question
stringlengths
44
108
answer
stringlengths
213
2.86k
In ATT&CK, what tactic does T1562.001 «Disable or Modify Tools» belong to?
Defense Evasion. I determined that the tactic(s) Defense Evasion apply to 'Disable or Modify Tools' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
Briefly describe the technique T1163 «Rc.common».
During the boot process, macOS executes <code>source /etc/rc.common</code>, which is a shell script containing various utility functions. This file also defines routines for processing command-line arguments and for gathering system settings, and is thus recommended to include in the start of Startup Item Scripts (Citation: Startup Items). In macOS and OS X, this is now a deprecated technique in favor of launch agents and launch daemons, but is currently still used.. By reviewing the MITRE ATT&CK description, I understood that 'Rc.common' involves during the boot process, macos executes <code>source /etc/rc.common</code>, which is a shell script containing various utility functions. this file also defines routines for processing command-line arguments and for gathering system settings, and is thus recommended to include in the start of startup item scripts (citation: startup items). in macos and os x, this is now a deprecated technique in favor of launch agents and launch daemons, but is currently still used, capturing the essence of how adversaries practically leverage this technique.
In ATT&CK, what tactic does T1045 «Software Packing» belong to?
Defense Evasion. I determined that the tactic(s) Defense Evasion apply to 'Software Packing' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
In ATT&CK, what tactic does T1574.014 «AppDomainManager» belong to?
Persistence, Privilege Escalation, Defense Evasion. I determined that the tactic(s) Persistence, Privilege Escalation, Defense Evasion apply to 'AppDomainManager' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
In ATT&CK, what tactic does T1202 «Indirect Command Execution» belong to?
Defense Evasion. I determined that the tactic(s) Defense Evasion apply to 'Indirect Command Execution' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
Briefly describe the technique T1556.002 «Password Filter DLL».
Adversaries may register malicious password filter dynamic link libraries (DLLs) into the authentication process to acquire user credentials as they are validated.. By reviewing the MITRE ATT&CK description, I understood that 'Password Filter DLL' involves adversaries may register malicious password filter dynamic link libraries (dlls) into the authentication process to acquire user credentials as they are validated, capturing the essence of how adversaries practically leverage this technique.
In ATT&CK, what tactic does T1609 «Container Administration Command» belong to?
Execution. I determined that the tactic(s) Execution apply to 'Container Administration Command' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
In ATT&CK, what tactic does T1176 «Software Extensions» belong to?
Persistence. I determined that the tactic(s) Persistence apply to 'Software Extensions' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
In ATT&CK, what tactic does T1136.003 «Cloud Account» belong to?
Persistence. I determined that the tactic(s) Persistence apply to 'Cloud Account' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
Briefly describe the technique T1020.001 «Traffic Duplication».
Adversaries may leverage traffic mirroring in order to automate data exfiltration over compromised infrastructure. Traffic mirroring is a native feature for some devices, often used for network analysis. For example, devices may be configured to forward network traffic to one or more destinations for analysis by a network analyzer or other monitoring device. (Citation: Cisco Traffic Mirroring)(Citation: Juniper Traffic Mirroring). By reviewing the MITRE ATT&CK description, I understood that 'Traffic Duplication' involves adversaries may leverage traffic mirroring in order to automate data exfiltration over compromised infrastructure. traffic mirroring is a native feature for some devices, often used for network analysis. for example, devices may be configured to forward network traffic to one or more destinations for analysis by a network analyzer or other monitoring device. (citation: cisco traffic mirroring)(citation: juniper traffic mirroring, capturing the essence of how adversaries practically leverage this technique.
Briefly describe the technique T1212 «Exploitation for Credential Access».
Adversaries may exploit software vulnerabilities in an attempt to collect credentials. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code.. By reviewing the MITRE ATT&CK description, I understood that 'Exploitation for Credential Access' involves adversaries may exploit software vulnerabilities in an attempt to collect credentials. exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code, capturing the essence of how adversaries practically leverage this technique.
In ATT&CK, what tactic does T1134.003 «Make and Impersonate Token» belong to?
Defense Evasion, Privilege Escalation. I determined that the tactic(s) Defense Evasion, Privilege Escalation apply to 'Make and Impersonate Token' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
Briefly describe the technique T1569.003 «Systemctl».
Adversaries may abuse systemctl to execute commands or programs. Systemctl is the primary interface for systemd, the Linux init system and service manager. Typically invoked from a shell, Systemctl can also be integrated into scripts or applications.. By reviewing the MITRE ATT&CK description, I understood that 'Systemctl' involves adversaries may abuse systemctl to execute commands or programs. systemctl is the primary interface for systemd, the linux init system and service manager. typically invoked from a shell, systemctl can also be integrated into scripts or applications, capturing the essence of how adversaries practically leverage this technique.
Briefly describe the technique T1556.004 «Network Device Authentication».
Adversaries may use [Patch System Image](https://attack.mitre.org/techniques/T1601/001) to hard code a password in the operating system, thus bypassing of native authentication mechanisms for local accounts on network devices.. By reviewing the MITRE ATT&CK description, I understood that 'Network Device Authentication' involves adversaries may use [patch system image](https://attack.mitre.org/techniques/t1601/001) to hard code a password in the operating system, thus bypassing of native authentication mechanisms for local accounts on network devices, capturing the essence of how adversaries practically leverage this technique.
Briefly describe the technique T1210 «Exploitation of Remote Services».
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. A common goal for post-compromise exploitation of remote services is for lateral movement to enable access to a remote system.. By reviewing the MITRE ATT&CK description, I understood that 'Exploitation of Remote Services' involves adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network. exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. a common goal for post-compromise exploitation of remote services is for lateral movement to enable access to a remote system, capturing the essence of how adversaries practically leverage this technique.
Briefly describe the technique T1567.004 «Exfiltration Over Webhook».
Adversaries may exfiltrate data to a webhook endpoint rather than over their primary command and control channel. Webhooks are simple mechanisms for allowing a server to push data over HTTP/S to a client without the need for the client to continuously poll the server.(Citation: RedHat Webhooks) Many public and commercial services, such as Discord, Slack, and 'webhook.site', support the creation of webhook endpoints that can be used by other services, such as Github, Jira, or Trello.(Citation: Discord Intro to Webhooks) When changes happen in the linked services (such as pushing a repository update or modifying a ticket), these services will automatically post the data to the webhook endpoint for use by the consuming application.. By reviewing the MITRE ATT&CK description, I understood that 'Exfiltration Over Webhook' involves adversaries may exfiltrate data to a webhook endpoint rather than over their primary command and control channel. webhooks are simple mechanisms for allowing a server to push data over http/s to a client without the need for the client to continuously poll the server.(citation: redhat webhooks) many public and commercial services, such as discord, slack, and 'webhook.site', support the creation of webhook endpoints that can be used by other services, such as github, jira, or trello.(citation: discord intro to webhooks) when changes happen in the linked services (such as pushing a repository update or modifying a ticket), these services will automatically post the data to the webhook endpoint for use by the consuming application, capturing the essence of how adversaries practically leverage this technique.
