ID
stringlengths
5
9
name
stringlengths
8
72
description
stringlengths
262
3.14k
url
stringlengths
41
45
tactics
stringclasses
16 values
detection
stringlengths
34
2.09k
platforms
stringlengths
4
94
data sources
stringlengths
26
579
is sub-technique
bool
2 classes
sub-technique of
stringlengths
5
5
defenses bypassed
stringclasses
8 values
T1189
Drive-by Compromise
Adversaries may gain access to a system through a user visiting a website over the normal course of browsing. With this technique, the user's web browser is typically targeted for exploitation, but adversaries may also use compromised websites for non-exploitation behavior such as acquiring Application Access Token. Mu...
https://attack.mitre.org/techniques/T1189
Initial Access
Firewalls and proxies can inspect URLs for potentially known-bad domains or parameters. They can also do reputation-based analytics on websites and their requested resources such as how old a domain is, who it's registered to, if it's on a known bad list, or how many other users have connected to it before. Network int...
Linux, SaaS, Windows, macOS
Application Log: Application Log Content, File: File Creation, Network Traffic: Network Connection Creation, Network Traffic: Network Traffic Content, Process: Process Creation
false
null
null
T1190
Exploit Public-Facing Application
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network. The weakness in the system can be a software bug, a temporary glitch, or a misconfiguration. Exploited applications are often websites/web servers, but can also include databases (like SQL), standard servic...
https://attack.mitre.org/techniques/T1190
Initial Access
Monitor application logs for abnormal behavior that may indicate attempted or successful exploitation. Use deep packet inspection to look for artifacts of common exploit traffic, such as SQL injection. Web Application Firewalls may detect improper inputs attempting exploitation.
Containers, IaaS, Linux, Network, Windows, macOS
Application Log: Application Log Content, Network Traffic: Network Traffic Content
false
null
null
T1566
Phishing
Adversaries may send phishing messages to gain access to victim systems. All forms of phishing are electronically delivered social engineering. Phishing can be targeted, known as spearphishing. In spearphishing, a specific individual, company, or industry will be targeted by the adversary. More generally, adversaries c...
https://attack.mitre.org/techniques/T1566
Initial Access
Network intrusion detection systems and email gateways can be used to detect phishing with malicious attachments in transit. Detonation chambers may also be used to identify malicious attachments. Solutions can be signature and behavior based, but adversaries may construct attachments in a way to avoid these systems. F...
Google Workspace, Linux, Office 365, SaaS, Windows, macOS
Application Log: Application Log Content, File: File Creation, Network Traffic: Network Traffic Content, Network Traffic: Network Traffic Flow
false
null
null
T1566.002
Phishing: Spearphishing Link
Adversaries may send spearphishing emails with a malicious link in an attempt to gain access to victim systems. Spearphishing with a link is a specific variant of spearphishing. It is different from other forms of spearphishing in that it employs the use of links to download malware contained in email, instead of attac...
https://attack.mitre.org/techniques/T1566/002
Initial Access
URL inspection within email (including expanding shortened links) can help detect links leading to known malicious sites as well as links redirecting to adversary infrastructure based by upon suspicious OAuth patterns with unusual TLDs.. Detonation chambers can be used to detect these links and either automatically go ...
Google Workspace, Linux, Office 365, SaaS, Windows, macOS
Application Log: Application Log Content, Network Traffic: Network Traffic Content, Network Traffic: Network Traffic Flow
true
T1566
null
T1566.004
Phishing: Spearphishing Voice
Adversaries may use voice communications to ultimately gain access to victim systems. Spearphishing voice is a specific variant of spearphishing. It is different from other forms of spearphishing in that is employs the use of manipulating a user into providing access to systems through a phone call or other forms of vo...
https://attack.mitre.org/techniques/T1566/004
Initial Access
No detection description provided.
Google Workspace, Linux, Office 365, SaaS, Windows, macOS
Application Log: Application Log Content
true
T1566
null
T1199
Trusted Relationship
Adversaries may breach or otherwise leverage organizations who have access to intended victims. Access through trusted third party relationship abuses an existing connection that may not be protected or receives less scrutiny than standard mechanisms of gaining access to a network. Organizations often grant elevated ac...
https://attack.mitre.org/techniques/T1199
Initial Access
Establish monitoring for activity conducted by second and third party providers and other trusted entities that may be leveraged as a means to gain access to the network. Depending on the type of relationship, an adversary may have access to significant amounts of information about the target before conducting an opera...
IaaS, Linux, Office 365, SaaS, Windows, macOS
Application Log: Application Log Content, Logon Session: Logon Session Creation, Logon Session: Logon Session Metadata, Network Traffic: Network Traffic Content
false
null
null
T1078
Valid Accounts
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Compromised credentials may be used to bypass access controls placed on various resources on systems within the network and may even be used for persistent acces...
https://attack.mitre.org/techniques/T1078
Defense Evasion, Initial Access, Persistence, Privilege Escalation
Configure robust, consistent account activity audit policies across the enterprise and with externally accessible services. Look for suspicious account behavior across systems that share accounts, either user, admin, or service accounts. Examples: one account logged into multiple systems simultaneously; multiple accoun...
Azure AD, Containers, Google Workspace, IaaS, Linux, Network, Office 365, SaaS, Windows, macOS
Logon Session: Logon Session Creation, Logon Session: Logon Session Metadata, User Account: User Account Authentication
false
null
Anti-virus, Application Control, Firewall, Host Intrusion Prevention Systems, Network Intrusion Detection System, System Access Controls
T1078.004
Valid Accounts: Cloud Accounts
Valid accounts in cloud environments may allow adversaries to perform actions to achieve Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Cloud accounts are those created and configured by an organization for use by users, remote support, services, or for administration of resources within a cloud...
https://attack.mitre.org/techniques/T1078/004
Defense Evasion, Initial Access, Persistence, Privilege Escalation
Monitor the activity of cloud accounts to detect abnormal or malicious behavior, such as accessing information outside of the normal function of the account or account usage at atypical hours.
Azure AD, Google Workspace, IaaS, Office 365, SaaS
Logon Session: Logon Session Creation, Logon Session: Logon Session Metadata, User Account: User Account Authentication
true
T1078
null
T1078.001
Valid Accounts: Default Accounts
Adversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Default accounts are those that are built-into an OS, such as the Guest or Administrator accounts on Windows systems. Default accounts also include default facto...
https://attack.mitre.org/techniques/T1078/001
Defense Evasion, Initial Access, Persistence, Privilege Escalation
Monitor whether default accounts have been activated or logged into. These audits should also include checks on any appliances and applications for default credentials or SSH keys, and if any are discovered, they should be updated immediately.
Azure AD, Containers, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS
Logon Session: Logon Session Creation, User Account: User Account Authentication
true
T1078
null
T1651
Cloud Administration Command
Adversaries may abuse cloud management services to execute commands within virtual machines or hybrid-joined devices. Resources such as AWS Systems Manager, Azure RunCommand, and Runbooks allow users to remotely run scripts in virtual machines by leveraging installed virtual machine agents. Similarly, in Azure AD envir...
https://attack.mitre.org/techniques/T1651
Execution
No detection description provided.
Azure AD, IaaS
Command: Command Execution, Process: Process Creation, Script: Script Execution
false
null
null
T1059
Command and Scripting Interpreter
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries. These interfaces and languages provide ways of interacting with computer systems and are a common feature across many different platforms. Most systems come with some built-in command-line interface and scripting capabiliti...
https://attack.mitre.org/techniques/T1059
Execution
Command-line and scripting activities can be captured through proper logging of process execution with command-line arguments. This information can be useful in gaining additional insight to adversaries' actions through how they use native processes or custom tools. Also monitor for loading of modules associated with s...
Azure AD, Google Workspace, IaaS, Linux, Network, Office 365, Windows, macOS
Command: Command Execution, Module: Module Load, Process: Process Creation, Process: Process Metadata, Script: Script Execution
false
null
null
T1059.009
Command and Scripting Interpreter: Cloud API
Adversaries may abuse cloud APIs to execute malicious commands. APIs available in cloud environments provide various functionalities and are a feature-rich method for programmatic access to nearly all aspects of a tenant. These APIs may be utilized through various methods such as command line interpreters (CLIs), in-br...
https://attack.mitre.org/techniques/T1059/009
Execution
No detection description provided.
Azure AD, Google Workspace, IaaS, Office 365, SaaS
Command: Command Execution
true
T1059
null
T1648
Serverless Execution
Adversaries may abuse serverless computing, integration, and automation services to execute arbitrary code in cloud environments. Many cloud providers offer a variety of serverless resources, including compute engines, application integration services, and web servers. Adversaries may abuse these resources in various w...
https://attack.mitre.org/techniques/T1648
Execution
No detection description provided.
