.001 source_name: Adversaries Hijack DLLs description: CrowdStrike, Falcon OverWatch Team. (2022, December 30). Retrieved October 19, 2023. url: https://www.crowdstrike.com/blog/4-ways-adversaries-hijack-dlls/ sou...
kill_chain_name: mitre-attack phase_name: defense-evasion
Windows
Once established within a system or network, an adversary may use automated techniques for collecting internal data. Methods for performing this technique could include use of a [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059) to search for and copy information fitting set criteria such as...
enterprise-attack
Automated Collection
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1119 external_id: T1119 source_name: Mandiant UNC3944 SMS Phishing 2023 description: Mandiant Intelligence. (2023, September 14). Why Are You Texting Me? UNC3944 Leverages SMS Phishing Campaigns for SIM Swapping, Ransomware, Extortion, and Notor...
kill_chain_name: mitre-attack phase_name: collection
Linux
Adversaries may collect data stored in the clipboard from users copying information within or between applications. For example, on Windows adversaries can access clipboard data by using <code>clip.exe</code> or <code>Get-Clipboard</code>.(Citation: MSDN Clipboard)(Citation: clip_win_server)(Citation: CISA_AA21_200B)...
enterprise-attack
Clipboard Data
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1115 external_id: T1115 source_name: CISA_AA21_200B description: CISA. (2021, August 20). Alert (AA21-200B) Chinese State-Sponsored Cyber Operations: Observed TTPs. Retrieved June 21, 2022. url: https://www.cisa.gov/uscert/ncas/alerts/aa21-200b...
kill_chain_name: mitre-attack phase_name: collection
Linux
Adversaries may gather credentials from the proc filesystem or `/proc`. The proc filesystem is a pseudo-filesystem used as an interface to kernel data structures for Linux based systems managing virtual memory. For each process, the `/proc/<PID>/maps` file shows how memory is mapped within the process’s virtual address...
enterprise-attack
Proc Filesystem
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1003/007 external_id: T1003.007 source_name: atomic-red proc file system description: Atomic Red Team. (2023, November). T1003.007 - OS Credential Dumping: Proc Filesystem. Retrieved March 28, 2024. url: https://github.com/redcanaryco/atomic-re...
kill_chain_name: mitre-attack phase_name: credential-access
Linux
Adversaries may buy, lease, or rent a network of compromised systems that can be used during targeting. A botnet is a network of compromised systems that can be instructed to perform coordinated tasks.(Citation: Norton Botnet) Adversaries may purchase a subscription to use an existing botnet from a booter/stresser serv...
enterprise-attack
Botnet
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1583/005 external_id: T1583.005 source_name: Norton Botnet description: Norton. (n.d.). What is a botnet?. Retrieved October 4, 2020. url: https://us.norton.com/internetsecurity-malware-what-is-a-botnet.html source_name: Imperva DDoS for Hi...
kill_chain_name: mitre-attack phase_name: resource-development
PRE
Adversaries may acquire user credentials from third-party password managers.(Citation: ise Password Manager February 2019) Password managers are applications designed to store user credentials, normally in an encrypted database. Credentials are typically accessible after a user provides a master password that unlocks t...
enterprise-attack
Password Managers
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1555/005 external_id: T1555.005 source_name: ise Password Manager February 2019 description: ise. (2019, February 19). Password Managers: Under the Hood of Secrets Management. Retrieved January 22, 2021. url: https://www.ise.io/casestudies/pass...
kill_chain_name: mitre-attack phase_name: credential-access
Linux
Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apple’s security model to ensure only trusted applications are executed on a host. Gatekeeper was built on top of File Quarantine in ...
enterprise-attack
Gatekeeper Bypass
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1553/001 external_id: T1553.001 source_name: Application Bundle Manipulation Brandon Dalton description: Brandon Dalton. (2022, August 9). A bundle of nerves: Tweaking macOS security controls to thwart application bundle manipulation. Retrieved ...
kill_chain_name: mitre-attack phase_name: defense-evasion
macOS
Adversaries may prepare an operational environment to infect systems that visit a website over the normal course of browsing. Endpoint systems may be compromised through browsing to adversary controlled sites, as in [Drive-by Compromise](https://attack.mitre.org/techniques/T1189). In such cases, the user's web browser ...
enterprise-attack
Drive-by Target
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1608/004 external_id: T1608.004 source_name: ATT ScanBox description: Blasco, J. (2014, August 28). Scanbox: A Reconnaissance Framework Used with Watering Hole Attacks. Retrieved October 19, 2020. url: https://cybersecurity.att.com/blogs/labs-r...