In ATT&CK, what tactic does T1502 «Parent PID Spoofing» belong to?
Defense Evasion, Privilege Escalation. I determined that the tactic(s) Defense Evasion, Privilege Escalation apply to 'Parent PID Spoofing' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
Briefly describe the technique T1558.001 «Golden Ticket».
Adversaries who have the KRBTGT account password hash may forge Kerberos ticket-granting tickets (TGT), also known as a golden ticket.(Citation: AdSecurity Kerberos GT Aug 2015) Golden tickets enable adversaries to generate authentication material for any account in Active Directory.(Citation: CERT-EU Golden Ticket Protection). By reviewing the MITRE ATT&CK description, I understood that 'Golden Ticket' involves adversaries who have the krbtgt account password hash may forge kerberos ticket-granting tickets (tgt), also known as a golden ticket.(citation: adsecurity kerberos gt aug 2015) golden tickets enable adversaries to generate authentication material for any account in active directory.(citation: cert-eu golden ticket protection, capturing the essence of how adversaries practically leverage this technique.
Briefly describe the technique T1555 «Credentials from Password Stores».
Adversaries may search for common password storage locations to obtain user credentials.(Citation: F-Secure The Dukes) Passwords are stored in several places on a system, depending on the operating system or application holding the credentials. There are also specific applications and services that store passwords to make them easier for users to manage and maintain, such as password managers and cloud secrets vaults. Once credentials are obtained, they can be used to perform lateral movement and access restricted information.. By reviewing the MITRE ATT&CK description, I understood that 'Credentials from Password Stores' involves adversaries may search for common password storage locations to obtain user credentials.(citation: f-secure the dukes) passwords are stored in several places on a system, depending on the operating system or application holding the credentials. there are also specific applications and services that store passwords to make them easier for users to manage and maintain, such as password managers and cloud secrets vaults. once credentials are obtained, they can be used to perform lateral movement and access restricted information, capturing the essence of how adversaries practically leverage this technique.
Briefly describe the technique T1100 «Web Shell».
A Web shell is a Web script that is placed on an openly accessible Web server to allow an adversary to use the Web server as a gateway into a network. A Web shell may provide a set of functions to execute or a command-line interface on the system that hosts the Web server. In addition to a server-side script, a Web shell may have a client interface program that is used to talk to the Web server (see, for example, China Chopper Web shell client). (Citation: Lee 2013). By reviewing the MITRE ATT&CK description, I understood that 'Web Shell' involves a web shell is a web script that is placed on an openly accessible web server to allow an adversary to use the web server as a gateway into a network. a web shell may provide a set of functions to execute or a command-line interface on the system that hosts the web server. in addition to a server-side script, a web shell may have a client interface program that is used to talk to the web server (see, for example, china chopper web shell client). (citation: lee 2013, capturing the essence of how adversaries practically leverage this technique.
In ATT&CK, what tactic does T1214 «Credentials in Registry» belong to?
Credential Access. I determined that the tactic(s) Credential Access apply to 'Credentials in Registry' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
Briefly describe the technique T1601.002 «Downgrade System Image».
Adversaries may install an older version of the operating system of a network device to weaken security. Older operating system versions on network devices often have weaker encryption ciphers and, in general, fewer/less updated defensive features. (Citation: Cisco Synful Knock Evolution). By reviewing the MITRE ATT&CK description, I understood that 'Downgrade System Image' involves adversaries may install an older version of the operating system of a network device to weaken security. older operating system versions on network devices often have weaker encryption ciphers and, in general, fewer/less updated defensive features. (citation: cisco synful knock evolution, capturing the essence of how adversaries practically leverage this technique.
In ATT&CK, what tactic does T1201 «Password Policy Discovery» belong to?
Discovery. I determined that the tactic(s) Discovery apply to 'Password Policy Discovery' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
In ATT&CK, what tactic does T1566.002 «Spearphishing Link» belong to?
Initial Access. I determined that the tactic(s) Initial Access apply to 'Spearphishing Link' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
Briefly describe the technique T1053 «Scheduled Task/Job».
Adversaries may abuse task scheduling functionality to facilitate initial or recurring execution of malicious code. Utilities exist within all major operating systems to schedule programs or scripts to be executed at a specified date and time. A task can also be scheduled on a remote system, provided the proper authentication is met (ex: RPC and file and printer sharing in Windows environments). Scheduling a task on a remote system typically may require being a member of an admin or otherwise privileged group on the remote system.(Citation: TechNet Task Scheduler Security). By reviewing the MITRE ATT&CK description, I understood that 'Scheduled Task/Job' involves adversaries may abuse task scheduling functionality to facilitate initial or recurring execution of malicious code. utilities exist within all major operating systems to schedule programs or scripts to be executed at a specified date and time. a task can also be scheduled on a remote system, provided the proper authentication is met (ex: rpc and file and printer sharing in windows environments). scheduling a task on a remote system typically may require being a member of an admin or otherwise privileged group on the remote system.(citation: technet task scheduler security, capturing the essence of how adversaries practically leverage this technique.
Briefly describe the technique T1559.003 «XPC Services».
Adversaries can provide malicious content to an XPC service daemon for local code execution. macOS uses XPC services for basic inter-process communication between various processes, such as between the XPC Service daemon and third-party application privileged helper tools. Applications can send messages to the XPC Service daemon, which runs as root, using the low-level XPC Service <code>C API</code> or the high level <code>NSXPCConnection API</code> in order to handle tasks that require elevated privileges (such as network connections). Applications are responsible for providing the protocol definition which serves as a blueprint of the XPC services. Developers typically use XPC Services to provide applications stability and privilege separation between the application client and the daemon.(Citation: creatingXPCservices)(Citation: Designing Daemons Apple Dev). By reviewing the MITRE ATT&CK description, I understood that 'XPC Services' involves adversaries can provide malicious content to an xpc service daemon for local code execution. macos uses xpc services for basic inter-process communication between various processes, such as between the xpc service daemon and third-party application privileged helper tools. applications can send messages to the xpc service daemon, which runs as root, using the low-level xpc service <code>c api</code> or the high level <code>nsxpcconnection api</code> in order to handle tasks that require elevated privileges (such as network connections). applications are responsible for providing the protocol definition which serves as a blueprint of the xpc services. developers typically use xpc services to provide applications stability and privilege separation between the application client and the daemon.(citation: creatingxpcservices)(citation: designing daemons apple dev, capturing the essence of how adversaries practically leverage this technique.
In ATT&CK, what tactic does T1069 «Permission Groups Discovery» belong to?
