4177 lines
101 KiB
JSON
4177 lines
101 KiB
JSON
[
|
|
{
|
|
"name": "Extra Window Memory Injection",
|
|
"id": "T1055.011",
|
|
"url": "https://attack.mitre.org/techniques/T1055/011"
|
|
},
|
|
{
|
|
"name": "Scheduled Task",
|
|
"id": "T1053.005",
|
|
"url": "https://attack.mitre.org/techniques/T1053/005"
|
|
},
|
|
{
|
|
"name": "Socket Filters",
|
|
"id": "T1205.002",
|
|
"url": "https://attack.mitre.org/techniques/T1205/002"
|
|
},
|
|
{
|
|
"name": "Indicator Removal from Tools",
|
|
"id": "T1066",
|
|
"url": "https://attack.mitre.org/techniques/T1066"
|
|
},
|
|
{
|
|
"name": "Archive via Utility",
|
|
"id": "T1560.001",
|
|
"url": "https://attack.mitre.org/techniques/T1560/001"
|
|
},
|
|
{
|
|
"name": "VNC",
|
|
"id": "T1021.005",
|
|
"url": "https://attack.mitre.org/techniques/T1021/005"
|
|
},
|
|
{
|
|
"name": "Windows Management Instrumentation",
|
|
"id": "T1047",
|
|
"url": "https://attack.mitre.org/techniques/T1047"
|
|
},
|
|
{
|
|
"name": "Malicious Shell Modification",
|
|
"id": "T1156",
|
|
"url": "https://attack.mitre.org/techniques/T1156"
|
|
},
|
|
{
|
|
"name": "Screen Capture",
|
|
"id": "T1113",
|
|
"url": "https://attack.mitre.org/techniques/T1113"
|
|
},
|
|
{
|
|
"name": "Fileless Storage",
|
|
"id": "T1027.011",
|
|
"url": "https://attack.mitre.org/techniques/T1027/011"
|
|
},
|
|
{
|
|
"name": "Bootkit",
|
|
"id": "T1067",
|
|
"url": "https://attack.mitre.org/techniques/T1067"
|
|
},
|
|
{
|
|
"name": "Boot or Logon Initialization Scripts",
|
|
"id": "T1037",
|
|
"url": "https://attack.mitre.org/techniques/T1037"
|
|
},
|
|
{
|
|
"name": "Adversary-in-the-Middle",
|
|
"id": "T1557",
|
|
"url": "https://attack.mitre.org/techniques/T1557"
|
|
},
|
|
{
|
|
"name": "System Owner/User Discovery",
|
|
"id": "T1033",
|
|
"url": "https://attack.mitre.org/techniques/T1033"
|
|
},
|
|
{
|
|
"name": "Acquire Infrastructure",
|
|
"id": "T1583",
|
|
"url": "https://attack.mitre.org/techniques/T1583"
|
|
},
|
|
{
|
|
"name": "Rundll32",
|
|
"id": "T1218.011",
|
|
"url": "https://attack.mitre.org/techniques/T1218/011"
|
|
},
|
|
{
|
|
"name": "Container and Resource Discovery",
|
|
"id": "T1613",
|
|
"url": "https://attack.mitre.org/techniques/T1613"
|
|
},
|
|
{
|
|
"name": "Serverless",
|
|
"id": "T1583.007",
|
|
"url": "https://attack.mitre.org/techniques/T1583/007"
|
|
},
|
|
{
|
|
"name": "Hidden Window",
|
|
"id": "T1143",
|
|
"url": "https://attack.mitre.org/techniques/T1143"
|
|
},
|
|
{
|
|
"name": "LC_LOAD_DYLIB Addition",
|
|
"id": "T1161",
|
|
"url": "https://attack.mitre.org/techniques/T1161"
|
|
},
|
|
{
|
|
"name": "Standard Encoding",
|
|
"id": "T1132.001",
|
|
"url": "https://attack.mitre.org/techniques/T1132/001"
|
|
},
|
|
{
|
|
"name": "Embedded Payloads",
|
|
"id": "T1027.009",
|
|
"url": "https://attack.mitre.org/techniques/T1027/009"
|
|
},
|
|
{
|
|
"name": "Plist Modification",
|
|
"id": "T1150",
|
|
"url": "https://attack.mitre.org/techniques/T1150"
|
|
},
|
|
{
|
|
"name": "Pluggable Authentication Modules",