IaaS, Office 365, SaaS
Application Log: Application Log Content, Cloud Service: Cloud Service Modification
false
null
null
T1204
User Execution
An adversary may rely upon specific actions by a user in order to gain execution. Users may be subjected to social engineering to get them to execute malicious code by, for example, opening a malicious document file or link. These user actions will typically be observed as follow-on behavior from forms of Phishing. Whi...
https://attack.mitre.org/techniques/T1204
Execution
Monitor the execution of and command-line arguments for applications that may be used by an adversary to gain Initial Access that require user interaction. This includes compression applications, such as those for zip files, that can be used to Deobfuscate/Decode Files or Information in payloads. Anti-virus can potenti...
Containers, IaaS, Linux, Windows, macOS
Application Log: Application Log Content, Command: Command Execution, Container: Container Creation, Container: Container Start, File: File Creation, Image: Image Creation, Instance: Instance Creation, Instance: Instance Start, Network Traffic: Network Connection Creation, Network Traffic: Network Traffic Content, Proc...
false
null
null
T1204.003
User Execution: Malicious Image
Adversaries may rely on a user running a malicious image to facilitate execution. Amazon Web Services (AWS) Amazon Machine Images (AMIs), Google Cloud Platform (GCP) Images, and Azure Images as well as popular container runtimes such as Docker can be backdoored. Backdoored images may be uploaded to a public repository ...
https://attack.mitre.org/techniques/T1204/003
Execution
Monitor the local image registry to make sure malicious images are not added. Track the deployment of new containers, especially from newly built images. Monitor the behavior of containers within the environment to detect anomalous behavior or malicious activity after users deploy from malicious images.
Containers, IaaS
Application Log: Application Log Content, Command: Command Execution, Container: Container Creation, Container: Container Start, Image: Image Creation, Instance: Instance Creation, Instance: Instance Start
true
T1204
null
T1098
Account Manipulation
Adversaries may manipulate accounts to maintain and/or elevate access to victim systems. Account manipulation may consist of any action that preserves or modifies adversary access to a compromised account, such as modifying credentials or permission groups. These actions could also include account activity designed to ...
https://attack.mitre.org/techniques/T1098
Persistence, Privilege Escalation
Collect events that correlate with changes to account objects and/or permissions on systems and the domain, such as event IDs 4738, 4728 and 4670. Monitor for modification of accounts in correlation with other suspicious activity. Changes may occur at unusual times or from unusual systems. Especially flag events where ...
Azure AD, Containers, Google Workspace, IaaS, Linux, Network, Office 365, SaaS, Windows, macOS
Active Directory: Active Directory Object Modification, Command: Command Execution, File: File Modification, Group: Group Modification, Process: Process Creation, User Account: User Account Modification
false
null
null
T1098.001
Account Manipulation: Additional Cloud Credentials
Adversaries may add adversary-controlled credentials to a cloud account to maintain persistent access to victim accounts and instances within the environment. For example, adversaries may add credentials for Service Principals and Applications in addition to existing legitimate credentials in Azure AD. These credential...
https://attack.mitre.org/techniques/T1098/001
Persistence, Privilege Escalation
Monitor Azure Activity Logs for Service Principal and Application modifications. Monitor for the usage of APIs that create or import SSH keys, particularly by unexpected users or accounts such as the root account. Monitor for use of credentials at unusual times or to unusual systems or services. This may also correlate...
Azure AD, IaaS, SaaS
User Account: User Account Modification
true
T1098
null
T1098.003
Account Manipulation: Additional Cloud Roles
An adversary may add additional roles or permissions to an adversary-controlled cloud account to maintain persistent access to a tenant. For example, adversaries may update IAM policies in cloud-based environments or add a new global administrator in Office 365 environments. With sufficient permissions, a compromised a...
https://attack.mitre.org/techniques/T1098/003
Persistence, Privilege Escalation
Collect activity logs from IAM services and cloud administrator accounts to identify unusual activity in the assignment of roles to those accounts. Monitor for accounts assigned to admin roles that go over a certain threshold of known admins.
Azure AD, Google Workspace, IaaS, Office 365, SaaS
User Account: User Account Modification
true
T1098
null
T1098.002
Account Manipulation: Additional Email Delegate Permissions
Adversaries may grant additional permission levels to maintain persistent access to an adversary-controlled email account. For example, the Add-MailboxPermission PowerShell cmdlet, available in on-premises Exchange and in the cloud-based service Office 365, adds permissions to a mailbox. In Google Workspace, delegation...
https://attack.mitre.org/techniques/T1098/002
Persistence, Privilege Escalation
Monitor for unusual Exchange and Office 365 email account permissions changes that may indicate excessively broad permissions being granted to compromised accounts. Enable the UpdateFolderPermissions action for all logon types. The mailbox audit log will forward folder permission modification events to the Unified Audi...
Google Workspace, Office 365, Windows
Application Log: Application Log Content, Group: Group Modification, User Account: User Account Modification
true
T1098
null
T1098.005
Account Manipulation: Device Registration
Adversaries may register a device to an adversary-controlled account. Devices may be registered in a multifactor authentication (MFA) system, which handles authentication to the network, or in a device management system, which handles device access and compliance. MFA systems, such as Duo or Okta, allow users to associ...
https://attack.mitre.org/techniques/T1098/005
Persistence, Privilege Escalation
No detection description provided.
Azure AD, SaaS, Windows
Active Directory: Active Directory Object Creation, Application Log: Application Log Content, User Account: User Account Modification
true
T1098
null
T1098.004
Account Manipulation: SSH Authorized Keys
Adversaries may modify the SSH authorizedkeys file in SSH specifies the SSH keys that can be used for logging into the user account for which the file is configured. This file is usually found in the user's home directory under <user-home>/.ssh/authorizedconfig. Adversaries may modify SSH authorizedkeys file of a...
https://attack.mitre.org/techniques/T1098/004
Persistence, Privilege Escalation
Use file integrity monitoring to detect changes made to the authorizedkeys file. In cloud environments, monitor instances for modification of metadata and configurations. Monitor for changes to and suspicious processes modifiying /etc/ssh/sshd_config. For network infrastructure devices, collect AAA logging to monitor f...
IaaS, Linux, Network, macOS
Command: Command Execution, File: File Modification, Process: Process Creation
true
T1098
null
T1136
Create Account
Adversaries may create an account to maintain access to victim systems. With a sufficient level of access, creating such accounts may be used to establish secondary credentialed access that do not require persistent remote access tools to be deployed on the system. Accounts may be created on the local system or within ...
https://attack.mitre.org/techniques/T1136
Persistence
Monitor for processes and command-line parameters associated with account creation, such as net user or useradd. Collect data on account creation within a network. Event ID 4720 is generated when a user account is created on a Windows system and domain controller. Perform regular audits of domain and local system accou...
Azure AD, Containers, Google Workspace, IaaS, Linux, Network, Office 365, SaaS, Windows, macOS
Command: Command Execution, Process: Process Creation, User Account: User Account Creation
false
null
null
T1136.003
Create Account: Cloud Account
Adversaries may create a cloud account to maintain access to victim systems. With a sufficient level of access, such accounts may be used to establish secondary credentialed access that does not require persistent remote access tools to be deployed on the system. Adversaries may create accounts that only have access to...
https://attack.mitre.org/techniques/T1136/003
Persistence
Collect usage logs from cloud user and administrator accounts to identify unusual activity in the creation of new accounts and assignment of roles to those accounts. Monitor for accounts assigned to admin roles that go over a certain threshold of known admins.
Azure AD, Google Workspace, IaaS, Office 365, SaaS
User Account: User Account Creation
true
T1136
null
T1546
Event Triggered Execution
Adversaries may establish persistence and/or elevate privileges using system mechanisms that trigger execution based on specific events. Various operating systems have means to monitor and subscribe to events such as logons or other user activity such as running specific applications/binaries. Cloud environments may al...
https://attack.mitre.org/techniques/T1546
Persistence, Privilege Escalation
Monitoring for additions or modifications of mechanisms that could be used to trigger event-based execution, especially the addition of abnormal commands such as execution of unknown programs, opening network sockets, or reaching out across the network. Also look for changes that do not line up with updates, patches, o...