Discovery. I determined that the tactic(s) Discovery apply to 'Permission Groups Discovery' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
In ATT&CK, what tactic does T1017 «Application Deployment Software» belong to?
Lateral Movement. I determined that the tactic(s) Lateral Movement apply to 'Application Deployment Software' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
Briefly describe the technique T1486 «Data Encrypted for Impact».
Adversaries may encrypt data on target systems or on large numbers of systems in a network to interrupt availability to system and network resources. They can attempt to render stored data inaccessible by encrypting files or data on local and remote drives and withholding access to a decryption key. This may be done in order to extract monetary compensation from a victim in exchange for decryption or a decryption key (ransomware) or to render data permanently inaccessible in cases where the key is not saved or transmitted.(Citation: US-CERT Ransomware 2016)(Citation: FireEye WannaCry 2017)(Citation: US-CERT NotPetya 2017)(Citation: US-CERT SamSam 2018). By reviewing the MITRE ATT&CK description, I understood that 'Data Encrypted for Impact' involves adversaries may encrypt data on target systems or on large numbers of systems in a network to interrupt availability to system and network resources. they can attempt to render stored data inaccessible by encrypting files or data on local and remote drives and withholding access to a decryption key. this may be done in order to extract monetary compensation from a victim in exchange for decryption or a decryption key (ransomware) or to render data permanently inaccessible in cases where the key is not saved or transmitted.(citation: us-cert ransomware 2016)(citation: fireeye wannacry 2017)(citation: us-cert notpetya 2017)(citation: us-cert samsam 2018, capturing the essence of how adversaries practically leverage this technique.
Briefly describe the technique T1109 «Component Firmware».
Some adversaries may employ sophisticated means to compromise computer components and install malicious firmware that will execute adversary code outside of the operating system and main system firmware or BIOS. This technique may be similar to [System Firmware](https://attack.mitre.org/techniques/T1019) but conducted upon other system components that may not have the same capability or level of integrity checking. Malicious device firmware could provide both a persistent level of access to systems despite potential typical failures to maintain access and hard disk re-images, as well as a way to evade host software-based defenses and integrity checks.. By reviewing the MITRE ATT&CK description, I understood that 'Component Firmware' involves some adversaries may employ sophisticated means to compromise computer components and install malicious firmware that will execute adversary code outside of the operating system and main system firmware or bios. this technique may be similar to [system firmware](https://attack.mitre.org/techniques/t1019) but conducted upon other system components that may not have the same capability or level of integrity checking. malicious device firmware could provide both a persistent level of access to systems despite potential typical failures to maintain access and hard disk re-images, as well as a way to evade host software-based defenses and integrity checks, capturing the essence of how adversaries practically leverage this technique.
In ATT&CK, what tactic does T1132 «Data Encoding» belong to?
Command and Control. I determined that the tactic(s) Command and Control apply to 'Data Encoding' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
Briefly describe the technique T1600 «Weaken Encryption».
Adversaries may compromise a network device’s encryption capability in order to bypass encryption that would otherwise protect data communications. (Citation: Cisco Synful Knock Evolution). By reviewing the MITRE ATT&CK description, I understood that 'Weaken Encryption' involves adversaries may compromise a network device’s encryption capability in order to bypass encryption that would otherwise protect data communications. (citation: cisco synful knock evolution, capturing the essence of how adversaries practically leverage this technique.
Briefly describe the technique T1151 «Space after Filename».
Adversaries can hide a program's true filetype by changing the extension of a file. With certain file types (specifically this does not work with .app extensions), appending a space to the end of a filename will change how the file is processed by the operating system. For example, if there is a Mach-O executable file called evil.bin, when it is double clicked by a user, it will launch Terminal.app and execute. If this file is renamed to evil.txt, then when double clicked by a user, it will launch with the default text editing application (not executing the binary). However, if the file is renamed to "evil.txt " (note the space at the end), then when double clicked by a user, the true file type is determined by the OS and handled appropriately and the binary will be executed (Citation: Mac Backdoors are back).. By reviewing the MITRE ATT&CK description, I understood that 'Space after Filename' involves adversaries can hide a program's true filetype by changing the extension of a file. with certain file types (specifically this does not work with .app extensions), appending a space to the end of a filename will change how the file is processed by the operating system. for example, if there is a mach-o executable file called evil.bin, when it is double clicked by a user, it will launch terminal.app and execute. if this file is renamed to evil.txt, then when double clicked by a user, it will launch with the default text editing application (not executing the binary). however, if the file is renamed to "evil.txt " (note the space at the end), then when double clicked by a user, the true file type is determined by the os and handled appropriately and the binary will be executed (citation: mac backdoors are back), capturing the essence of how adversaries practically leverage this technique.
Briefly describe the technique T1201 «Password Policy Discovery».
Adversaries may attempt to access detailed information about the password policy used within an enterprise network or cloud environment. Password policies are a way to enforce complex passwords that are difficult to guess or crack through [Brute Force](https://attack.mitre.org/techniques/T1110). This information may help the adversary to create a list of common passwords and launch dictionary and/or brute force attacks which adheres to the policy (e.g. if the minimum password length should be 8, then not trying passwords such as 'pass123'; not checking for more than 3-4 passwords per account if the lockout is set to 6 as to not lock out accounts).. By reviewing the MITRE ATT&CK description, I understood that 'Password Policy Discovery' involves adversaries may attempt to access detailed information about the password policy used within an enterprise network or cloud environment. password policies are a way to enforce complex passwords that are difficult to guess or crack through [brute force](https://attack.mitre.org/techniques/t1110). this information may help the adversary to create a list of common passwords and launch dictionary and/or brute force attacks which adheres to the policy (e.g. if the minimum password length should be 8, then not trying passwords such as 'pass123'; not checking for more than 3-4 passwords per account if the lockout is set to 6 as to not lock out accounts), capturing the essence of how adversaries practically leverage this technique.
In ATT&CK, what tactic does T1584.008 «Network Devices» belong to?
Resource Development. I determined that the tactic(s) Resource Development apply to 'Network Devices' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
Briefly describe the technique T1666 «Modify Cloud Resource Hierarchy».
Adversaries may attempt to modify hierarchical structures in infrastructure-as-a-service (IaaS) environments in order to evade defenses.. By reviewing the MITRE ATT&CK description, I understood that 'Modify Cloud Resource Hierarchy' involves adversaries may attempt to modify hierarchical structures in infrastructure-as-a-service (iaas) environments in order to evade defenses, capturing the essence of how adversaries practically leverage this technique.
In ATT&CK, what tactic does T1593.002 «Search Engines» belong to?
Reconnaissance. I determined that the tactic(s) Reconnaissance apply to 'Search Engines' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
In ATT&CK, what tactic does T1560.003 «Archive via Custom Method» belong to?
Collection. I determined that the tactic(s) Collection apply to 'Archive via Custom Method' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
In ATT&CK, what tactic does T1546.008 «Accessibility Features» belong to?