|
|
"id": "T1556.003",
|
|
"url": "https://attack.mitre.org/techniques/T1556/003"
|
|
},
|
|
{
|
|
"name": "Revert Cloud Instance",
|
|
"id": "T1578.004",
|
|
"url": "https://attack.mitre.org/techniques/T1578/004"
|
|
},
|
|
{
|
|
"name": "HISTCONTROL",
|
|
"id": "T1148",
|
|
"url": "https://attack.mitre.org/techniques/T1148"
|
|
},
|
|
{
|
|
"name": "Gather Victim Host Information",
|
|
"id": "T1592",
|
|
"url": "https://attack.mitre.org/techniques/T1592"
|
|
},
|
|
{
|
|
"name": "Digital Certificates",
|
|
"id": "T1596.003",
|
|
"url": "https://attack.mitre.org/techniques/T1596/003"
|
|
},
|
|
{
|
|
"name": "Keylogging",
|
|
"id": "T1056.001",
|
|
"url": "https://attack.mitre.org/techniques/T1056/001"
|
|
},
|
|
{
|
|
"name": "File/Path Exclusions",
|
|
"id": "T1564.012",
|
|
"url": "https://attack.mitre.org/techniques/T1564/012"
|
|
},
|
|
{
|
|
"name": "Linux and Mac File and Directory Permissions Modification",
|
|
"id": "T1222.002",
|
|
"url": "https://attack.mitre.org/techniques/T1222/002"
|
|
},
|
|
{
|
|
"name": "Password Guessing",
|
|
"id": "T1110.001",
|
|
"url": "https://attack.mitre.org/techniques/T1110/001"
|
|
},
|
|
{
|
|
"name": "PubPrn",
|
|
"id": "T1216.001",
|
|
"url": "https://attack.mitre.org/techniques/T1216/001"
|
|
},
|
|
{
|
|
"name": "Purchase Technical Data",
|
|
"id": "T1597.002",
|
|
"url": "https://attack.mitre.org/techniques/T1597/002"
|
|
},
|
|
{
|
|
"name": "OS Credential Dumping",
|
|
"id": "T1003",
|
|
"url": "https://attack.mitre.org/techniques/T1003"
|
|
},
|
|
{
|
|
"name": "Shared Modules",
|
|
"id": "T1129",
|
|
"url": "https://attack.mitre.org/techniques/T1129"
|
|
},
|
|
{
|
|
"name": "Data from Configuration Repository",
|
|
"id": "T1602",
|
|
"url": "https://attack.mitre.org/techniques/T1602"
|
|
},
|
|
{
|
|
"name": "Disk Structure Wipe",
|
|
"id": "T1561.002",
|
|
"url": "https://attack.mitre.org/techniques/T1561/002"
|
|
},
|
|
{
|
|
"name": "Direct Network Flood",
|
|
"id": "T1498.001",
|
|
"url": "https://attack.mitre.org/techniques/T1498/001"
|
|
},
|
|
{
|
|
"name": "Stored Data Manipulation",
|
|
"id": "T1492",
|
|
"url": "https://attack.mitre.org/techniques/T1492"
|
|
},
|
|
{
|
|
"name": "Path Interception by PATH Environment Variable",
|
|
"id": "T1574.007",
|
|
"url": "https://attack.mitre.org/techniques/T1574/007"
|
|
},
|
|
{
|
|
"name": "Sharepoint",
|
|
"id": "T1213.002",
|
|
"url": "https://attack.mitre.org/techniques/T1213/002"
|
|
},
|
|
{
|
|
"name": "Direct Volume Access",
|
|
"id": "T1006",
|
|
"url": "https://attack.mitre.org/techniques/T1006"
|
|
},
|
|
{
|
|
"name": "File System Permissions Weakness",
|
|
"id": "T1044",
|
|
"url": "https://attack.mitre.org/techniques/T1044"
|
|
},
|
|
{
|
|
"name": "Artificial Intelligence",
|
|
"id": "T1588.007",
|
|
"url": "https://attack.mitre.org/techniques/T1588/007"
|
|
},
|
|
{
|
|
"name": "Modify Cloud Resource Hierarchy",
|
|
"id": "T1666",
|
|
"url": "https://attack.mitre.org/techniques/T1666"
|
|