IaaS, Linux, Office 365, SaaS, Windows, macOS
Cloud Service: Cloud Service Modification, Command: Command Execution, File: File Creation, File: File Metadata, File: File Modification, Module: Module Load, Process: Process Creation, WMI: WMI Creation, Windows Registry: Windows Registry Key Modification
false
null
null
T1525
Implant Internal Image
Adversaries may implant cloud or container images with malicious code to establish persistence after gaining access to an environment. Amazon Web Services (AWS) Amazon Machine Images (AMIs), Google Cloud Platform (GCP) Images, and Azure Images as well as popular container runtimes such as Docker can be implanted or bac...
https://attack.mitre.org/techniques/T1525
Persistence
Monitor interactions with images and containers by users to identify ones that are added or modified anomalously. In containerized environments, changes may be detectable by monitoring the Docker daemon logs or setting up and monitoring Kubernetes audit logs depending on registry configuration.
Containers, IaaS
Image: Image Creation, Image: Image Metadata, Image: Image Modification
false
null
null
T1556
Modify Authentication Process
Adversaries may modify authentication mechanisms and processes to access user credentials or enable otherwise unwarranted access to accounts. The authentication process is handled by mechanisms, such as the Local Security Authentication Server (LSASS) process and the Security Accounts Manager (SAM) on Windows, pluggabl...
https://attack.mitre.org/techniques/T1556
Credential Access, Defense Evasion, Persistence
Monitor for new, unfamiliar DLL files written to a domain controller and/or local computer. Monitor for changes to Registry entries for password filters (ex: HKEYMACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Notification Packages) and correlate then investigate the DLL files these files reference. Password filters will ...
Azure AD, Google Workspace, IaaS, Linux, Network, Office 365, SaaS, Windows, macOS
Active Directory: Active Directory Object Modification, Application Log: Application Log Content, File: File Creation, File: File Modification, Logon Session: Logon Session Creation, Module: Module Load, Process: OS API Execution, Process: Process Access, User Account: User Account Authentication, User Account: User Ac...
false
null
null
T1556.007
Modify Authentication Process: Hybrid Identity
Adversaries may patch, modify, or otherwise backdoor cloud authentication processes that are tied to on-premises user identities in order to bypass typical authentication mechanisms, access credentials, and enable persistent access to accounts. Many organizations maintain hybrid user and device identities that are shar...
https://attack.mitre.org/techniques/T1556/007
Credential Access, Defense Evasion, Persistence
No detection description provided.
Azure AD, Google Workspace, IaaS, Office 365, SaaS, Windows
Application Log: Application Log Content, File: File Modification, Logon Session: Logon Session Creation, Module: Module Load
true
T1556
null
T1556.006
Modify Authentication Process: Multi-Factor Authentication
Adversaries may disable or modify multi-factor authentication (MFA) mechanisms to enable persistent access to compromised accounts. Once adversaries have gained access to a network by either compromising an account lacking MFA or by employing an MFA bypass method such as Multi-Factor Authentication Request Generation, ...
https://attack.mitre.org/techniques/T1556/006
Credential Access, Defense Evasion, Persistence
No detection description provided.
Azure AD, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS
Active Directory: Active Directory Object Modification, Logon Session: Logon Session Creation, User Account: User Account Authentication, User Account: User Account Modification
true
T1556
Multi-Factor Authentication
T1137
Office Application Startup
Adversaries may leverage Microsoft Office-based applications for persistence between startups. Microsoft Office is a fairly common application suite on Windows-based operating systems within an enterprise network. There are multiple mechanisms that can be used with Office for persistence when an Office-based applicatio...
https://attack.mitre.org/techniques/T1137
Persistence
Collect process execution information including process IDs (PID) and parent process IDs (PPID) and look for abnormal chains of activity resulting from Office processes. Non-standard process execution trees may also indicate suspicious or malicious behavior. If winword.exe is the parent process for suspicious processes...
Office 365, Windows
Application Log: Application Log Content, Command: Command Execution, File: File Creation, File: File Modification, Module: Module Load, Process: Process Creation, Windows Registry: Windows Registry Key Creation, Windows Registry: Windows Registry Key Modification
false
null
null
T1137.006
Office Application Startup: Add-ins
Adversaries may abuse Microsoft Office add-ins to obtain persistence on a compromised system. Office add-ins can be used to add functionality to Office programs. There are different types of add-ins that can be used by the various Office products; including Word/Excel add-in Libraries (WLL/XLL), VBA add-ins, Office Com...
https://attack.mitre.org/techniques/T1137/006
Persistence
Monitor and validate the Office trusted locations on the file system and audit the Registry entries relevant for enabling add-ins. Collect process execution information including process IDs (PID) and parent process IDs (PPID) and look for abnormal chains of activity resulting from Office processes. Non-standard proces...
Office 365, Windows
Command: Command Execution, File: File Creation, File: File Modification, Process: Process Creation, Windows Registry: Windows Registry Key Creation, Windows Registry: Windows Registry Key Modification
true
T1137
null
T1137.001
Office Application Startup: Office Template Macros
Adversaries may abuse Microsoft Office templates to obtain persistence on a compromised system. Microsoft Office contains templates that are part of common Office applications and are used to customize styles. The base templates within the application are used each time an application starts. Office Visual Basic for Ap...
https://attack.mitre.org/techniques/T1137/001
Persistence
Many Office-related persistence mechanisms require changes to the Registry and for binaries, files, or scripts to be written to disk or existing files modified to include malicious scripts. Collect events related to Registry key creation and modification for keys that could be used for Office-based persistence. Modific...
Office 365, Windows
Command: Command Execution, File: File Creation, File: File Modification, Process: Process Creation, Windows Registry: Windows Registry Key Creation, Windows Registry: Windows Registry Key Modification
true
T1137
null
T1137.002
Office Application Startup: Office Test
Adversaries may abuse the Microsoft Office "Office Test" Registry key to obtain persistence on a compromised system. An Office Test Registry location exists that allows a user to specify an arbitrary DLL that will be executed every time an Office application is started. This Registry key is thought to be used by Micros...
https://attack.mitre.org/techniques/T1137/002
Persistence
Monitor for the creation of the Office Test Registry key. Many Office-related persistence mechanisms require changes to the Registry and for binaries, files, or scripts to be written to disk or existing files modified to include malicious scripts. Collect events related to Registry key creation and modification for key...
Office 365, Windows
Command: Command Execution, File: File Creation, File: File Modification, Module: Module Load, Process: Process Creation, Windows Registry: Windows Registry Key Creation, Windows Registry: Windows Registry Key Modification
true
T1137
null
T1137.003
Office Application Startup: Outlook Forms
Adversaries may abuse Microsoft Outlook forms to obtain persistence on a compromised system. Outlook forms are used as templates for presentation and functionality in Outlook messages. Custom Outlook forms can be created that will execute code when a specifically crafted email is sent by an adversary utilizing the same...
https://attack.mitre.org/techniques/T1137/003
Persistence
Microsoft has released a PowerShell script to safely gather mail forwarding rules and custom forms in your mail environment as well as steps to interpret the output. SensePost, whose tool Ruler can be used to carry out malicious rules, forms, and Home Page attacks, has released a tool to detect Ruler usage. Collect pro...
Office 365, Windows
Application Log: Application Log Content, Command: Command Execution, Process: Process Creation
true
T1137
null
T1137.004
Office Application Startup: Outlook Home Page
Adversaries may abuse Microsoft Outlook's Home Page feature to obtain persistence on a compromised system. Outlook Home Page is a legacy feature used to customize the presentation of Outlook folders. This feature allows for an internal or external URL to be loaded and presented whenever a folder is opened. A malicious ...
https://attack.mitre.org/techniques/T1137/004
Persistence
Microsoft has released a PowerShell script to safely gather mail forwarding rules and custom forms in your mail environment as well as steps to interpret the output. SensePost, whose tool Ruler can be used to carry out malicious rules, forms, and Home Page attacks, has released a tool to detect Ruler usage. Collect pro...
Office 365, Windows
Application Log: Application Log Content, Command: Command Execution, Process: Process Creation
true
T1137
null
T1137.005
Office Application Startup: Outlook Rules
Adversaries may abuse Microsoft Outlook rules to obtain persistence on a compromised system. Outlook rules allow a user to define automated behavior to manage email messages. A benign rule might, for example, automatically move an email to a particular folder in Outlook if it contains specific words from a specific sen...
https://attack.mitre.org/techniques/T1137/005
Persistence
Microsoft has released a PowerShell script to safely gather mail forwarding rules and custom forms in your mail environment as well as steps to interpret the output. This PowerShell script is ineffective in gathering rules with modified `PRPRMSGRULEPROVIDER` properties caused by adversaries using a Microsoft Exchange S...