Privilege Escalation, Persistence. I determined that the tactic(s) Privilege Escalation, Persistence apply to 'Accessibility Features' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
In ATT&CK, what tactic does T1497.001 «System Checks» belong to?
Defense Evasion, Discovery. I determined that the tactic(s) Defense Evasion, Discovery apply to 'System Checks' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
Briefly describe the technique T1595.003 «Wordlist Scanning».
Adversaries may iteratively probe infrastructure using brute-forcing and crawling techniques. While this technique employs similar methods to [Brute Force](https://attack.mitre.org/techniques/T1110), its goal is the identification of content and infrastructure rather than the discovery of valid credentials. Wordlists used in these scans may contain generic, commonly used names and file extensions or terms specific to a particular software. Adversaries may also create custom, target-specific wordlists using data gathered from other Reconnaissance techniques (ex: [Gather Victim Org Information](https://attack.mitre.org/techniques/T1591), or [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)).. By reviewing the MITRE ATT&CK description, I understood that 'Wordlist Scanning' involves adversaries may iteratively probe infrastructure using brute-forcing and crawling techniques. while this technique employs similar methods to [brute force](https://attack.mitre.org/techniques/t1110), its goal is the identification of content and infrastructure rather than the discovery of valid credentials. wordlists used in these scans may contain generic, commonly used names and file extensions or terms specific to a particular software. adversaries may also create custom, target-specific wordlists using data gathered from other reconnaissance techniques (ex: [gather victim org information](https://attack.mitre.org/techniques/t1591), or [search victim-owned websites](https://attack.mitre.org/techniques/t1594)), capturing the essence of how adversaries practically leverage this technique.
Briefly describe the technique T1592.004 «Client Configurations».
Adversaries may gather information about the victim's client configurations that can be used during targeting. Information about client configurations may include a variety of details and settings, including operating system/version, virtualization, architecture (ex: 32 or 64 bit), language, and/or time zone.. By reviewing the MITRE ATT&CK description, I understood that 'Client Configurations' involves adversaries may gather information about the victim's client configurations that can be used during targeting. information about client configurations may include a variety of details and settings, including operating system/version, virtualization, architecture (ex: 32 or 64 bit), language, and/or time zone, capturing the essence of how adversaries practically leverage this technique.
Briefly describe the technique T1587.004 «Exploits».
Adversaries may develop exploits that can be used during targeting. An exploit takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer hardware or software. Rather than finding/modifying exploits from online or purchasing them from exploit vendors, an adversary may develop their own exploits.(Citation: NYTStuxnet) Adversaries may use information acquired via [Vulnerabilities](https://attack.mitre.org/techniques/T1588/006) to focus exploit development efforts. As part of the exploit development process, adversaries may uncover exploitable vulnerabilities through methods such as fuzzing and patch analysis.(Citation: Irongeek Sims BSides 2017). By reviewing the MITRE ATT&CK description, I understood that 'Exploits' involves adversaries may develop exploits that can be used during targeting. an exploit takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer hardware or software. rather than finding/modifying exploits from online or purchasing them from exploit vendors, an adversary may develop their own exploits.(citation: nytstuxnet) adversaries may use information acquired via [vulnerabilities](https://attack.mitre.org/techniques/t1588/006) to focus exploit development efforts. as part of the exploit development process, adversaries may uncover exploitable vulnerabilities through methods such as fuzzing and patch analysis.(citation: irongeek sims bsides 2017, capturing the essence of how adversaries practically leverage this technique.
In ATT&CK, what tactic does T1615 «Group Policy Discovery» belong to?
Discovery. I determined that the tactic(s) Discovery apply to 'Group Policy Discovery' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
Briefly describe the technique T1560.003 «Archive via Custom Method».
An adversary may compress or encrypt data that is collected prior to exfiltration using a custom method. Adversaries may choose to use custom archival methods, such as encryption with XOR or stream ciphers implemented with no external library or utility references. Custom implementations of well-known compression algorithms have also been used.(Citation: ESET Sednit Part 2). By reviewing the MITRE ATT&CK description, I understood that 'Archive via Custom Method' involves an adversary may compress or encrypt data that is collected prior to exfiltration using a custom method. adversaries may choose to use custom archival methods, such as encryption with xor or stream ciphers implemented with no external library or utility references. custom implementations of well-known compression algorithms have also been used.(citation: eset sednit part 2, capturing the essence of how adversaries practically leverage this technique.
Briefly describe the technique T1124 «System Time Discovery».
An adversary may gather the system time and/or time zone settings from a local or remote system. The system time is set and stored by services, such as the Windows Time Service on Windows or <code>systemsetup</code> on macOS.(Citation: MSDN System Time)(Citation: Technet Windows Time Service)(Citation: systemsetup mac time) These time settings may also be synchronized between systems and services in an enterprise network, typically accomplished with a network time server within a domain.(Citation: Mac Time Sync)(Citation: linux system time). By reviewing the MITRE ATT&CK description, I understood that 'System Time Discovery' involves an adversary may gather the system time and/or time zone settings from a local or remote system. the system time is set and stored by services, such as the windows time service on windows or <code>systemsetup</code> on macos.(citation: msdn system time)(citation: technet windows time service)(citation: systemsetup mac time) these time settings may also be synchronized between systems and services in an enterprise network, typically accomplished with a network time server within a domain.(citation: mac time sync)(citation: linux system time, capturing the essence of how adversaries practically leverage this technique.
Briefly describe the technique T1118 «InstallUtil».
InstallUtil is a command-line utility that allows for installation and uninstallation of resources by executing specific installer components specified in .NET binaries. (Citation: MSDN InstallUtil) InstallUtil is located in the .NET directories on a Windows system: <code>C:\Windows\Microsoft.NET\Framework\v<version>\InstallUtil.exe</code> and <code>C:\Windows\Microsoft.NET\Framework64\v<version>\InstallUtil.exe</code>. InstallUtil.exe is digitally signed by Microsoft.. By reviewing the MITRE ATT&CK description, I understood that 'InstallUtil' involves installutil is a command-line utility that allows for installation and uninstallation of resources by executing specific installer components specified in .net binaries. (citation: msdn installutil) installutil is located in the .net directories on a windows system: <code>c:\windows\microsoft.net\framework\v<version>\installutil.exe</code> and <code>c:\windows\microsoft.net\framework64\v<version>\installutil.exe</code>. installutil.exe is digitally signed by microsoft, capturing the essence of how adversaries practically leverage this technique.
In ATT&CK, what tactic does T1573 «Encrypted Channel» belong to?
Command and Control. I determined that the tactic(s) Command and Control apply to 'Encrypted Channel' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
In ATT&CK, what tactic does T1074.002 «Remote Data Staging» belong to?