kill_chain_name: mitre-attack phase_name: resource-development
PRE
Adversaries may try to gather information about registered local system services. Adversaries may obtain information about services using tools as well as OS utility commands such as <code>sc query</code>, <code>tasklist /svc</code>, <code>systemctl --type=service</code>, and <code>net start</code>. Adversaries may us...
enterprise-attack
System Service Discovery
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1007 external_id: T1007
kill_chain_name: mitre-attack phase_name: discovery
Windows
Adversaries may passively sniff network traffic to capture information about an environment, including authentication material passed over the network. Network sniffing refers to using the network interface on a system to monitor or capture information sent over a wired or wireless connection. An adversary may place a ...
enterprise-attack
Network Sniffing
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1040 external_id: T1040 source_name: AWS Traffic Mirroring description: Amazon Web Services. (n.d.). How Traffic Mirroring works. Retrieved March 17, 2022. url: https://docs.aws.amazon.com/vpc/latest/mirroring/traffic-mirroring-how-it-works.htm...
kill_chain_name: mitre-attack phase_name: discovery
Linux
Adversaries may create, acquire, or steal code signing materials to sign their malware or tools. Code signing provides a level of authenticity on a binary from the developer and a guarantee that the binary has not been tampered with. (Citation: Wikipedia Code Signing) The certificates used during an operation may be cr...
enterprise-attack
Code Signing
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1553/002 external_id: T1553.002 source_name: EclecticLightChecksonEXECodeSigning description: Howard Oakley. (2020, November 16). Checks on executable code in Catalina and Big Sur: a first draft. Retrieved September 21, 2022. url: https://eclec...
kill_chain_name: mitre-attack phase_name: defense-evasion
macOS
Adversaries may access data from cloud storage. Many IaaS providers offer solutions for online data object storage such as Amazon S3, Azure Storage, and Google Cloud Storage. Similarly, SaaS enterprise platforms such as Office 365 and Google Workspace provide cloud-based document storage to users through services such...
enterprise-attack
Data from Cloud Storage
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1530 external_id: T1530 source_name: Amazon S3 Security, 2019 description: Amazon. (2019, May 17). How can I secure the files in my Amazon S3 bucket?. Retrieved October 4, 2019. url: https://aws.amazon.com/premiumsupport/knowledge-center/secure...
kill_chain_name: mitre-attack phase_name: collection
IaaS
Adversaries may modify systems in order to manipulate the data as it is accessed and displayed to an end user, thus threatening the integrity of the data.(Citation: FireEye APT38 Oct 2018)(Citation: DOJ Lazarus Sony 2018) By manipulating runtime data, adversaries may attempt to affect a business process, organizational...
enterprise-attack
Runtime Data Manipulation
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1565/003 external_id: T1565.003 source_name: FireEye APT38 Oct 2018 description: FireEye. (2018, October 03). APT38: Un-usual Suspects. Retrieved November 6, 2018. url: https://content.fireeye.com/apt/rpt-apt38 source_name: DOJ Lazarus Sony...
kill_chain_name: mitre-attack phase_name: impact
Linux
Adversaries may search the Registry on compromised systems for insecurely stored credentials. The Windows Registry stores configuration information that can be used by the system or other programs. Adversaries may query the Registry looking for credentials and passwords that have been stored for use by other programs o...
enterprise-attack
Credentials in Registry
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1552/002 external_id: T1552.002 source_name: Pentestlab Stored Credentials description: netbiosX. (2017, April 19). Stored Credentials. Retrieved April 6, 2018. url: https://pentestlab.blog/2017/04/19/stored-credentials/
kill_chain_name: mitre-attack phase_name: credential-access
Windows
Adversaries may look for folders and drives shared on remote systems as a means of identifying sources of information to gather as a precursor for Collection and to identify potential systems of interest for Lateral Movement. Networks often contain shared network drives and folders that enable users to access file dire...
enterprise-attack
Network Share Discovery
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1135 external_id: T1135 source_name: TechNet Shared Folder description: Microsoft. (n.d.). Share a Folder or Drive. Retrieved June 30, 2017. url: https://technet.microsoft.com/library/cc770880.aspx source_name: Wikipedia Shared Resource de...