Office 365, Windows
Application Log: Application Log Content, Command: Command Execution, Process: Process Creation
true
T1137
null
T1548
Abuse Elevation Control Mechanism
Adversaries may circumvent mechanisms designed to control elevate privileges to gain higher-level permissions. Most modern systems contain native elevation control mechanisms that are intended to limit privileges that a user can perform on a machine. Authorization has to be granted to specific users in order to perform...
https://attack.mitre.org/techniques/T1548
Defense Evasion, Privilege Escalation
Monitor the file system for files that have the setuid or setgid bits set. Also look for any process API calls for behavior that may be indicative of Process Injection and unusual loaded DLLs through DLL Search Order Hijacking, which indicate attempts to gain access to higher privileged processes. On Linux, auditd can ...
Azure AD, Google Workspace, IaaS, Linux, Office 365, Windows, macOS
Command: Command Execution, File: File Metadata, File: File Modification, Process: OS API Execution, Process: Process Creation, Process: Process Metadata, User Account: User Account Modification, Windows Registry: Windows Registry Key Modification
false
null
null
T1548.005
Abuse Elevation Control Mechanism: Temporary Elevated Cloud Access
Adversaries may abuse permission configurations that allow them to gain temporarily elevated access to cloud resources. Many cloud environments allow administrators to grant user or service accounts permission to request just-in-time access to roles, impersonate other accounts, pass roles onto resources and services, o...
https://attack.mitre.org/techniques/T1548/005
Defense Evasion, Privilege Escalation
No detection description provided.
Azure AD, IaaS, Office 365
User Account: User Account Modification
true
T1548
null
T1484
Domain Policy Modification
Adversaries may modify the configuration settings of a domain to evade defenses and/or escalate privileges in domain environments. Domains provide a centralized means of managing how computer resources (ex: computers, user accounts) can act, and interact with each other, on a network. The policy of the domain also incl...
https://attack.mitre.org/techniques/T1484
Defense Evasion, Privilege Escalation
It may be possible to detect domain policy modifications using Windows event logs. Group policy modifications, for example, may be logged under a variety of Windows event IDs for modifying, creating, undeleting, moving, and deleting directory service objects (Event ID 5136, 5137, 5138, 5139, 5141 respectively). Monitor...
Azure AD, Windows
Active Directory: Active Directory Object Creation, Active Directory: Active Directory Object Deletion, Active Directory: Active Directory Object Modification, Command: Command Execution
false
null
File system access controls, System access controls
T1484.002
Domain Policy Modification: Domain Trust Modification
Adversaries may add new domain trusts or modify the properties of existing domain trusts to evade defenses and/or elevate privileges. Domain trust details, such as whether or not a domain is federated, allow authentication and authorization properties to apply between domains for the purpose of accessing shared resourc...
https://attack.mitre.org/techniques/T1484/002
Defense Evasion, Privilege Escalation
Monitor for modifications to domain trust settings, such as when a user or application modifies the federation settings on the domain or updates domain authentication from Managed to Federated via ActionTypes Set federation settings on domain and Set domain authentication. This may also include monitoring for Event ID ...
Azure AD, Windows
Active Directory: Active Directory Object Creation, Active Directory: Active Directory Object Modification, Command: Command Execution
true
T1484
null
T1211
Exploitation for Defense Evasion
Adversaries may exploit a system or application vulnerability to bypass security features. Exploitation of a vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. Vulnerabilities...
https://attack.mitre.org/techniques/T1211
Defense Evasion
Exploitation for defense evasion may happen shortly after the system has been compromised to prevent detection during later actions for for additional tools that may be brought in and used. Detecting software exploitation may be difficult depending on the tools available. Software exploits may not always succeed or may...
IaaS, Linux, SaaS, Windows, macOS
Application Log: Application Log Content, Process: Process Creation
false
null
Anti-virus, System access controls
T1564
Hide Artifacts
Adversaries may attempt to hide artifacts associated with their behaviors to evade detection. Operating systems may have features to hide various artifacts, such as important system files and administrative task execution, to avoid disrupting user work environments and prevent users from changing files or features on t...
https://attack.mitre.org/techniques/T1564
Defense Evasion
Monitor files, processes, and command-line arguments for actions indicative of hidden artifacts. Monitor event and authentication logs for records of hidden artifacts being used. Monitor the file system and shell commands for hidden attribute usage.
Linux, Office 365, Windows, macOS
Application Log: Application Log Content, Command: Command Execution, File: File Creation, File: File Metadata, File: File Modification, Firmware: Firmware Modification, Process: OS API Execution, Process: Process Creation, Script: Script Execution, Service: Service Creation, User Account: User Account Creation, User A...
false
null
null
T1564.008
Hide Artifacts: Email Hiding Rules
Adversaries may use email rules to hide inbound emails in a compromised user's mailbox. Many email clients allow users to create inbox rules for various email functions, including moving emails to other folders, marking emails as read, or deleting emails. Rules may be created or modified within email clients or through...
https://attack.mitre.org/techniques/T1564/008
Defense Evasion
Monitor email clients and applications for suspicious activity, such as missing messages or abnormal configuration and/or log entries. On Windows systems, monitor for creation of suspicious inbox rules through the use of the New-InboxRule and Set-InboxRule PowerShell cmdlets. On MacOS systems, monitor for modifications...
Google Workspace, Linux, Office 365, Windows, macOS
Application Log: Application Log Content, Command: Command Execution, File: File Modification
true
T1564
null
T1562
Impair Defenses
Adversaries may maliciously modify components of a victim environment in order to hinder or disable defensive mechanisms. This not only involves impairing preventative defenses, such as firewalls and anti-virus, but also detection capabilities that defenders can use to audit activity and identify malicious behavior. Th...
https://attack.mitre.org/techniques/T1562
Defense Evasion
Monitor processes and command-line arguments to see if security tools or logging services are killed or stop running. Monitor Registry edits for modifications to services and startup programs that correspond to security tools. Lack of log events may be suspicious. Monitor environment variables and APIs that can be leve...
Containers, IaaS, Linux, Network, Office 365, Windows, macOS
Cloud Service: Cloud Service Disable, Cloud Service: Cloud Service Modification, Command: Command Execution, Driver: Driver Load, File: File Deletion, File: File Modification, Firewall: Firewall Disable, Firewall: Firewall Rule Modification, Process: OS API Execution, Process: Process Creation, Process: Process Modific...
false
null
Anti-virus, Digital Certificate Validation, File monitoring, Firewall, Host forensic analysis, Host intrusion prevention systems, Log analysis, Signature-based detection
T1562.007
Impair Defenses: Disable or Modify Cloud Firewall
Adversaries may disable or modify a firewall within a cloud environment to bypass controls that limit access to cloud resources. Cloud firewalls are separate from system firewalls that are described in Disable or Modify System Firewall. Cloud environments typically utilize restrictive security groups and firewall rules...
https://attack.mitre.org/techniques/T1562/007
Defense Evasion
Monitor cloud logs for modification or creation of new security groups or firewall rules.
IaaS
Firewall: Firewall Disable, Firewall: Firewall Rule Modification
true
T1562
null
T1562.008
Impair Defenses: Disable or Modify Cloud Logs
An adversary may disable or modify cloud logging capabilities and integrations to limit what data is collected on their activities and avoid detection. Cloud environments allow for collection and analysis of audit and application logs that provide insight into what activities a user does within the environment. If an a...
https://attack.mitre.org/techniques/T1562/008
Defense Evasion
Monitor logs for API calls to disable logging. In AWS, monitor for: StopLogging and DeleteTrail. In GCP, monitor for: google.logging.v2.ConfigServiceV2.UpdateSink. In Azure, monitor for az monitor diagnostic-settings delete. Additionally, a sudden loss of a log source may indicate that it has been disabled.
Azure AD, Google Workspace, IaaS, Office 365, SaaS
Cloud Service: Cloud Service Disable, Cloud Service: Cloud Service Modification, User Account: User Account Modification
true
T1562
null
T1562.001
Impair Defenses: Disable or Modify Tools
Adversaries may modify and/or disable security tools to avoid possible detection of their malware/tools and activities. This may take many forms, such as killing security software processes or services, modifying / deleting Registry keys or configuration files so that tools do not operate properly, or other methods to ...
https://attack.mitre.org/techniques/T1562/001
Defense Evasion
Monitor processes and command-line arguments to see if security tools/services are killed or stop running. Monitor Registry edits for modifications to services and startup programs that correspond to security tools. Monitoring for changes to other known features used by deployed security tools may also expose malicious...