Collection. I determined that the tactic(s) Collection apply to 'Remote Data Staging' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
In ATT&CK, what tactic does T1600.001 «Reduce Key Space» belong to?
Defense Evasion. I determined that the tactic(s) Defense Evasion apply to 'Reduce Key Space' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
Briefly describe the technique T1218.008 «Odbcconf».
Adversaries may abuse odbcconf.exe to proxy execution of malicious payloads. Odbcconf.exe is a Windows utility that allows you to configure Open Database Connectivity (ODBC) drivers and data source names.(Citation: Microsoft odbcconf.exe) The Odbcconf.exe binary may be digitally signed by Microsoft.. By reviewing the MITRE ATT&CK description, I understood that 'Odbcconf' involves adversaries may abuse odbcconf.exe to proxy execution of malicious payloads. odbcconf.exe is a windows utility that allows you to configure open database connectivity (odbc) drivers and data source names.(citation: microsoft odbcconf.exe) the odbcconf.exe binary may be digitally signed by microsoft, capturing the essence of how adversaries practically leverage this technique.
Briefly describe the technique T1567.003 «Exfiltration to Text Storage Sites».
Adversaries may exfiltrate data to text storage sites instead of their primary command and control channel. Text storage sites, such as <code>pastebin[.]com</code>, are commonly used by developers to share code and other information.. By reviewing the MITRE ATT&CK description, I understood that 'Exfiltration to Text Storage Sites' involves adversaries may exfiltrate data to text storage sites instead of their primary command and control channel. text storage sites, such as <code>pastebin[.]com</code>, are commonly used by developers to share code and other information, capturing the essence of how adversaries practically leverage this technique.
In ATT&CK, what tactic does T1136.002 «Domain Account» belong to?
Persistence. I determined that the tactic(s) Persistence apply to 'Domain Account' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
Briefly describe the technique T1547.015 «Login Items».
Adversaries may add login items to execute upon user login to gain persistence or escalate privileges. Login items are applications, documents, folders, or server connections that are automatically launched when a user logs in.(Citation: Open Login Items Apple) Login items can be added via a shared file list or Service Management Framework.(Citation: Adding Login Items) Shared file list login items can be set using scripting languages such as [AppleScript](https://attack.mitre.org/techniques/T1059/002), whereas the Service Management Framework uses the API call <code>SMLoginItemSetEnabled</code>.. By reviewing the MITRE ATT&CK description, I understood that 'Login Items' involves adversaries may add login items to execute upon user login to gain persistence or escalate privileges. login items are applications, documents, folders, or server connections that are automatically launched when a user logs in.(citation: open login items apple) login items can be added via a shared file list or service management framework.(citation: adding login items) shared file list login items can be set using scripting languages such as [applescript](https://attack.mitre.org/techniques/t1059/002), whereas the service management framework uses the api call <code>smloginitemsetenabled</code>, capturing the essence of how adversaries practically leverage this technique.
Briefly describe the technique T1568 «Dynamic Resolution».
Adversaries may dynamically establish connections to command and control infrastructure to evade common detections and remediations. This may be achieved by using malware that shares a common algorithm with the infrastructure the adversary uses to receive the malware's communications. These calculations can be used to dynamically adjust parameters such as the domain name, IP address, or port number the malware uses for command and control.. By reviewing the MITRE ATT&CK description, I understood that 'Dynamic Resolution' involves adversaries may dynamically establish connections to command and control infrastructure to evade common detections and remediations. this may be achieved by using malware that shares a common algorithm with the infrastructure the adversary uses to receive the malware's communications. these calculations can be used to dynamically adjust parameters such as the domain name, ip address, or port number the malware uses for command and control, capturing the essence of how adversaries practically leverage this technique.
Briefly describe the technique T1535 «Unused/Unsupported Cloud Regions».
Adversaries may create cloud instances in unused geographic service regions in order to evade detection. Access is usually obtained through compromising accounts used to manage cloud infrastructure.. By reviewing the MITRE ATT&CK description, I understood that 'Unused/Unsupported Cloud Regions' involves adversaries may create cloud instances in unused geographic service regions in order to evade detection. access is usually obtained through compromising accounts used to manage cloud infrastructure, capturing the essence of how adversaries practically leverage this technique.
In ATT&CK, what tactic does T1076 «Remote Desktop Protocol» belong to?
Lateral Movement. I determined that the tactic(s) Lateral Movement apply to 'Remote Desktop Protocol' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
Briefly describe the technique T1556.006 «Multi-Factor Authentication».
Adversaries may disable or modify multi-factor authentication (MFA) mechanisms to enable persistent access to compromised accounts.. By reviewing the MITRE ATT&CK description, I understood that 'Multi-Factor Authentication' involves adversaries may disable or modify multi-factor authentication (mfa) mechanisms to enable persistent access to compromised accounts, capturing the essence of how adversaries practically leverage this technique.
Briefly describe the technique T1017 «Application Deployment Software».
Adversaries may deploy malicious software to systems within a network using application deployment systems employed by enterprise administrators. The permissions required for this action vary by system configuration; local credentials may be sufficient with direct access to the deployment server, or specific domain credentials may be required. However, the system may require an administrative account to log in or to perform software deployment.. By reviewing the MITRE ATT&CK description, I understood that 'Application Deployment Software' involves adversaries may deploy malicious software to systems within a network using application deployment systems employed by enterprise administrators. the permissions required for this action vary by system configuration; local credentials may be sufficient with direct access to the deployment server, or specific domain credentials may be required. however, the system may require an administrative account to log in or to perform software deployment, capturing the essence of how adversaries practically leverage this technique.
Briefly describe the technique T1027.015 «Compression».
Adversaries may use compression to obfuscate their payloads or files. Compressed file formats such as ZIP, gzip, 7z, and RAR can compress and archive multiple files together to make it easier and faster to transfer files. In addition to compressing files, adversaries may also compress shellcode directly - for example, in order to store it in a Windows Registry key (i.e., [Fileless Storage](https://attack.mitre.org/techniques/T1027/011)).(Citation: Trustwave Pillowmint June 2020). By reviewing the MITRE ATT&CK description, I understood that 'Compression' involves adversaries may use compression to obfuscate their payloads or files. compressed file formats such as zip, gzip, 7z, and rar can compress and archive multiple files together to make it easier and faster to transfer files. in addition to compressing files, adversaries may also compress shellcode directly - for example, in order to store it in a windows registry key (i.e., [fileless storage](https://attack.mitre.org/techniques/t1027/011)).(citation: trustwave pillowmint june 2020, capturing the essence of how adversaries practically leverage this technique.
In ATT&CK, what tactic does T1218.015 «Electron Applications» belong to?
Defense Evasion. I determined that the tactic(s) Defense Evasion apply to 'Electron Applications' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
In ATT&CK, what tactic does T1090.001 «Internal Proxy» belong to?