kill_chain_name: mitre-attack phase_name: discovery
macOS
Adversaries may attempt to gather information about attached peripheral devices and components connected to a computer system.(Citation: Peripheral Discovery Linux)(Citation: Peripheral Discovery macOS) Peripheral devices could include auxiliary resources that support a variety of functionalities such as keyboards, pri...
enterprise-attack
Peripheral Device Discovery
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1120 external_id: T1120 source_name: Peripheral Discovery Linux description: Shahriar Shovon. (2018, March). List USB Devices Linux. Retrieved March 11, 2022. url: https://linuxhint.com/list-usb-devices-linux/ source_name: Peripheral Discov...
kill_chain_name: mitre-attack phase_name: discovery
Windows
An adversary may attempt to evade process tree-based analysis by modifying executed malware's parent process ID (PPID). If endpoint protection software leverages the “parent-child" relationship for detection, breaking this relationship could result in the adversary’s behavior not being associated with previous process ...
enterprise-attack
Break Process Trees
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1036/009 external_id: T1036.009 source_name: 3OHA double-fork 2022 description: Juan Tapiador. (2022, April 11). UNIX daemonization and the double fork. Retrieved September 29, 2023. url: https://0xjet.github.io/3OHA/2022/04/11/post.html so...
kill_chain_name: mitre-attack phase_name: defense-evasion
Linux
Adversaries may gather information about the victim's network topology that can be used during targeting. Information about network topologies may include a variety of details, including the physical and/or logical arrangement of both external-facing and internal network environments. This information may also include ...
enterprise-attack
Network Topology
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1590/004 external_id: T1590.004 source_name: DNS Dumpster description: Hacker Target. (n.d.). DNS Dumpster. Retrieved October 20, 2020. url: https://dnsdumpster.com/
kill_chain_name: mitre-attack phase_name: reconnaissance
PRE
Adversaries may create self-signed code signing certificates that can be used during targeting. Code signing is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted. Code signing provides a level of authenticity for a progr...
enterprise-attack
Code Signing Certificates
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1587/002 external_id: T1587.002 source_name: Wikipedia Code Signing description: Wikipedia. (2015, November 10). Code Signing. Retrieved March 31, 2016. url: https://en.wikipedia.org/wiki/Code_signing
kill_chain_name: mitre-attack phase_name: resource-development
PRE
Adversaries may modify file or directory permissions/attributes to evade access control lists (ACLs) and access protected files.(Citation: Hybrid Analysis Icacls1 June 2018)(Citation: Hybrid Analysis Icacls2 May 2018) File and directory permissions are commonly managed by ACLs configured by the file or directory owner,...
enterprise-attack
Windows File and Directory Permissions Modification
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1222/001 external_id: T1222.001 source_name: Hybrid Analysis Icacls1 June 2018 description: Hybrid Analysis. (2018, June 12). c9b65b764985dfd7a11d3faf599c56b8.exe. Retrieved August 19, 2018. url: https://www.hybrid-analysis.com/sample/ef0d26288...
kill_chain_name: mitre-attack phase_name: defense-evasion
Windows
Adversaries may abuse Microsoft Office add-ins to obtain persistence on a compromised system. Office add-ins can be used to add functionality to Office programs. (Citation: Microsoft Office Add-ins) There are different types of add-ins that can be used by the various Office products; including Word/Excel add-in Librari...
enterprise-attack
Add-ins
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1137/006 external_id: T1137.006 source_name: Microsoft Office Add-ins description: Microsoft. (n.d.). Add or remove add-ins. Retrieved July 3, 2017. url: https://support.office.com/article/Add-or-remove-add-ins-0af570c4-5cf3-4fa9-9b88-403625a0b...
kill_chain_name: mitre-attack phase_name: persistence
Windows
Adversaries may abuse Microsoft transport agents to establish persistent access to systems. Microsoft Exchange transport agents can operate on email messages passing through the transport pipeline to perform various tasks such as filtering spam, filtering malicious attachments, journaling, or adding a corporate signatu...
enterprise-attack
Transport Agent
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1505/002 external_id: T1505.002 source_name: Microsoft TransportAgent Jun 2016 description: Microsoft. (2016, June 1). Transport agents. Retrieved June 24, 2019. url: https://docs.microsoft.com/en-us/exchange/transport-agents-exchange-2013-help...
kill_chain_name: mitre-attack phase_name: persistence
Linux
An adversary may attempt to get detailed information about the operating system and hardware, including version, patches, hotfixes, service packs, and architecture. Adversaries may use the information from [System Information Discovery](https://attack.mitre.org/techniques/T1082) during automated discovery to shape foll...