Containers, IaaS, Linux, Network, Windows, macOS
Command: Command Execution, Driver: Driver Load, Process: Process Creation, Process: Process Termination, Sensor Health: Host Status, Service: Service Metadata, Windows Registry: Windows Registry Key Deletion, Windows Registry: Windows Registry Key Modification
true
T1562
Anti-virus, File monitoring, Host intrusion prevention systems, Log analysis, Signature-based detection
T1656
Impersonation
Adversaries may impersonate a trusted person or organization in order to persuade and trick a target into performing some action on their behalf. For example, adversaries may communicate with victims (via Phishing for Information, Phishing, or Internal Spearphishing) while impersonating a known sender such as an execut...
https://attack.mitre.org/techniques/T1656
Defense Evasion
No detection description provided.
Google Workspace, Linux, Office 365, SaaS, Windows, macOS
Application Log: Application Log Content
false
null
null
T1070
Indicator Removal
Adversaries may delete or modify artifacts generated within systems to remove evidence of their presence or hinder defenses. Various artifacts may be created by an adversary or something that can be attributed to an adversary’s actions. Typically these artifacts are used as defensive indicators related to monitored eve...
https://attack.mitre.org/techniques/T1070
Defense Evasion
File system monitoring may be used to detect improper deletion or modification of indicator files. Events not stored on the file system may require different detection mechanisms.
Containers, Google Workspace, Linux, Network, Office 365, Windows, macOS
Application Log: Application Log Content, Command: Command Execution, File: File Deletion, File: File Metadata, File: File Modification, Firewall: Firewall Rule Modification, Network Traffic: Network Traffic Content, Process: OS API Execution, Process: Process Creation, Scheduled Job: Scheduled Job Modification, User A...
false
null
Anti-virus, Host intrusion prevention systems, Log analysis
T1070.008
Indicator Removal: Clear Mailbox Data
Adversaries may modify mail and mail application data to remove evidence of their activity. Email applications allow users and other programs to export and delete mailbox data via command line tools or use of APIs. Mail application data can be emails, email metadata, or logs generated by the application or operating sy...
https://attack.mitre.org/techniques/T1070/008
Defense Evasion
No detection description provided.
Google Workspace, Linux, Office 365, Windows, macOS
Application Log: Application Log Content, Command: Command Execution, File: File Deletion, File: File Modification, Process: Process Creation
true
T1070
null
T1578
Modify Cloud Compute Infrastructure
An adversary may attempt to modify a cloud account's compute service infrastructure to evade defenses. A modification to the compute service infrastructure can include the creation, deletion, or modification of one or more components such as compute instances, virtual machines, and snapshots. Permissions gained from th...
https://attack.mitre.org/techniques/T1578
Defense Evasion
Establish centralized logging for the activity of cloud compute infrastructure components. Monitor for suspicious sequences of events, such as the creation of multiple snapshots within a short period of time or the mount of a snapshot to a new instance by a new or unexpected user. To reduce false positives, valid chang...
IaaS
Cloud Service: Cloud Service Metadata, Instance: Instance Creation, Instance: Instance Deletion, Instance: Instance Metadata, Instance: Instance Modification, Instance: Instance Start, Instance: Instance Stop, Snapshot: Snapshot Creation, Snapshot: Snapshot Deletion, Snapshot: Snapshot Metadata, Snapshot: Snapshot Modi...
false
null
null
T1578.002
Modify Cloud Compute Infrastructure: Create Cloud Instance
An adversary may create a new instance or virtual machine (VM) within the compute service of a cloud account to evade defenses. Creating a new instance may allow an adversary to bypass firewall rules and permissions that exist on instances currently residing within an account. An adversary may Create Snapshot of one or...
https://attack.mitre.org/techniques/T1578/002
Defense Evasion
The creation of a new instance or VM is a common part of operations within many cloud environments. Events should then not be viewed in isolation, but as part of a chain of behavior that could lead to other activities. For example, the creation of an instance by a new user account or the unexpected creation of one or m...
IaaS
Instance: Instance Creation, Instance: Instance Metadata
true
T1578
null
T1578.001
Modify Cloud Compute Infrastructure: Create Snapshot
An adversary may create a snapshot or data backup within a cloud account to evade defenses. A snapshot is a point-in-time copy of an existing cloud compute component such as a virtual machine (VM), virtual hard drive, or volume. An adversary may leverage permissions to create a snapshot in order to bypass restrictions ...
https://attack.mitre.org/techniques/T1578/001
Defense Evasion
The creation of a snapshot is a common part of operations within many cloud environments. Events should then not be viewed in isolation, but as part of a chain of behavior that could lead to other activities such as the creation of one or more snapshots and the restoration of these snapshots by a new user account. In A...
IaaS
Snapshot: Snapshot Creation, Snapshot: Snapshot Metadata
true
T1578
null
T1578.003
Modify Cloud Compute Infrastructure: Delete Cloud Instance
An adversary may delete a cloud instance after they have performed malicious activities in an attempt to evade detection and remove evidence of their presence. Deleting an instance or virtual machine can remove valuable forensic artifacts and other evidence of suspicious behavior if the instance is not recoverable. An ...
https://attack.mitre.org/techniques/T1578/003
Defense Evasion
The deletion of a new instance or virtual machine is a common part of operations within many cloud environments. Events should then not be viewed in isolation, but as part of a chain of behavior that could lead to other activities. For example, detecting a sequence of events such as the creation of an instance, mountin...
IaaS
Instance: Instance Deletion, Instance: Instance Metadata
true
T1578
null
T1578.005
Modify Cloud Compute Infrastructure: Modify Cloud Compute Configurations
Adversaries may modify settings that directly affect the size, locations, and resources available to cloud compute infrastructure in order to evade defenses. These settings may include service quotas, subscription associations, tenant-wide policies, or other configurations that impact available compute. Such modificati...
https://attack.mitre.org/techniques/T1578/005
Defense Evasion
No detection description provided.
IaaS
Cloud Service: Cloud Service Modification
true
T1578
null
T1578.004
Modify Cloud Compute Infrastructure: Revert Cloud Instance
An adversary may revert changes made to a cloud instance after they have performed malicious activities in attempt to evade detection and remove evidence of their presence. In highly virtualized environments, such as cloud-based infrastructure, this may be accomplished by restoring virtual machine (VM) or data storage ...
https://attack.mitre.org/techniques/T1578/004
Defense Evasion
Establish centralized logging of instance activity, which can be used to monitor and review system events even after reverting to a snapshot, rolling back changes, or changing persistence/type of storage. Monitor specifically for events related to snapshots and rollbacks and VM configuration changes, that are occurring...
IaaS
Instance: Instance Metadata, Instance: Instance Modification, Instance: Instance Start, Instance: Instance Stop
true
T1578
null
T1535
Unused/Unsupported Cloud Regions
Adversaries may create cloud instances in unused geographic service regions in order to evade detection. Access is usually obtained through compromising accounts used to manage cloud infrastructure. Cloud service providers often provide infrastructure throughout the world in order to improve performance, provide redund...
https://attack.mitre.org/techniques/T1535
Defense Evasion
Monitor system logs to review activities occurring across all cloud environments and regions. Configure alerting to notify of activity in normally unused regions or if the number of instances active in a region goes above a certain threshold.
IaaS
Instance: Instance Creation, Instance: Instance Metadata
false
null
null
T1550
Use Alternate Authentication Material
Adversaries may use alternate authentication material, such as password hashes, Kerberos tickets, and application access tokens, in order to move laterally within an environment and bypass normal system access controls. Authentication processes generally require a valid identity (e.g., username) along with one or more ...
https://attack.mitre.org/techniques/T1550
Defense Evasion, Lateral Movement
Configure robust, consistent account activity audit policies across the enterprise and with externally accessible services. Look for suspicious account behavior across systems that share accounts, either user, admin, or service accounts. Examples: one account logged into multiple systems simultaneously; multiple accoun...
Containers, Google Workspace, IaaS, Office 365, SaaS, Windows
Active Directory: Active Directory Credential Request, Application Log: Application Log Content, Logon Session: Logon Session Creation, User Account: User Account Authentication, Web Credential: Web Credential Usage
false
null
System Access Controls
T1550.001
Use Alternate Authentication Material: Application Access Token
Adversaries may use stolen application access tokens to bypass the typical authentication process and access restricted accounts, information, or services on remote systems. These tokens are typically stolen from users or services and used in lieu of login credentials. Application access tokens are used to make authori...
https://attack.mitre.org/techniques/T1550/001
Defense Evasion, Lateral Movement
Monitor access token activity for abnormal use and permissions granted to unusual or suspicious applications and APIs. Additionally, administrators should review logs for calls to the AWS Security Token Service (STS) and usage of GCP service accounts in order to identify anomalous actions.