Command and Control. I determined that the tactic(s) Command and Control apply to 'Internal Proxy' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
Briefly describe the technique T1098.006 «Additional Container Cluster Roles».
An adversary may add additional roles or permissions to an adversary-controlled user or service account to maintain persistent access to a container orchestration system. For example, an adversary with sufficient permissions may create a RoleBinding or a ClusterRoleBinding to bind a Role or ClusterRole to a Kubernetes account.(Citation: Kubernetes RBAC)(Citation: Aquasec Kubernetes Attack 2023) Where attribute-based access control (ABAC) is in use, an adversary with sufficient permissions may modify a Kubernetes ABAC policy to give the target account additional permissions.(Citation: Kuberentes ABAC). By reviewing the MITRE ATT&CK description, I understood that 'Additional Container Cluster Roles' involves an adversary may add additional roles or permissions to an adversary-controlled user or service account to maintain persistent access to a container orchestration system. for example, an adversary with sufficient permissions may create a rolebinding or a clusterrolebinding to bind a role or clusterrole to a kubernetes account.(citation: kubernetes rbac)(citation: aquasec kubernetes attack 2023) where attribute-based access control (abac) is in use, an adversary with sufficient permissions may modify a kubernetes abac policy to give the target account additional permissions.(citation: kuberentes abac, capturing the essence of how adversaries practically leverage this technique.
In ATT&CK, what tactic does T1552.007 «Container API» belong to?
Credential Access. I determined that the tactic(s) Credential Access apply to 'Container API' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
In ATT&CK, what tactic does T1137.002 «Office Test» belong to?
Persistence. I determined that the tactic(s) Persistence apply to 'Office Test' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
Briefly describe the technique T1132.001 «Standard Encoding».
Adversaries may encode data with a standard data encoding system to make the content of command and control traffic more difficult to detect. Command and control (C2) information can be encoded using a standard data encoding system that adheres to existing protocol specifications. Common data encoding schemes include ASCII, Unicode, hexadecimal, Base64, and MIME.(Citation: Wikipedia Binary-to-text Encoding)(Citation: Wikipedia Character Encoding) Some data encoding systems may also result in data compression, such as gzip.. By reviewing the MITRE ATT&CK description, I understood that 'Standard Encoding' involves adversaries may encode data with a standard data encoding system to make the content of command and control traffic more difficult to detect. command and control (c2) information can be encoded using a standard data encoding system that adheres to existing protocol specifications. common data encoding schemes include ascii, unicode, hexadecimal, base64, and mime.(citation: wikipedia binary-to-text encoding)(citation: wikipedia character encoding) some data encoding systems may also result in data compression, such as gzip, capturing the essence of how adversaries practically leverage this technique.
In ATT&CK, what tactic does T1070.005 «Network Share Connection Removal» belong to?
Defense Evasion. I determined that the tactic(s) Defense Evasion apply to 'Network Share Connection Removal' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
In ATT&CK, what tactic does T1197 «BITS Jobs» belong to?
Defense Evasion, Persistence. I determined that the tactic(s) Defense Evasion, Persistence apply to 'BITS Jobs' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
Briefly describe the technique T1585 «Establish Accounts».
Adversaries may create and cultivate accounts with services that can be used during targeting. Adversaries can create accounts that can be used to build a persona to further operations. Persona development consists of the development of public information, presence, history and appropriate affiliations. This development could be applied to social media, website, or other publicly available information that could be referenced and scrutinized for legitimacy over the course of an operation using that persona or identity.(Citation: NEWSCASTER2014)(Citation: BlackHatRobinSage). By reviewing the MITRE ATT&CK description, I understood that 'Establish Accounts' involves adversaries may create and cultivate accounts with services that can be used during targeting. adversaries can create accounts that can be used to build a persona to further operations. persona development consists of the development of public information, presence, history and appropriate affiliations. this development could be applied to social media, website, or other publicly available information that could be referenced and scrutinized for legitimacy over the course of an operation using that persona or identity.(citation: newscaster2014)(citation: blackhatrobinsage, capturing the essence of how adversaries practically leverage this technique.
In ATT&CK, what tactic does T1590.004 «Network Topology» belong to?
Reconnaissance. I determined that the tactic(s) Reconnaissance apply to 'Network Topology' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
In ATT&CK, what tactic does T1652 «Device Driver Discovery» belong to?
Discovery. I determined that the tactic(s) Discovery apply to 'Device Driver Discovery' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
In ATT&CK, what tactic does T1564.014 «Extended Attributes» belong to?
Defense Evasion. I determined that the tactic(s) Defense Evasion apply to 'Extended Attributes' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
Briefly describe the technique T1098.002 «Additional Email Delegate Permissions».
Adversaries may grant additional permission levels to maintain persistent access to an adversary-controlled email account.. By reviewing the MITRE ATT&CK description, I understood that 'Additional Email Delegate Permissions' involves adversaries may grant additional permission levels to maintain persistent access to an adversary-controlled email account, capturing the essence of how adversaries practically leverage this technique.
Briefly describe the technique T1610 «Deploy Container».
Adversaries may deploy a container into an environment to facilitate execution or evade defenses. In some cases, adversaries may deploy a new container to execute processes associated with a particular image or deployment, such as processes that execute or download malware. In others, an adversary may deploy a new container configured without network rules, user limitations, etc. to bypass existing defenses within the environment. In Kubernetes environments, an adversary may attempt to deploy a privileged or vulnerable container into a specific node in order to [Escape to Host](https://attack.mitre.org/techniques/T1611) and access other containers running on the node. (Citation: AppSecco Kubernetes Namespace Breakout 2020). By reviewing the MITRE ATT&CK description, I understood that 'Deploy Container' involves adversaries may deploy a container into an environment to facilitate execution or evade defenses. in some cases, adversaries may deploy a new container to execute processes associated with a particular image or deployment, such as processes that execute or download malware. in others, an adversary may deploy a new container configured without network rules, user limitations, etc. to bypass existing defenses within the environment. in kubernetes environments, an adversary may attempt to deploy a privileged or vulnerable container into a specific node in order to [escape to host](https://attack.mitre.org/techniques/t1611) and access other containers running on the node. (citation: appsecco kubernetes namespace breakout 2020, capturing the essence of how adversaries practically leverage this technique.
Briefly describe the technique T1003.004 «LSA Secrets».
Adversaries with SYSTEM access to a host may attempt to access Local Security Authority (LSA) secrets, which can contain a variety of different credential materials, such as credentials for service accounts.(Citation: Passcape LSA Secrets)(Citation: Microsoft AD Admin Tier Model)(Citation: Tilbury Windows Credentials) LSA secrets are stored in the registry at <code>HKEY_LOCAL_MACHINE\SECURITY\Policy\Secrets</code>. LSA secrets can also be dumped from memory.(Citation: ired Dumping LSA Secrets). By reviewing the MITRE ATT&CK description, I understood that 'LSA Secrets' involves adversaries with system access to a host may attempt to access local security authority (lsa) secrets, which can contain a variety of different credential materials, such as credentials for service accounts.(citation: passcape lsa secrets)(citation: microsoft ad admin tier model)(citation: tilbury windows credentials) lsa secrets are stored in the registry at <code>hkey_local_machine\security\policy\secrets</code>. lsa secrets can also be dumped from memory.(citation: ired dumping lsa secrets, capturing the essence of how adversaries practically leverage this technique.