enterprise-attack
System Information Discovery
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1082 external_id: T1082 source_name: Amazon Describe Instance description: Amazon. (n.d.). describe-instance-information. Retrieved March 3, 2020. url: https://docs.aws.amazon.com/cli/latest/reference/ssm/describe-instance-information.html ...
kill_chain_name: mitre-attack phase_name: discovery
Windows
Adversaries may communicate using OSI application layer protocols to avoid detection/network filtering by blending in with existing traffic. Commands to the remote system, and often the results of those commands, will be embedded within the protocol traffic between the client and server. Adversaries may utilize many ...
enterprise-attack
Application Layer Protocol
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1071 external_id: T1071 source_name: University of Birmingham C2 description: Gardiner, J., Cova, M., Nagaraja, S. (2014, February). Command & Control Understanding, Denying and Detecting. Retrieved April 20, 2016. url: https://arxiv.org/ftp/a...
kill_chain_name: mitre-attack phase_name: command-and-control
Linux
Adversaries may execute their own malicious payloads by hijacking how the .NET `AppDomainManager` loads assemblies. The .NET framework uses the `AppDomainManager` class to create and manage one or more isolated runtime environments (called application domains) inside a process to host the execution of .NET applications...
enterprise-attack
AppDomainManager
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1574/014 external_id: T1574.014 source_name: PenTestLabs AppDomainManagerInject description: Administrator. (2020, May 26). APPDOMAINMANAGER INJECTION AND DETECTION. Retrieved March 28, 2024. url: https://pentestlaboratories.com/2020/05/26/appd...
kill_chain_name: mitre-attack phase_name: defense-evasion
Windows
Adversaries may stage data collected from multiple systems in a central location or directory on one system prior to Exfiltration. Data may be kept in separate files or combined into one file through techniques such as [Archive Collected Data](https://attack.mitre.org/techniques/T1560). Interactive command shells may b...
enterprise-attack
Remote Data Staging
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1074/002 external_id: T1074.002 source_name: Mandiant M-Trends 2020 description: Mandiant. (2020, February). M-Trends 2020. Retrieved April 24, 2020. url: https://content.fireeye.com/m-trends/rpt-m-trends-2020
kill_chain_name: mitre-attack phase_name: collection
Windows
An adversary may add additional roles or permissions to an adversary-controlled user or service account to maintain persistent access to a container orchestration system. For example, an adversary with sufficient permissions may create a RoleBinding or a ClusterRoleBinding to bind a Role or ClusterRole to a Kubernetes ...
enterprise-attack
Additional Container Cluster Roles
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1098/006 external_id: T1098.006 source_name: AWS EKS IAM Roles for Service Accounts description: Amazon Web Services. (n.d.). IAM roles for service accounts. Retrieved July 14, 2023. url: https://docs.aws.amazon.com/eks/latest/userguide/iam-rol...
kill_chain_name: mitre-attack phase_name: privilege-escalation
Containers
Adversaries may abuse task scheduling functionality to facilitate initial or recurring execution of malicious code. Utilities exist within all major operating systems to schedule programs or scripts to be executed at a specified date and time. A task can also be scheduled on a remote system, provided the proper authent...
enterprise-attack
Scheduled Task/Job
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1053 external_id: T1053 source_name: ProofPoint Serpent description: Campbell, B. et al. (2022, March 21). Serpent, No Swiping! New Backdoor Targets French Entities with Unique Attack Chain. Retrieved April 11, 2022. url: https://www.proofpoint...
kill_chain_name: mitre-attack phase_name: privilege-escalation
Windows
Adversaries may abuse msiexec.exe to proxy execution of malicious payloads. Msiexec.exe is the command-line utility for the Windows Installer and is thus commonly associated with executing installation packages (.msi).(Citation: Microsoft msiexec) The Msiexec.exe binary may also be digitally signed by Microsoft. Adver...
enterprise-attack
Msiexec
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1218/007 external_id: T1218.007 source_name: TrendMicro Msiexec Feb 2018 description: Co, M. and Sison, G. (2018, February 8). Attack Using Windows Installer msiexec.exe leads to LokiBot. Retrieved April 18, 2019. url: https://blog.trendmicro.c...
kill_chain_name: mitre-attack phase_name: defense-evasion
Windows
Adversaries may gather information about the victim's network trust dependencies that can be used during targeting. Information about network trusts may include a variety of details, including second or third-party organizations/domains (ex: managed service providers, contractors, etc.) that have connected (and potenti...