},
|
|
{
|
|
"name": "Email Hiding Rules",
|
|
"id": "T1564.008",
|
|
"url": "https://attack.mitre.org/techniques/T1564/008"
|
|
},
|
|
{
|
|
"name": "External Defacement",
|
|
"id": "T1491.002",
|
|
"url": "https://attack.mitre.org/techniques/T1491/002"
|
|
},
|
|
{
|
|
"name": "Encrypted/Encoded File",
|
|
"id": "T1027.013",
|
|
"url": "https://attack.mitre.org/techniques/T1027/013"
|
|
},
|
|
{
|
|
"name": "LLMNR/NBT-NS Poisoning and Relay",
|
|
"id": "T1171",
|
|
"url": "https://attack.mitre.org/techniques/T1171"
|
|
},
|
|
{
|
|
"name": "IP Addresses",
|
|
"id": "T1590.005",
|
|
"url": "https://attack.mitre.org/techniques/T1590/005"
|
|
},
|
|
{
|
|
"name": "OS Exhaustion Flood",
|
|
"id": "T1499.001",
|
|
"url": "https://attack.mitre.org/techniques/T1499/001"
|
|
},
|
|
{
|
|
"name": "Rootkit",
|
|
"id": "T1014",
|
|
"url": "https://attack.mitre.org/techniques/T1014"
|
|
},
|
|
{
|
|
"name": "PowerShell Profile",
|
|
"id": "T1546.013",
|
|
"url": "https://attack.mitre.org/techniques/T1546/013"
|
|
},
|
|
{
|
|
"name": "JavaScript",
|
|
"id": "T1059.007",
|
|
"url": "https://attack.mitre.org/techniques/T1059/007"
|
|
},
|
|
{
|
|
"name": "DNS",
|
|
"id": "T1590.002",
|
|
"url": "https://attack.mitre.org/techniques/T1590/002"
|
|
},
|
|
{
|
|
"name": "Systemd Service",
|
|
"id": "T1501",
|
|
"url": "https://attack.mitre.org/techniques/T1501"
|
|
},
|
|
{
|
|
"name": "Lifecycle-Triggered Deletion",
|
|
"id": "T1485.001",
|
|
"url": "https://attack.mitre.org/techniques/T1485/001"
|
|
},
|
|
{
|
|
"name": "Elevated Execution with Prompt",
|
|
"id": "T1514",
|
|
"url": "https://attack.mitre.org/techniques/T1514"
|
|
},
|
|
{
|
|
"name": "Audio Capture",
|
|
"id": "T1123",
|
|
"url": "https://attack.mitre.org/techniques/T1123"
|
|
},
|
|
{
|
|
"name": "Create or Modify System Process",
|
|
"id": "T1543",
|
|
"url": "https://attack.mitre.org/techniques/T1543"
|
|
},
|
|
{
|
|
"name": "External Remote Services",
|
|
"id": "T1133",
|
|
"url": "https://attack.mitre.org/techniques/T1133"
|
|
},
|
|
{
|
|
"name": "Component Firmware",
|
|
"id": "T1109",
|
|
"url": "https://attack.mitre.org/techniques/T1109"
|
|
},
|
|
{
|
|
"name": "LC_LOAD_DYLIB Addition",
|
|
"id": "T1546.006",
|
|
"url": "https://attack.mitre.org/techniques/T1546/006"
|
|
},
|
|
{
|
|
"name": "Steal Web Session Cookie",
|
|
"id": "T1539",
|
|
"url": "https://attack.mitre.org/techniques/T1539"
|
|
},
|
|
{
|
|
"name": "Container Orchestration Job",
|
|
"id": "T1053.007",
|
|
"url": "https://attack.mitre.org/techniques/T1053/007"
|
|
},
|
|
{
|
|
"name": "Domain Generation Algorithms",
|
|
"id": "T1568.002",
|
|
"url": "https://attack.mitre.org/techniques/T1568/002"
|
|
},
|
|
{
|
|
"name": "Double File Extension",
|
|
"id": "T1036.007",
|
|
"url": "https://attack.mitre.org/techniques/T1036/007"
|
|
},
|
|
{
|
|
"name": "Bypass User Account Control",
|
|
"id": "T1548.002",
|
|
"url": "https://attack.mitre.org/techniques/T1548/002"
|
|
},
|
|
{
|
|
"name": "Timestomp",
|