In ATT&CK, what tactic does T1547.013 «XDG Autostart Entries» belong to?
Persistence, Privilege Escalation. I determined that the tactic(s) Persistence, Privilege Escalation apply to 'XDG Autostart Entries' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
Briefly describe the technique T1218.001 «Compiled HTML File».
Adversaries may abuse Compiled HTML files (.chm) to conceal malicious code. CHM files are commonly distributed as part of the Microsoft HTML Help system. CHM files are compressed compilations of various content such as HTML documents, images, and scripting/web related programming languages such VBA, JScript, Java, and ActiveX. (Citation: Microsoft HTML Help May 2018) CHM content is displayed using underlying components of the Internet Explorer browser (Citation: Microsoft HTML Help ActiveX) loaded by the HTML Help executable program (hh.exe). (Citation: Microsoft HTML Help Executable Program). By reviewing the MITRE ATT&CK description, I understood that 'Compiled HTML File' involves adversaries may abuse compiled html files (.chm) to conceal malicious code. chm files are commonly distributed as part of the microsoft html help system. chm files are compressed compilations of various content such as html documents, images, and scripting/web related programming languages such vba, jscript, java, and activex. (citation: microsoft html help may 2018) chm content is displayed using underlying components of the internet explorer browser (citation: microsoft html help activex) loaded by the html help executable program (hh.exe). (citation: microsoft html help executable program, capturing the essence of how adversaries practically leverage this technique.
In ATT&CK, what tactic does T1148 «HISTCONTROL» belong to?
Defense Evasion. I determined that the tactic(s) Defense Evasion apply to 'HISTCONTROL' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
Briefly describe the technique T1057 «Process Discovery».
Adversaries may attempt to get information about running processes on a system. Information obtained could be used to gain an understanding of common software/applications running on systems within the network. Administrator or otherwise elevated access may provide better process details. Adversaries may use the information from [Process Discovery](https://attack.mitre.org/techniques/T1057) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.. By reviewing the MITRE ATT&CK description, I understood that 'Process Discovery' involves adversaries may attempt to get information about running processes on a system. information obtained could be used to gain an understanding of common software/applications running on systems within the network. administrator or otherwise elevated access may provide better process details. adversaries may use the information from [process discovery](https://attack.mitre.org/techniques/t1057) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions, capturing the essence of how adversaries practically leverage this technique.
In ATT&CK, what tactic does T1542.002 «Component Firmware» belong to?
Persistence, Defense Evasion. I determined that the tactic(s) Persistence, Defense Evasion apply to 'Component Firmware' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
Briefly describe the technique T1564.008 «Email Hiding Rules».
Adversaries may use email rules to hide inbound emails in a compromised user's mailbox. Many email clients allow users to create inbox rules for various email functions, including moving emails to other folders, marking emails as read, or deleting emails. Rules may be created or modified within email clients or through external features such as the <code>New-InboxRule</code> or <code>Set-InboxRule</code> [PowerShell](https://attack.mitre.org/techniques/T1059/001) cmdlets on Windows systems.(Citation: Microsoft Inbox Rules)(Citation: MacOS Email Rules)(Citation: Microsoft New-InboxRule)(Citation: Microsoft Set-InboxRule). By reviewing the MITRE ATT&CK description, I understood that 'Email Hiding Rules' involves adversaries may use email rules to hide inbound emails in a compromised user's mailbox. many email clients allow users to create inbox rules for various email functions, including moving emails to other folders, marking emails as read, or deleting emails. rules may be created or modified within email clients or through external features such as the <code>new-inboxrule</code> or <code>set-inboxrule</code> [powershell](https://attack.mitre.org/techniques/t1059/001) cmdlets on windows systems.(citation: microsoft inbox rules)(citation: macos email rules)(citation: microsoft new-inboxrule)(citation: microsoft set-inboxrule, capturing the essence of how adversaries practically leverage this technique.
Briefly describe the technique T1555.005 «Password Managers».
Adversaries may acquire user credentials from third-party password managers.(Citation: ise Password Manager February 2019) Password managers are applications designed to store user credentials, normally in an encrypted database. Credentials are typically accessible after a user provides a master password that unlocks the database. After the database is unlocked, these credentials may be copied to memory. These databases can be stored as files on disk.(Citation: ise Password Manager February 2019). By reviewing the MITRE ATT&CK description, I understood that 'Password Managers' involves adversaries may acquire user credentials from third-party password managers.(citation: ise password manager february 2019) password managers are applications designed to store user credentials, normally in an encrypted database. credentials are typically accessible after a user provides a master password that unlocks the database. after the database is unlocked, these credentials may be copied to memory. these databases can be stored as files on disk.(citation: ise password manager february 2019, capturing the essence of how adversaries practically leverage this technique.
Briefly describe the technique T1022 «Data Encrypted».
Data is encrypted before being exfiltrated in order to hide the information that is being exfiltrated from detection or to make the exfiltration less conspicuous upon inspection by a defender. The encryption is performed by a utility, programming library, or custom algorithm on the data itself and is considered separate from any encryption performed by the command and control or file transfer protocol. Common file archive formats that can encrypt files are RAR and zip.. By reviewing the MITRE ATT&CK description, I understood that 'Data Encrypted' involves data is encrypted before being exfiltrated in order to hide the information that is being exfiltrated from detection or to make the exfiltration less conspicuous upon inspection by a defender. the encryption is performed by a utility, programming library, or custom algorithm on the data itself and is considered separate from any encryption performed by the command and control or file transfer protocol. common file archive formats that can encrypt files are rar and zip, capturing the essence of how adversaries practically leverage this technique.
In ATT&CK, what tactic does T1059.007 «JavaScript» belong to?
Execution. I determined that the tactic(s) Execution apply to 'JavaScript' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
Briefly describe the technique T1571 «Non-Standard Port».
Adversaries may communicate using a protocol and port pairing that are typically not associated. For example, HTTPS over port 8088(Citation: Symantec Elfin Mar 2019) or port 587(Citation: Fortinet Agent Tesla April 2018) as opposed to the traditional port 443. Adversaries may make changes to the standard port used by a protocol to bypass filtering or muddle analysis/parsing of network data.. By reviewing the MITRE ATT&CK description, I understood that 'Non-Standard Port' involves adversaries may communicate using a protocol and port pairing that are typically not associated. for example, https over port 8088(citation: symantec elfin mar 2019) or port 587(citation: fortinet agent tesla april 2018) as opposed to the traditional port 443. adversaries may make changes to the standard port used by a protocol to bypass filtering or muddle analysis/parsing of network data, capturing the essence of how adversaries practically leverage this technique.