enterprise-attack
Network Trust Dependencies
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1590/003 external_id: T1590.003 source_name: Pentesting AD Forests description: García, C. (2019, April 3). Pentesting Active Directory Forests. Retrieved October 20, 2020. url: https://www.slideshare.net/rootedcon/carlos-garca-pentesting-activ...
kill_chain_name: mitre-attack phase_name: reconnaissance
PRE
Adversaries may attempt to cause a denial of service (DoS) by reflecting a high-volume of network traffic to a target. This type of Network DoS takes advantage of a third-party server intermediary that hosts and will respond to a given spoofed source IP address. This third-party server is commonly termed a reflector. A...
enterprise-attack
Reflection Amplification
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1498/002 external_id: T1498.002 source_name: Cloudflare ReflectionDoS May 2017 description: Marek Majkowsk, Cloudflare. (2017, May 24). Reflections on reflection (attacks). Retrieved April 23, 2019. url: https://blog.cloudflare.com/reflections-...
kill_chain_name: mitre-attack phase_name: impact
Windows
Adversaries may register malicious password filter dynamic link libraries (DLLs) into the authentication process to acquire user credentials as they are validated. Windows password filters are password policy enforcement mechanisms for both domain and local accounts. Filters are implemented as DLLs containing a metho...
enterprise-attack
Password Filter DLL
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1556/002 external_id: T1556.002 source_name: Carnal Ownage Password Filters Sept 2013 description: Fuller, R. (2013, September 11). Stealing passwords every time they change. Retrieved November 21, 2017. url: http://carnal0wnage.attackresearch....
kill_chain_name: mitre-attack phase_name: persistence
Windows
Adversaries may abuse components of Terminal Services to enable persistent access to systems. Microsoft Terminal Services, renamed to Remote Desktop Services in some Windows Server OSs as of 2022, enable remote terminal connections to hosts. Terminal Services allows servers to transmit a full, interactive, graphical us...
enterprise-attack
Terminal Services DLL
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1505/005 external_id: T1505.005 source_name: James TermServ DLL description: James. (2019, July 14). @James_inthe_box. Retrieved March 28, 2022. url: https://twitter.com/james_inthe_box/status/1150495335812177920 source_name: Microsoft Syst...
kill_chain_name: mitre-attack phase_name: persistence
Windows
Adversaries may abuse AppleScript for execution. AppleScript is a macOS scripting language designed to control applications and parts of the OS via inter-application messages called AppleEvents.(Citation: Apple AppleScript) These AppleEvent messages can be sent independently or easily scripted with AppleScript. These e...
enterprise-attack
AppleScript
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1059/002 external_id: T1059.002 source_name: Apple AppleScript description: Apple. (2016, January 25). Introduction to AppleScript Language Guide. Retrieved March 28, 2020. url: https://developer.apple.com/library/archive/documentation/AppleScr...
kill_chain_name: mitre-attack phase_name: execution
macOS
Adversaries may abuse Internet browser extensions to establish persistent access to victim systems. Browser extensions or plugins are small programs that can add functionality and customize aspects of Internet browsers. They can be installed directly or through a browser's app store and generally have access and permis...
enterprise-attack
Browser Extensions
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1176 external_id: T1176 source_name: Chrome Extension Crypto Miner description: Brinkmann, M. (2017, September 19). First Chrome extension with JavaScript Crypto Miner detected. Retrieved November 16, 2017. url: https://www.ghacks.net/2017/09/1...
kill_chain_name: mitre-attack phase_name: persistence
Linux
Adversaries may target the different network services provided by systems to conduct a denial of service (DoS). Adversaries often target the availability of DNS and web services, however others have been targeted as well.(Citation: Arbor AnnualDoSreport Jan 2018) Web server software can be attacked through a variety of...
enterprise-attack
Service Exhaustion Flood
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1499/002 external_id: T1499.002 source_name: Arbor SSLDoS April 2012 description: ASERT Team, Netscout Arbor. (2012, April 24). DDoS Attacks on SSL: Something Old, Something New. Retrieved April 22, 2019. url: https://www.netscout.com/blog/aser...
kill_chain_name: mitre-attack phase_name: impact
Windows
Adversaries may manipulate hardware components in products prior to receipt by a final consumer for the purpose of data or system compromise. By modifying hardware or firmware in the supply chain, adversaries can insert a backdoor into consumer networks that may be difficult to detect and give the adversary a high degr...