|
"id": "T1099",
|
|
"url": "https://attack.mitre.org/techniques/T1099"
|
|
},
|
|
{
|
|
"name": "SMS Pumping",
|
|
"id": "T1496.003",
|
|
"url": "https://attack.mitre.org/techniques/T1496/003"
|
|
},
|
|
{
|
|
"name": "Internet Connection Discovery",
|
|
"id": "T1016.001",
|
|
"url": "https://attack.mitre.org/techniques/T1016/001"
|
|
},
|
|
{
|
|
"name": "Sudo and Sudo Caching",
|
|
"id": "T1548.003",
|
|
"url": "https://attack.mitre.org/techniques/T1548/003"
|
|
},
|
|
{
|
|
"name": "Archive via Custom Method",
|
|
"id": "T1560.003",
|
|
"url": "https://attack.mitre.org/techniques/T1560/003"
|
|
},
|
|
{
|
|
"name": "Modify Cloud Compute Infrastructure",
|
|
"id": "T1578",
|
|
"url": "https://attack.mitre.org/techniques/T1578"
|
|
},
|
|
{
|
|
"name": "Network Devices",
|
|
"id": "T1584.008",
|
|
"url": "https://attack.mitre.org/techniques/T1584/008"
|
|
},
|
|
{
|
|
"name": "Malvertising",
|
|
"id": "T1583.008",
|
|
"url": "https://attack.mitre.org/techniques/T1583/008"
|
|
},
|
|
{
|
|
"name": "Permission Groups Discovery",
|
|
"id": "T1069",
|
|
"url": "https://attack.mitre.org/techniques/T1069"
|
|
},
|
|
{
|
|
"name": "Email Collection",
|
|
"id": "T1114",
|
|
"url": "https://attack.mitre.org/techniques/T1114"
|
|
},
|
|
{
|
|
"name": "Security Account Manager",
|
|
"id": "T1003.002",
|
|
"url": "https://attack.mitre.org/techniques/T1003/002"
|
|
},
|
|
{
|
|
"name": "WHOIS",
|
|
"id": "T1596.002",
|
|
"url": "https://attack.mitre.org/techniques/T1596/002"
|
|
},
|
|
{
|
|
"name": "System Firmware",
|
|
"id": "T1542.001",
|
|
"url": "https://attack.mitre.org/techniques/T1542/001"
|
|
},
|
|
{
|
|
"name": "Search Victim-Owned Websites",
|
|
"id": "T1594",
|
|
"url": "https://attack.mitre.org/techniques/T1594"
|
|
},
|
|
{
|
|
"name": "Cloud Groups",
|
|
"id": "T1069.003",
|
|
"url": "https://attack.mitre.org/techniques/T1069/003"
|
|
},
|
|
{
|
|
"name": "Services Registry Permissions Weakness",
|
|
"id": "T1574.011",
|
|
"url": "https://attack.mitre.org/techniques/T1574/011"
|
|
},
|
|
{
|
|
"name": "DNS/Passive DNS",
|
|
"id": "T1596.001",
|
|
"url": "https://attack.mitre.org/techniques/T1596/001"
|
|
},
|
|
{
|
|
"name": "Application Exhaustion Flood",
|
|
"id": "T1499.003",
|
|
"url": "https://attack.mitre.org/techniques/T1499/003"
|
|
},
|
|
{
|
|
"name": "Rc.common",
|
|
"id": "T1163",
|
|
"url": "https://attack.mitre.org/techniques/T1163"
|
|
},
|
|
{
|
|
"name": "Compromise Software Dependencies and Development Tools",
|
|
"id": "T1195.001",
|
|
"url": "https://attack.mitre.org/techniques/T1195/001"
|
|
},
|
|
{
|
|
"name": "Digital Certificates",
|
|
"id": "T1588.004",
|
|
"url": "https://attack.mitre.org/techniques/T1588/004"
|
|
},
|
|
{
|
|
"name": "DNS Server",
|
|
"id": "T1583.002",
|
|
"url": "https://attack.mitre.org/techniques/T1583/002"
|
|
},
|
|
{
|
|
"name": "Disk Wipe",
|
|
"id": "T1561",
|
|
"url": "https://attack.mitre.org/techniques/T1561"
|
|
},
|
|
{
|
|
"name": "DNS",
|
|
"id": "T1071.004",
|
|