Briefly describe the technique T1667 «Email Bombing».
Adversaries may flood targeted email addresses with an overwhelming volume of messages. This may bury legitimate emails in a flood of spam and disrupt business operations.(Citation: sophos-bombing)(Citation: krebs-email-bombing). By reviewing the MITRE ATT&CK description, I understood that 'Email Bombing' involves adversaries may flood targeted email addresses with an overwhelming volume of messages. this may bury legitimate emails in a flood of spam and disrupt business operations.(citation: sophos-bombing)(citation: krebs-email-bombing, capturing the essence of how adversaries practically leverage this technique.
In ATT&CK, what tactic does T1059.006 «Python» belong to?
Execution. I determined that the tactic(s) Execution apply to 'Python' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
Briefly describe the technique T1205 «Traffic Signaling».
Adversaries may use traffic signaling to hide open ports or other malicious functionality used for persistence or command and control. Traffic signaling involves the use of a magic value or sequence that must be sent to a system to trigger a special response, such as opening a closed port or executing a malicious task. This may take the form of sending a series of packets with certain characteristics before a port will be opened that the adversary can use for command and control. Usually this series of packets consists of attempted connections to a predefined sequence of closed ports (i.e. [Port Knocking](https://attack.mitre.org/techniques/T1205/001)), but can involve unusual flags, specific strings, or other unique characteristics. After the sequence is completed, opening a port may be accomplished by the host-based firewall, but could also be implemented by custom software.. By reviewing the MITRE ATT&CK description, I understood that 'Traffic Signaling' involves adversaries may use traffic signaling to hide open ports or other malicious functionality used for persistence or command and control. traffic signaling involves the use of a magic value or sequence that must be sent to a system to trigger a special response, such as opening a closed port or executing a malicious task. this may take the form of sending a series of packets with certain characteristics before a port will be opened that the adversary can use for command and control. usually this series of packets consists of attempted connections to a predefined sequence of closed ports (i.e. [port knocking](https://attack.mitre.org/techniques/t1205/001)), but can involve unusual flags, specific strings, or other unique characteristics. after the sequence is completed, opening a port may be accomplished by the host-based firewall, but could also be implemented by custom software, capturing the essence of how adversaries practically leverage this technique.
In ATT&CK, what tactic does T1205.002 «Socket Filters» belong to?
Defense Evasion, Persistence, Command and Control. I determined that the tactic(s) Defense Evasion, Persistence, Command and Control apply to 'Socket Filters' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
In ATT&CK, what tactic does T1009 «Binary Padding» belong to?
Defense Evasion. I determined that the tactic(s) Defense Evasion apply to 'Binary Padding' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
In ATT&CK, what tactic does T1027.001 «Binary Padding» belong to?
Defense Evasion. I determined that the tactic(s) Defense Evasion apply to 'Binary Padding' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
Briefly describe the technique T1055.012 «Process Hollowing».
Adversaries may inject malicious code into suspended and hollowed processes in order to evade process-based defenses. Process hollowing is a method of executing arbitrary code in the address space of a separate live process.. By reviewing the MITRE ATT&CK description, I understood that 'Process Hollowing' involves adversaries may inject malicious code into suspended and hollowed processes in order to evade process-based defenses. process hollowing is a method of executing arbitrary code in the address space of a separate live process, capturing the essence of how adversaries practically leverage this technique.
In ATT&CK, what tactic does T1489 «Service Stop» belong to?
Impact. I determined that the tactic(s) Impact apply to 'Service Stop' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
In ATT&CK, what tactic does T1531 «Account Access Removal» belong to?
Impact. I determined that the tactic(s) Impact apply to 'Account Access Removal' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
Briefly describe the technique T1059.006 «Python».
Adversaries may abuse Python commands and scripts for execution. Python is a very popular scripting/programming language, with capabilities to perform many functions. Python can be executed interactively from the command-line (via the <code>python.exe</code> interpreter) or via scripts (.py) that can be written and distributed to different systems. Python code can also be compiled into binary executables.(Citation: Zscaler APT31 Covid-19 October 2020). By reviewing the MITRE ATT&CK description, I understood that 'Python' involves adversaries may abuse python commands and scripts for execution. python is a very popular scripting/programming language, with capabilities to perform many functions. python can be executed interactively from the command-line (via the <code>python.exe</code> interpreter) or via scripts (.py) that can be written and distributed to different systems. python code can also be compiled into binary executables.(citation: zscaler apt31 covid-19 october 2020, capturing the essence of how adversaries practically leverage this technique.
In ATT&CK, what tactic does T1542 «Pre-OS Boot» belong to?
Defense Evasion, Persistence. I determined that the tactic(s) Defense Evasion, Persistence apply to 'Pre-OS Boot' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
In ATT&CK, what tactic does T1595.002 «Vulnerability Scanning» belong to?
Reconnaissance. I determined that the tactic(s) Reconnaissance apply to 'Vulnerability Scanning' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
In ATT&CK, what tactic does T1086 «PowerShell» belong to?
Execution. I determined that the tactic(s) Execution apply to 'PowerShell' by examining its documented usage patterns and the goals adversaries achieve with this technique, as clearly defined in MITRE's ATT&CK framework.
Briefly describe the technique T1195 «Supply Chain Compromise».
Adversaries may manipulate products or product delivery mechanisms prior to receipt by a final consumer for the purpose of data or system compromise.. By reviewing the MITRE ATT&CK description, I understood that 'Supply Chain Compromise' involves adversaries may manipulate products or product delivery mechanisms prior to receipt by a final consumer for the purpose of data or system compromise, capturing the essence of how adversaries practically leverage this technique.
Briefly describe the technique T1647 «Plist File Modification».
Adversaries may modify property list files (plist files) to enable other malicious activity, while also potentially evading and bypassing system defenses. macOS applications use plist files, such as the <code>info.plist</code> file, to store properties and configuration settings that inform the operating system how to handle the application at runtime. Plist files are structured metadata in key-value pairs formatted in XML based on Apple's Core Foundation DTD. Plist files can be saved in text or binary format.(Citation: fileinfo plist file description). By reviewing the MITRE ATT&CK description, I understood that 'Plist File Modification' involves adversaries may modify property list files (plist files) to enable other malicious activity, while also potentially evading and bypassing system defenses. macos applications use plist files, such as the <code>info.plist</code> file, to store properties and configuration settings that inform the operating system how to handle the application at runtime. plist files are structured metadata in key-value pairs formatted in xml based on apple's core foundation dtd. plist files can be saved in text or binary format.(citation: fileinfo plist file description, capturing the essence of how adversaries practically leverage this technique.