enterprise-attack
Compromise Hardware Supply Chain
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1195/003 external_id: T1195.003
kill_chain_name: mitre-attack phase_name: initial-access
Linux
Adversaries may interact with the native OS application programming interface (API) to execute behaviors. Native APIs provide a controlled means of calling low-level OS services within the kernel, such as those involving hardware/devices, memory, and processes.(Citation: NT API Windows)(Citation: Linux Kernel API) Thes...
enterprise-attack
Native API
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1106 external_id: T1106 source_name: MACOS Cocoa description: Apple. (2015, September 16). Cocoa Application Layer. Retrieved June 25, 2020. url: https://developer.apple.com/library/archive/documentation/MacOSX/Conceptual/OSX_Technology_Overvie...
kill_chain_name: mitre-attack phase_name: execution
Windows
Adversaries may clear or remove evidence of malicious network connections in order to clean up traces of their operations. Configuration settings as well as various artifacts that highlight connection history may be created on a system and/or in application logs from behaviors that require network connections, such as ...
enterprise-attack
Clear Network Connection History and Configurations
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1070/007 external_id: T1070.007 source_name: FreeDesktop Journal description: freedesktop.org. (n.d.). systemd-journald.service. Retrieved June 15, 2022. url: https://www.freedesktop.org/software/systemd/man/systemd-journald.service.html so...
kill_chain_name: mitre-attack phase_name: defense-evasion
Linux
Adversaries may reveal credentials of accounts that have disabled Kerberos preauthentication by [Password Cracking](https://attack.mitre.org/techniques/T1110/002) Kerberos messages.(Citation: Harmj0y Roasting AS-REPs Jan 2017) Preauthentication offers protection against offline [Password Cracking](https://attack.mitr...
enterprise-attack
AS-REP Roasting
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1558/004 external_id: T1558.004 source_name: Harmj0y Roasting AS-REPs Jan 2017 description: HarmJ0y. (2017, January 17). Roasting AS-REPs. Retrieved August 24, 2020. url: http://www.harmj0y.net/blog/activedirectory/roasting-as-reps/ source_...
kill_chain_name: mitre-attack phase_name: credential-access
Windows
Adversaries may compromise third-party Virtual Private Servers (VPSs) that can be used during targeting. There exist a variety of cloud service providers that will sell virtual machines/containers as a service. Adversaries may compromise VPSs purchased by third-party entities. By compromising a VPS to use as infrastruc...
enterprise-attack
Virtual Private Server
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1584/003 external_id: T1584.003 source_name: NSA NCSC Turla OilRig description: NSA/NCSC. (2019, October 21). Cybersecurity Advisory: Turla Group Exploits Iranian APT To Expand Coverage Of Victims. Retrieved October 16, 2020. url: https://media...
kill_chain_name: mitre-attack phase_name: resource-development
PRE
Adversaries may execute commands and perform malicious tasks using AutoIT and AutoHotKey automation scripts. AutoIT and AutoHotkey (AHK) are scripting languages that enable users to automate Windows tasks. These automation scripts can be used to perform a wide variety of actions, such as clicking on buttons, entering t...
enterprise-attack
AutoHotKey & AutoIT
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1059/010 external_id: T1059.010 source_name: AutoHotKey description: AutoHotkey Foundation LLC. (n.d.). Using the Program. Retrieved March 29, 2024. url: https://www.autohotkey.com/docs/v1/Program.htm source_name: AutoIT description: AutoI...
kill_chain_name: mitre-attack phase_name: execution
Windows
Adversaries may reduce the level of effort required to decrypt data transmitted over the network by reducing the cipher strength of encrypted communications.(Citation: Cisco Synful Knock Evolution) Adversaries can weaken the encryption software on a compromised network device by reducing the key size used by the softw...
enterprise-attack
Reduce Key Space
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1600/001 external_id: T1600.001 source_name: Cisco Synful Knock Evolution description: Graham Holmes. (2015, October 8). Evolution of attacks on Cisco IOS devices. Retrieved October 19, 2020. url: https://blogs.cisco.com/security/evolution-of-a...
kill_chain_name: mitre-attack phase_name: defense-evasion
Network
In addition to clearing system logs, an adversary may clear the command history of a compromised account to conceal the actions undertaken during an intrusion. Various command interpreters keep track of the commands users type in their terminal so that users can retrace what they've done. On Linux and macOS, these com...