Azure AD, Containers, Google Workspace, IaaS, Office 365, SaaS
Web Credential: Web Credential Usage
true
T1550
System Access Controls
T1550.004
Use Alternate Authentication Material: Web Session Cookie
Adversaries can use stolen session cookies to authenticate to web applications and services. This technique bypasses some multi-factor authentication protocols since the session is already authenticated. Authentication cookies are commonly used in web applications, including cloud-based services, after a user has authe...
https://attack.mitre.org/techniques/T1550/004
Defense Evasion, Lateral Movement
Monitor for anomalous access of websites and cloud-based applications by the same user in different locations or by different systems that do not match expected configurations.
Google Workspace, IaaS, Office 365, SaaS
Application Log: Application Log Content, Web Credential: Web Credential Usage
true
T1550
System Access Controls
T1110
Brute Force
Adversaries may use brute force techniques to gain access to accounts when passwords are unknown or when password hashes are obtained. Without knowledge of the password for an account or set of accounts, an adversary may systematically guess the password using a repetitive or iterative mechanism. Brute forcing password...
https://attack.mitre.org/techniques/T1110
Credential Access
Monitor authentication logs for system and application login failures of Valid Accounts. If authentication failures are high, then there may be a brute force attempt to gain access to a system using legitimate credentials. Also monitor for many failed authentication attempts across various accounts that may result from...
Azure AD, Containers, Google Workspace, IaaS, Linux, Network, Office 365, SaaS, Windows, macOS
Application Log: Application Log Content, Command: Command Execution, User Account: User Account Authentication
false
null
null
T1110.004
Brute Force: Credential Stuffing
Adversaries may use credentials obtained from breach dumps of unrelated accounts to gain access to target accounts through credential overlap. Occasionally, large numbers of username and password pairs are dumped online when a website or service is compromised and the user account credentials accessed. The information ...
https://attack.mitre.org/techniques/T1110/004
Credential Access
Monitor authentication logs for system and application login failures of Valid Accounts. If authentication failures are high, then there may be a brute force attempt to gain access to a system using legitimate credentials.
Azure AD, Containers, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS
Application Log: Application Log Content, User Account: User Account Authentication
true
T1110
null
T1110.002
Brute Force: Password Cracking
Adversaries may use password cracking to attempt to recover usable credentials, such as plaintext passwords, when credential material such as password hashes are obtained. OS Credential Dumping can be used to obtain password hashes, this may only get an adversary so far when Pass the Hash is not an option. Further, adv...
https://attack.mitre.org/techniques/T1110/002
Credential Access
It is difficult to detect when hashes are cracked, since this is generally done outside the scope of the target network. Consider focusing efforts on detecting other adversary behavior used to acquire credential materials, such as OS Credential Dumping or Kerberoasting.
Azure AD, Linux, Network, Office 365, Windows, macOS
Application Log: Application Log Content, User Account: User Account Authentication
true
T1110
null
T1110.001
Brute Force: Password Guessing
Adversaries with no prior knowledge of legitimate credentials within the system or environment may guess passwords to attempt access to accounts. Without knowledge of the password for an account, an adversary may opt to systematically guess the password using a repetitive or iterative mechanism. An adversary may guess ...
https://attack.mitre.org/techniques/T1110/001
Credential Access
Monitor authentication logs for system and application login failures of Valid Accounts. If authentication failures are high, then there may be a brute force attempt to gain access to a system using legitimate credentials.
Azure AD, Containers, Google Workspace, IaaS, Linux, Network, Office 365, SaaS, Windows, macOS
Application Log: Application Log Content, User Account: User Account Authentication
true
T1110
null
T1110.003
Brute Force: Password Spraying
Adversaries may use a single or small list of commonly used passwords against many different accounts to attempt to acquire valid account credentials. Password spraying uses one password (e.g. 'Password01'), or a small list of commonly used passwords, that may match the complexity policy of the domain. Logins are attem...
https://attack.mitre.org/techniques/T1110/003
Credential Access
Monitor authentication logs for system and application login failures of Valid Accounts. Specifically, monitor for many failed authentication attempts across various accounts that may result from password spraying attempts. Consider the following event IDs: Domain Controllers: "Audit Logon" (Success & Failure) for eve...
Azure AD, Containers, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS
Application Log: Application Log Content, User Account: User Account Authentication
true
T1110
null
T1555
Credentials from Password Stores
Adversaries may search for common password storage locations to obtain user credentials. Passwords are stored in several places on a system, depending on the operating system or application holding the credentials. There are also specific applications and services that store passwords to make them easier for users to m...
https://attack.mitre.org/techniques/T1555
Credential Access
Monitor system calls, file read events, and processes for suspicious activity that could indicate searching for a password or other activity related to performing keyword searches (e.g. password, pwd, login, store, secure, credentials, etc.) in process memory for credentials. File read events should be monitored surrou...
IaaS, Linux, Windows, macOS
Cloud Service: Cloud Service Enumeration, Command: Command Execution, File: File Access, Process: OS API Execution, Process: Process Access, Process: Process Creation
false
null
null
T1555.006
Credentials from Password Stores: Cloud Secrets Management Stores
Adversaries may acquire credentials from cloud-native secret management solutions such as AWS Secrets Manager, GCP Secret Manager, Azure Key Vault, and Terraform Vault. Secrets managers support the secure centralized management of passwords, API keys, and other credential material. Where secrets managers are in use, cl...
https://attack.mitre.org/techniques/T1555/006
Credential Access
No detection description provided.
IaaS
Cloud Service: Cloud Service Enumeration
true
T1555
null
T1212
Exploitation for Credential Access
Adversaries may exploit software vulnerabilities in an attempt to collect credentials. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. Credential...
https://attack.mitre.org/techniques/T1212
Credential Access
Detecting software exploitation may be difficult depending on the tools available. Software exploits may not always succeed or may cause the exploited process to become unstable or crash. Also look for behavior on the system that might indicate successful compromise, such as abnormal behavior of processes. Credential r...
Azure AD, Linux, Windows, macOS
Application Log: Application Log Content, Process: Process Creation, User Account: User Account Authentication
false
null
null
T1606
Forge Web Credentials
Adversaries may forge credential materials that can be used to gain access to web applications or Internet services. Web applications and services (hosted in cloud SaaS environments or on-premise servers) often use session cookies, tokens, or other materials to authenticate and authorize user access. Adversaries may ge...
https://attack.mitre.org/techniques/T1606
Credential Access
Monitor for anomalous authentication activity, such as logons or other user session activity associated with unknown accounts. Monitor for unexpected and abnormal access to resources, including access of websites and cloud-based applications by the same user in different locations or by different systems that do not ma...
Azure AD, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS
Logon Session: Logon Session Creation, Web Credential: Web Credential Creation, Web Credential: Web Credential Usage
false
null
null
T1606.002
Forge Web Credentials: SAML Tokens
An adversary may forge SAML tokens with any permissions claims and lifetimes if they possess a valid SAML token-signing certificate. The default lifetime of a SAML token is one hour, but the validity period can be specified in the NotOnOrAfter value of the conditions ... element in a token. This value can be changed us...
https://attack.mitre.org/techniques/T1606/002
Credential Access
This technique may be difficult to detect as SAML tokens are signed by a trusted certificate. The forging process may not be detectable since it is likely to happen outside of a defender's visibility, but subsequent usage of the forged token may be seen. Monitor for anomalous logins using SAML tokens created by a compr...
Azure AD, Google Workspace, IaaS, Office 365, SaaS, Windows
Logon Session: Logon Session Creation, Logon Session: Logon Session Metadata, User Account: User Account Authentication, Web Credential: Web Credential Creation, Web Credential: Web Credential Usage
true
T1606
null
T1606.001
Forge Web Credentials: Web Cookies
Adversaries may forge web cookies that can be used to gain access to web applications or Internet services. Web applications and services (hosted in cloud SaaS environments or on-premise servers) often use session cookies to authenticate and authorize user access. Adversaries may generate these cookies in order to gain...
https://attack.mitre.org/techniques/T1606/001
Credential Access
Monitor for anomalous authentication activity, such as logons or other user session activity associated with unknown accounts. Monitor for unexpected and abnormal access to resources, including access of websites and cloud-based applications by the same user in different locations or by different systems that do not ma...
IaaS, Linux, SaaS, Windows, macOS
Logon Session: Logon Session Creation, Web Credential: Web Credential Usage
true
T1606
null
T1621
Multi-Factor Authentication Request Generation
Adversaries may attempt to bypass multi-factor authentication (MFA) mechanisms and gain access to accounts by generating MFA requests sent to users. Adversaries in possession of credentials to Valid Accounts may be unable to complete the login process if they lack access to the 2FA or MFA mechanisms required as an addi...
https://attack.mitre.org/techniques/T1621
Credential Access
Monitor user account logs as well as 2FA/MFA application logs for suspicious events: unusual login attempt source location, mismatch in location of login attempt and smart device receiving 2FA/MFA request prompts, and high volume of repeated login attempts, all of which may indicate user's primary credentials have been...