"url": "https://attack.mitre.org/techniques/T1071/004"
|
|
},
|
|
{
|
|
"name": "Cloud Instance Metadata API",
|
|
"id": "T1552.005",
|
|
"url": "https://attack.mitre.org/techniques/T1552/005"
|
|
},
|
|
{
|
|
"name": "Securityd Memory",
|
|
"id": "T1555.002",
|
|
"url": "https://attack.mitre.org/techniques/T1555/002"
|
|
},
|
|
{
|
|
"name": "Group Policy Discovery",
|
|
"id": "T1615",
|
|
"url": "https://attack.mitre.org/techniques/T1615"
|
|
},
|
|
{
|
|
"name": "Bootkit",
|
|
"id": "T1542.003",
|
|
"url": "https://attack.mitre.org/techniques/T1542/003"
|
|
},
|
|
{
|
|
"name": "Data from Removable Media",
|
|
"id": "T1025",
|
|
"url": "https://attack.mitre.org/techniques/T1025"
|
|
},
|
|
{
|
|
"name": "Code Signing",
|
|
"id": "T1116",
|
|
"url": "https://attack.mitre.org/techniques/T1116"
|
|
},
|
|
{
|
|
"name": "Mavinject",
|
|
"id": "T1218.013",
|
|
"url": "https://attack.mitre.org/techniques/T1218/013"
|
|
},
|
|
{
|
|
"name": "Cloud Instance Metadata API",
|
|
"id": "T1522",
|
|
"url": "https://attack.mitre.org/techniques/T1522"
|
|
},
|
|
{
|
|
"name": "Process Hollowing",
|
|
"id": "T1093",
|
|
"url": "https://attack.mitre.org/techniques/T1093"
|
|
},
|
|
{
|
|
"name": "Local Data Staging",
|
|
"id": "T1074.001",
|
|
"url": "https://attack.mitre.org/techniques/T1074/001"
|
|
},
|
|
{
|
|
"name": "Match Legitimate Resource Name or Location",
|
|
"id": "T1036.005",
|
|
"url": "https://attack.mitre.org/techniques/T1036/005"
|
|
},
|
|
{
|
|
"name": "Domain Fronting",
|
|
"id": "T1172",
|
|
"url": "https://attack.mitre.org/techniques/T1172"
|
|
},
|
|
{
|
|
"name": "Digital Certificates",
|
|
"id": "T1587.003",
|
|
"url": "https://attack.mitre.org/techniques/T1587/003"
|
|
},
|
|
{
|
|
"name": "Stored Data Manipulation",
|
|
"id": "T1565.001",
|
|
"url": "https://attack.mitre.org/techniques/T1565/001"
|
|
},
|
|
{
|
|
"name": "Password Cracking",
|
|
"id": "T1110.002",
|
|
"url": "https://attack.mitre.org/techniques/T1110/002"
|
|
},
|
|
{
|
|
"name": "SID-History Injection",
|
|
"id": "T1178",
|
|
"url": "https://attack.mitre.org/techniques/T1178"
|
|
},
|
|
{
|
|
"name": "Local Email Collection",
|
|
"id": "T1114.001",
|
|
"url": "https://attack.mitre.org/techniques/T1114/001"
|
|
},
|
|
{
|
|
"name": "Keychain",
|
|
"id": "T1555.001",
|
|
"url": "https://attack.mitre.org/techniques/T1555/001"
|
|
},
|
|
{
|
|
"name": "Boot or Logon Autostart Execution",
|
|
"id": "T1547",
|
|
"url": "https://attack.mitre.org/techniques/T1547"
|
|
},
|
|
{
|
|
"name": "LSA Secrets",
|
|
"id": "T1003.004",
|
|
"url": "https://attack.mitre.org/techniques/T1003/004"
|
|
},
|
|
{
|
|
"name": "Port Monitors",
|
|
"id": "T1013",
|
|
"url": "https://attack.mitre.org/techniques/T1013"
|
|
},
|
|
{
|
|
"name": "Weaken Encryption",
|
|
"id": "T1600",
|
|
"url": "https://attack.mitre.org/techniques/T1600"
|
|
},
|
|
{
|
|
"name": "SAML Tokens",
|
|
"id": "T1606.002",
|
|
"url": "https://attack.mitre.org/techniques/T1606/002"
|
|
},
|
|
{
|
|