enterprise-attack
Clear Command History
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1070/003 external_id: T1070.003 source_name: Sophos PowerShell command audit description: jak. (2020, June 27). Live Discover - PowerShell command audit. Retrieved August 21, 2020. url: https://community.sophos.com/products/intercept/early-acce...
kill_chain_name: mitre-attack phase_name: defense-evasion
Linux
Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters. Various Windows utilities may be used to execute commands, possibly without invoking [cmd](https://attack.mitre.org/software/S0106). For example, [Forfiles](https://attack.mi...
enterprise-attack
Indirect Command Execution
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1202 external_id: T1202 source_name: Evi1cg Forfiles Nov 2017 description: Evi1cg. (2017, November 26). block cmd.exe ? try this :. Retrieved January 22, 2018. url: https://twitter.com/Evi1cg/status/935027922397573120 source_name: RSA Forfi...
kill_chain_name: mitre-attack phase_name: defense-evasion
Windows
Adversaries may move onto systems, possibly those on disconnected or air-gapped networks, by copying malware to removable media and taking advantage of Autorun features when the media is inserted into a system and executes. In the case of Lateral Movement, this may occur through modification of executable files stored ...
enterprise-attack
Replication Through Removable Media
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1091 external_id: T1091 source_name: Windows Malware Infecting Android description: Lucian Constantin. (2014, January 23). Windows malware tries to infect Android devices connected to PCs. Retrieved May 25, 2022. url: https://www.computerworld....
kill_chain_name: mitre-attack phase_name: initial-access
Windows
Adversaries may search local system sources, such as file systems and configuration files or local databases, to find files of interest and sensitive data prior to Exfiltration. Adversaries may do this using a [Command and Scripting Interpreter](https://attack.mitre.org/techniques/T1059), such as [cmd](https://attack....
enterprise-attack
Data from Local System
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1005 external_id: T1005 source_name: show_run_config_cmd_cisco description: Cisco. (2022, August 16). show running-config - Cisco IOS Configuration Fundamentals Command Reference . Retrieved July 13, 2022. url: https://www.cisco.com/c/en/us/td/...
kill_chain_name: mitre-attack phase_name: collection
Linux
Adversaries may use [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027) to hide artifacts of an intrusion from analysis. They may require separate mechanisms to decode or deobfuscate that information depending on how they intend to use it. Methods for doing that include built-in functionality o...
enterprise-attack
Deobfuscate/Decode Files or Information
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1140 external_id: T1140 source_name: Volexity PowerDuke November 2016 description: Adair, S.. (2016, November 9). PowerDuke: Widespread Post-Election Spear Phishing Campaigns Targeting Think Tanks and NGOs. Retrieved January 11, 2017. url: http...
kill_chain_name: mitre-attack phase_name: defense-evasion
Windows
Adversaries may abuse Microsoft Outlook rules to obtain persistence on a compromised system. Outlook rules allow a user to define automated behavior to manage email messages. A benign rule might, for example, automatically move an email to a particular folder in Outlook if it contains specific words from a specific sen...
enterprise-attack
Outlook Rules
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1137/005 external_id: T1137.005 source_name: SilentBreak Outlook Rules description: Landers, N. (2015, December 4). Malicious Outlook Rules. Retrieved February 4, 2019. url: https://silentbreaksecurity.com/malicious-outlook-rules/ source_na...
kill_chain_name: mitre-attack phase_name: persistence
Windows
Adversaries may maliciously modify components of a victim environment in order to hinder or disable defensive mechanisms. This not only involves impairing preventative defenses, such as firewalls and anti-virus, but also detection capabilities that defenders can use to audit activity and identify malicious behavior. Th...
enterprise-attack
Impair Defenses
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1562 external_id: T1562 source_name: Emotet shutdown description: The DFIR Report. (2022, November 8). Emotet Strikes Again – LNK File Leads to Domain Wide Ransomware. Retrieved March 6, 2023. url: https://thedfirreport.com/2022/11/28/emotet-st...
kill_chain_name: mitre-attack phase_name: defense-evasion
Windows
Adversaries may compromise cloud accounts that can be used during targeting. Adversaries can use compromised cloud accounts to further their operations, including leveraging cloud storage services such as Dropbox, Microsoft OneDrive, or AWS S3 buckets for [Exfiltration to Cloud Storage](https://attack.mitre.org/techniq...