Azure AD, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS
Application Log: Application Log Content, Logon Session: Logon Session Creation, Logon Session: Logon Session Metadata, User Account: User Account Authentication
false
null
null
T1040
Network Sniffing
Adversaries may sniff network traffic to capture information about an environment, including authentication material passed over the network. Network sniffing refers to using the network interface on a system to monitor or capture information sent over a wired or wireless connection. An adversary may place a network in...
https://attack.mitre.org/techniques/T1040
Credential Access, Discovery
Detecting the events leading up to sniffing network traffic may be the best method of detection. From the host level, an adversary would likely need to perform a Adversary-in-the-Middle attack against other devices on a wired network in order to capture traffic that was not to or from the current compromised system. Th...
IaaS, Linux, Network, Windows, macOS
Command: Command Execution, Process: Process Creation
false
null
null
T1539
Steal Web Session Cookie
An adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated user without needing credentials. Web applications and services often use session cookies as an authentication token after a user has authenticated to a website. Coo...
https://attack.mitre.org/techniques/T1539
Credential Access
Monitor for attempts to access files and repositories on a local system that are used to store browser session cookies. Monitor for attempts by programs to inject into or dump browser process memory.
Google Workspace, Linux, Office 365, SaaS, Windows, macOS
File: File Access, Process: Process Access
false
null
null
T1649
Steal or Forge Authentication Certificates
Adversaries may steal or forge certificates used for authentication to access remote systems or resources. Digital certificates are often used to sign and encrypt messages and/or files. Certificates are also used as authentication material. For example, Azure AD device certificates and Active Directory Certificate Serv...
https://attack.mitre.org/techniques/T1649
Credential Access
No detection description provided.
Azure AD, Linux, Windows, macOS
Active Directory: Active Directory Credential Request, Active Directory: Active Directory Object Modification, Application Log: Application Log Content, Command: Command Execution, File: File Access, Logon Session: Logon Session Creation, Windows Registry: Windows Registry Key Access
false
null
null
T1552
Unsecured Credentials
Adversaries may search compromised systems to find and obtain insecurely stored credentials. These credentials can be stored and/or misplaced in many locations on a system, including plaintext files (e.g. Bash History), operating system or application-specific repositories (e.g. Credentials in Registry), or other speci...
https://attack.mitre.org/techniques/T1552
Credential Access
While detecting adversaries accessing credentials may be difficult without knowing they exist in the environment, it may be possible to detect adversary use of credentials they have obtained. Monitor the command-line arguments of executing processes for suspicious words or regular expressions that may indicate searchin...
Azure AD, Containers, Google Workspace, IaaS, Linux, Network, Office 365, SaaS, Windows, macOS
Application Log: Application Log Content, Command: Command Execution, File: File Access, Process: Process Creation, User Account: User Account Authentication, Windows Registry: Windows Registry Key Access
false
null
null
T1552.008
Unsecured Credentials: Chat Messages
Adversaries may directly collect unsecured credentials stored or passed through user communication services. Credentials may be sent and stored in user chat communication applications such as email, chat services like Slack or Teams, collaboration tools like Jira or Trello, and any other services that support user comm...
https://attack.mitre.org/techniques/T1552/008
Credential Access
No detection description provided.
Google Workspace, Office 365, SaaS
Application Log: Application Log Content
true
T1552
null
T1552.005
Unsecured Credentials: Cloud Instance Metadata API
Adversaries may attempt to access the Cloud Instance Metadata API to collect credentials and other sensitive data. Most cloud service providers support a Cloud Instance Metadata API which is a service provided to running virtual instances that allows applications to access information about the running virtual instance...
https://attack.mitre.org/techniques/T1552/005
Credential Access
Monitor access to the Instance Metadata API and look for anomalous queries. It may be possible to detect adversary use of credentials they have obtained such as in Valid Accounts.
IaaS
User Account: User Account Authentication
true
T1552
null
T1552.001
Unsecured Credentials: Credentials In Files
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials. These can be files created by users to store their own credentials, shared credential stores for a group of individuals, configuration files containing passwords for a system or service, or source code/b...
https://attack.mitre.org/techniques/T1552/001
Credential Access
While detecting adversaries accessing these files may be difficult without knowing they exist in the first place, it may be possible to detect adversary use of credentials they have obtained. Monitor the command-line arguments of executing processes for suspicious words or regular expressions that may indicate searchin...
Containers, IaaS, Linux, Windows, macOS
Command: Command Execution, File: File Access, Process: Process Creation
true
T1552
null
T1087
Account Discovery
Adversaries may attempt to get a listing of valid accounts, usernames, or email addresses on a system or within a compromised environment. This information can help adversaries determine which accounts exist, which can aid in follow-on behavior such as brute-forcing, spear-phishing attacks, or account takeovers (e.g., ...
https://attack.mitre.org/techniques/T1087
Discovery
System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained. Monitor processes...
Azure AD, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS
Command: Command Execution, File: File Access, Process: Process Creation
false
null
null
T1087.004
Account Discovery: Cloud Account
Adversaries may attempt to get a listing of cloud accounts. Cloud accounts are those created and configured by an organization for use by users, remote support, services, or for administration of resources within a cloud service provider or SaaS application. With authenticated access there are several tools that can be...
https://attack.mitre.org/techniques/T1087/004
Discovery
Monitor processes, command-line arguments, and logs for actions that could be taken to gather information about cloud accounts, including the use of calls to cloud APIs that perform account discovery. System and network discovery techniques normally occur throughout an operation as an adversary learns the environment, ...
Azure AD, Google Workspace, IaaS, Office 365, SaaS
Command: Command Execution
true
T1087
null
T1087.003
Account Discovery: Email Account
Adversaries may attempt to get a listing of email addresses and accounts. Adversaries may try to dump Exchange address lists such as global address lists (GALs). In on-premises Exchange and Exchange Online, theGet-GlobalAddressList PowerShell cmdlet can be used to obtain email addresses and accounts from a domain using...
https://attack.mitre.org/techniques/T1087/003
Discovery
System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained. Monitor processes...
Google Workspace, Office 365, Windows
Command: Command Execution, Process: Process Creation
true
T1087
null
T1580
Cloud Infrastructure Discovery
An adversary may attempt to discover infrastructure and resources that are available within an infrastructure-as-a-service (IaaS) environment. This includes compute service resources such as instances, virtual machines, and snapshots as well as resources of other services including the storage and database services. Cl...
https://attack.mitre.org/techniques/T1580
Discovery
Establish centralized logging for the activity of cloud infrastructure components. Monitor logs for actions that could be taken to gather information about cloud infrastructure, including the use of discovery API calls by new or unexpected users and enumerations from unknown or malicious IP addresses. To reduce false p...
IaaS
Cloud Storage: Cloud Storage Enumeration, Instance: Instance Enumeration, Snapshot: Snapshot Enumeration, Volume: Volume Enumeration
false
null
null
T1538
Cloud Service Dashboard
An adversary may use a cloud service dashboard GUI with stolen credentials to gain useful information from an operational cloud environment, such as specific services, resources, and features. For example, the GCP Command Center can be used to view all assets, findings of potential security risks, and to run additional...
https://attack.mitre.org/techniques/T1538
Discovery
Monitor account activity logs to see actions performed and activity associated with the cloud service management console. Some cloud providers, such as AWS, provide distinct log events for login attempts to the management console.
Azure AD, Google Workspace, IaaS, Office 365
Logon Session: Logon Session Creation, User Account: User Account Authentication
false
null
null
T1526
Cloud Service Discovery
An adversary may attempt to enumerate the cloud services running on a system after gaining access. These methods can differ from platform-as-a-service (PaaS), to infrastructure-as-a-service (IaaS), or software-as-a-service (SaaS). Many services exist throughout the various cloud providers and can include Continuous Int...
https://attack.mitre.org/techniques/T1526
Discovery
Cloud service discovery techniques will likely occur throughout an operation where an adversary is targeting cloud-based systems and services. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities based on the information obtained. Normal, benign syste...
Azure AD, Google Workspace, IaaS, Office 365, SaaS
Cloud Service: Cloud Service Enumeration
false
null
null
T1619
Cloud Storage Object Discovery
Adversaries may enumerate objects in cloud storage infrastructure. Adversaries may use this information during automated discovery to shape follow-on behaviors, including requesting all or specific objects from cloud storage. Similar to File and Directory Discovery on a local host, after identifying available storage s...
https://attack.mitre.org/techniques/T1619
Discovery
System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Collection and Exfiltration, based on the information obtained. Monito...
IaaS
Cloud Storage: Cloud Storage Access, Cloud Storage: Cloud Storage Enumeration
false
null
null
T1654
Log Enumeration
Adversaries may enumerate system and service logs to find useful data. These logs may highlight various types of valuable insights for an adversary, such as user authentication records (Account Discovery), security or vulnerable software (Software Discovery), or hosts within a compromised network (Remote System Discove...
https://attack.mitre.org/techniques/T1654
Discovery
No detection description provided.
IaaS, Linux, Windows, macOS
Command: Command Execution, File: File Access, Process: Process Creation
false
null
null
T1046
Network Service Discovery
Adversaries may attempt to get a listing of services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to remote software exploitation. Common methods to acquire this information include port and/or vulnerability scans using tools that are brought onto a system. Wi...
https://attack.mitre.org/techniques/T1046
Discovery
System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained. Normal, benign sy...
Containers, IaaS, Linux, Network, Windows, macOS
Cloud Service: Cloud Service Enumeration, Command: Command Execution, Network Traffic: Network Traffic Flow
false
null
null
T1201
Password Policy Discovery
Adversaries may attempt to access detailed information about the password policy used within an enterprise network or cloud environment. Password policies are a way to enforce complex passwords that are difficult to guess or crack through Brute Force. This information may help the adversary to create a list of common p...
https://attack.mitre.org/techniques/T1201
Discovery
Monitor logs and processes for tools and command line arguments that may indicate they're being used for password policy discovery. Correlate that activity with other suspicious activity from the originating system to reduce potential false positives from valid user or administrator activity. Adversaries will likely at...
IaaS, Linux, Network, Windows, macOS
Command: Command Execution, Process: Process Creation, User Account: User Account Metadata
false
null
null
T1069
Permission Groups Discovery
Adversaries may attempt to discover group and permission settings. This information can help adversaries determine which user accounts and groups are available, the membership of users in particular groups, and which users and groups have elevated permissions. Adversaries may attempt to discover group permission settin...
https://attack.mitre.org/techniques/T1069
Discovery
System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained. Monitor processes...
Azure AD, Containers, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS
Application Log: Application Log Content, Command: Command Execution, Group: Group Enumeration, Group: Group Metadata, Process: Process Creation
false
null
null
T1069.003
Permission Groups Discovery: Cloud Groups
Adversaries may attempt to find cloud groups and permission settings. The knowledge of cloud permission groups can help adversaries determine the particular roles of users and groups within an environment, as well as which users are associated with a particular group. With authenticated access there are several tools t...
https://attack.mitre.org/techniques/T1069/003
Discovery
System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained. Monitor processes...
Azure AD, Google Workspace, IaaS, Office 365, SaaS
Application Log: Application Log Content, Command: Command Execution, Group: Group Enumeration, Group: Group Metadata, Process: Process Creation
true
T1069
null
T1518
Software Discovery
Adversaries may attempt to get a listing of software and software versions that are installed on a system or in a cloud environment. Adversaries may use the information from Software Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or...
https://attack.mitre.org/techniques/T1518
Discovery
System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as lateral movement, based on the information obtained. Monitor processes...
Azure AD, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS
Command: Command Execution, Firewall: Firewall Enumeration, Firewall: Firewall Metadata, Process: OS API Execution, Process: Process Creation
false
null
null
T1518.001
Software Discovery: Security Software Discovery
Adversaries may attempt to get a listing of security software, configurations, defensive tools, and sensors that are installed on a system or in a cloud environment. This may include things such as firewall rules and anti-virus. Adversaries may use the information from Security Software Discovery during automated disco...
https://attack.mitre.org/techniques/T1518/001
Discovery
System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as lateral movement, based on the information obtained. Monitor processes...
Azure AD, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS
Command: Command Execution, Firewall: Firewall Enumeration, Firewall: Firewall Metadata, Process: OS API Execution, Process: Process Creation
true
T1518
null
T1082
System Information Discovery
An adversary may attempt to get detailed information about the operating system and hardware, including version, patches, hotfixes, service packs, and architecture. Adversaries may use the information from System Information Discovery during automated discovery to shape follow-on behaviors, including whether or not the...
https://attack.mitre.org/techniques/T1082
Discovery
System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities based on the information obtained. Monitor processes and command-line arguments...
IaaS, Linux, Network, Windows, macOS
Command: Command Execution, Process: OS API Execution, Process: Process Creation
false
null
null
T1614
System Location Discovery
Adversaries may gather information in an attempt to calculate the geographical location of a victim host. Adversaries may use the information from System Location Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific a...
https://attack.mitre.org/techniques/T1614
Discovery
System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities based on the information obtained. Monitor processes and command-line arguments...
IaaS, Linux, Windows, macOS
Command: Command Execution, Process: OS API Execution, Process: Process Creation
false
null
null
T1049
System Network Connections Discovery
Adversaries may attempt to get a listing of network connections to or from the compromised system they are currently accessing or from remote systems by querying for information over the network. An adversary who gains access to a system that is part of a cloud-based environment may map out Virtual Private Clouds or Vi...
https://attack.mitre.org/techniques/T1049
Discovery
System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained. Monitor processes...
IaaS, Linux, Network, Windows, macOS
Command: Command Execution, Process: OS API Execution, Process: Process Creation
false
null
null
T1534
Internal Spearphishing
Adversaries may use internal spearphishing to gain access to additional information or exploit other users within the same organization after they already have access to accounts or systems within the environment. Internal spearphishing is multi-staged campaign where an email account is owned either by controlling the ...
https://attack.mitre.org/techniques/T1534
Lateral Movement
Network intrusion detection systems and email gateways usually do not scan internal email, but an organization can leverage the journaling-based solution which sends a copy of emails to a security service for offline analysis or incorporate service-integrated solutions using on-premise or API-based integrations to help...
Google Workspace, Linux, Office 365, SaaS, Windows, macOS
Application Log: Application Log Content, Network Traffic: Network Traffic Content, Network Traffic: Network Traffic Flow
false
null
null
T1021
Remote Services
Adversaries may use Valid Accounts to log into a service that accepts remote connections, such as telnet, SSH, and VNC. The adversary may then perform actions as the logged-on user. In an enterprise environment, servers and workstations can be organized into domains. Domains provide centralized identity management, all...
https://attack.mitre.org/techniques/T1021
Lateral Movement
Correlate use of login activity related to remote services with unusual behavior or other malicious or suspicious activity. Adversaries will likely need to learn about an environment and the relationships between systems through Discovery techniques prior to attempting Lateral Movement. Use of applications such as ARD ...
IaaS, Linux, Windows, macOS
Command: Command Execution, Logon Session: Logon Session Creation, Module: Module Load, Network Share: Network Share Access, Network Traffic: Network Connection Creation, Network Traffic: Network Traffic Flow, Process: Process Creation, WMI: WMI Creation
false
null
null
T1021.007
Remote Services: Cloud Services
Adversaries may log into accessible cloud services within a compromised environment using Valid Accounts that are synchronized with or federated to on-premises user identities. The adversary may then perform management actions or access cloud-hosted resources as the logged-on user. Many enterprises federate centrally m...
https://attack.mitre.org/techniques/T1021/007
Lateral Movement
No detection description provided.
Azure AD, Google Workspace, IaaS, Office 365, SaaS
Logon Session: Logon Session Creation
true
T1021
null
T1021.008
Remote Services: Direct Cloud VM Connections
Adversaries may leverage Valid Accounts to log directly into accessible cloud hosted compute infrastructure through cloud native methods. Many cloud providers offer interactive connections to virtual infrastructure that can be accessed through the Cloud API, such as Azure Serial Console, AWS EC2 Instance Connect, and A...
https://attack.mitre.org/techniques/T1021/008
Lateral Movement
No detection description provided.
IaaS
Logon Session: Logon Session Creation
true
T1021
null
T1080
Taint Shared Content
Adversaries may deliver payloads to remote systems by adding content to shared storage locations, such as network drives or internal code repositories. Content stored on network drives or in other shared locations may be tainted by adding malicious programs, scripts, or exploit code to otherwise valid files. Once a use...
https://attack.mitre.org/techniques/T1080
Lateral Movement
Processes that write or overwrite many files to a network shared directory may be suspicious. Monitor processes that are executed from removable media for malicious or abnormal activity such as network connections due to Command and Control and possible network Discovery techniques. Frequently scan shared network direc...
Linux, Office 365, SaaS, Windows, macOS
File: File Creation, File: File Modification, Network Share: Network Share Access, Process: Process Creation
false
null
null