enterprise-attack
Cloud Accounts
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1586/003 external_id: T1586.003 source_name: Awake Security C2 Cloud description: Gary Golomb and Tory Kei. (n.d.). Threat Hunting Series: Detecting Command & Control in the Cloud. Retrieved May 27, 2022. url: https://awakesecurity.com/blog/thr...
kill_chain_name: mitre-attack phase_name: resource-development
PRE
Adversaries may compromise email accounts that can be used during targeting. Adversaries can use compromised email accounts to further their operations, such as leveraging them to conduct [Phishing for Information](https://attack.mitre.org/techniques/T1598), [Phishing](https://attack.mitre.org/techniques/T1566), or lar...
enterprise-attack
Email Accounts
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1586/002 external_id: T1586.002 source_name: AnonHBGary description: Bright, P. (2011, February 15). Anonymous speaks: the inside story of the HBGary hack. Retrieved March 9, 2017. url: https://arstechnica.com/tech-policy/2011/02/anonymous-spea...
kill_chain_name: mitre-attack phase_name: resource-development
PRE
Adversaries may upload malware to third-party or adversary controlled infrastructure to make it accessible during targeting. Malicious software can include payloads, droppers, post-compromise tools, backdoors, and a variety of other malicious content. Adversaries may upload malware to support their operations, such as ...
enterprise-attack
Upload Malware
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1608/001 external_id: T1608.001 source_name: Volexity Ocean Lotus November 2020 description: Adair, S. and Lancaster, T. (2020, November 6). OceanLotus: Extending Cyber Espionage Operations Through Fake Websites. Retrieved November 20, 2020. ur...
kill_chain_name: mitre-attack phase_name: resource-development
PRE
Adversaries may manipulate products or product delivery mechanisms prior to receipt by a final consumer for the purpose of data or system compromise. Supply chain compromise can take place at any stage of the supply chain including: * Manipulation of development tools * Manipulation of a development environment * Man...
enterprise-attack
Supply Chain Compromise
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1195 external_id: T1195 source_name: Avast CCleaner3 2018 description: Avast Threat Intelligence Team. (2018, March 8). New investigations into the CCleaner incident point to a possible third stage that had keylogger capacities. Retrieved March ...
kill_chain_name: mitre-attack phase_name: initial-access
Linux
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network. The weakness in the system can be a software bug, a temporary glitch, or a misconfiguration. Exploited applications are often websites/web servers, but can also include databases (like SQL), standard servi...
enterprise-attack
Exploit Public-Facing Application
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1190 external_id: T1190 source_name: CWE top 25 description: Christey, S., Brown, M., Kirby, D., Martin, B., Paller, A.. (2011, September 13). 2011 CWE/SANS Top 25 Most Dangerous Software Errors. Retrieved April 10, 2019. url: https://cwe.mitre...
kill_chain_name: mitre-attack phase_name: initial-access
Windows
Adversaries may attempt to subvert Kerberos authentication by stealing or forging Kerberos tickets to enable [Pass the Ticket](https://attack.mitre.org/techniques/T1550/003). Kerberos is an authentication protocol widely used in modern Windows domain environments. In Kerberos environments, referred to as “realms”, ther...
enterprise-attack
Steal or Forge Kerberos Tickets
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1558 external_id: T1558 source_name: CERT-EU Golden Ticket Protection description: Abolins, D., Boldea, C., Socha, K., Soria-Machado, M. (2016, April 26). Kerberos Golden Ticket Protection. Retrieved July 13, 2017. url: https://cert.europa.eu/s...
kill_chain_name: mitre-attack phase_name: credential-access
Windows
Adversaries may search for common password storage locations to obtain user credentials.(Citation: F-Secure The Dukes) Passwords are stored in several places on a system, depending on the operating system or application holding the credentials. There are also specific applications and services that store passwords to m...
enterprise-attack
Credentials from Password Stores
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1555 external_id: T1555 source_name: F-Secure The Dukes description: F-Secure Labs. (2015, September 17). The Dukes: 7 years of Russian cyberespionage. Retrieved December 10, 2015. url: https://www.f-secure.com/documents/996508/1030745/dukes_wh...
kill_chain_name: mitre-attack phase_name: credential-access
Linux
Adversaries may use an existing, legitimate external Web service to exfiltrate data rather than their primary command and control channel. Popular Web services acting as an exfiltration mechanism may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them...
enterprise-attack
Exfiltration Over Web Service
source_name: mitre-attack url: https://attack.mitre.org/techniques/T1567 external_id: T1567
kill_chain_name: mitre-attack phase_name: exfiltration
Linux