"name": "Spearphishing Link",
|
|
"id": "T1192",
|
|
"url": "https://attack.mitre.org/techniques/T1192"
|
|
},
|
|
{
|
|
"name": "Masquerade File Type",
|
|
"id": "T1036.008",
|
|
"url": "https://attack.mitre.org/techniques/T1036/008"
|
|
},
|
|
{
|
|
"name": "Service Stop",
|
|
"id": "T1489",
|
|
"url": "https://attack.mitre.org/techniques/T1489"
|
|
},
|
|
{
|
|
"name": "Malware",
|
|
"id": "T1587.001",
|
|
"url": "https://attack.mitre.org/techniques/T1587/001"
|
|
},
|
|
{
|
|
"name": "Regsvcs/Regasm",
|
|
"id": "T1121",
|
|
"url": "https://attack.mitre.org/techniques/T1121"
|
|
},
|
|
{
|
|
"name": "Device Driver Discovery",
|
|
"id": "T1652",
|
|
"url": "https://attack.mitre.org/techniques/T1652"
|
|
},
|
|
{
|
|
"name": "Sudo Caching",
|
|
"id": "T1206",
|
|
"url": "https://attack.mitre.org/techniques/T1206"
|
|
},
|
|
{
|
|
"name": "Domain Account",
|
|
"id": "T1087.002",
|
|
"url": "https://attack.mitre.org/techniques/T1087/002"
|
|
},
|
|
{
|
|
"name": "Active Setup",
|
|
"id": "T1547.014",
|
|
"url": "https://attack.mitre.org/techniques/T1547/014"
|
|
},
|
|
{
|
|
"name": "Hide Artifacts",
|
|
"id": "T1564",
|
|
"url": "https://attack.mitre.org/techniques/T1564"
|
|
},
|
|
{
|
|
"name": "Dynamic Data Exchange",
|
|
"id": "T1559.002",
|
|
"url": "https://attack.mitre.org/techniques/T1559/002"
|
|
},
|
|
{
|
|
"name": "Malicious File",
|
|
"id": "T1204.002",
|
|
"url": "https://attack.mitre.org/techniques/T1204/002"
|
|
},
|
|
{
|
|
"name": "Identify Business Tempo",
|
|
"id": "T1591.003",
|
|
"url": "https://attack.mitre.org/techniques/T1591/003"
|
|
},
|
|
{
|
|
"name": "Security Software Discovery",
|
|
"id": "T1063",
|
|
"url": "https://attack.mitre.org/techniques/T1063"
|
|
},
|
|
{
|
|
"name": "Publish/Subscribe Protocols",
|
|
"id": "T1071.005",
|
|
"url": "https://attack.mitre.org/techniques/T1071/005"
|
|
},
|
|
{
|
|
"name": "Hardware",
|
|
"id": "T1592.001",
|
|
"url": "https://attack.mitre.org/techniques/T1592/001"
|
|
},
|
|
{
|
|
"name": "Taint Shared Content",
|
|
"id": "T1080",
|
|
"url": "https://attack.mitre.org/techniques/T1080"
|
|
},
|
|
{
|
|
"name": "Trust Modification",
|
|
"id": "T1484.002",
|
|
"url": "https://attack.mitre.org/techniques/T1484/002"
|
|
},
|
|
{
|
|
"name": "Databases",
|
|
"id": "T1213.006",
|
|
"url": "https://attack.mitre.org/techniques/T1213/006"
|
|
},
|
|
{
|
|
"name": "Symmetric Cryptography",
|
|
"id": "T1573.001",
|
|
"url": "https://attack.mitre.org/techniques/T1573/001"
|
|
},
|
|
{
|
|
"name": "Local Account",
|
|
"id": "T1087.001",
|
|
"url": "https://attack.mitre.org/techniques/T1087/001"
|
|
},
|
|
{
|
|
"name": "Securityd Memory",
|
|
"id": "T1167",
|
|
"url": "https://attack.mitre.org/techniques/T1167"
|
|
},
|
|
{
|
|
"name": "Social Media Accounts",
|
|
"id": "T1586.001",
|
|
"url": "https://attack.mitre.org/techniques/T1586/001"
|
|
},
|
|
{
|
|
"name": "Browser Extensions",
|
|
"id": "T1176.001",
|
|
"url": "https://attack.mitre.org/techniques/T1176/001"
|
|
},
|
|
{
|
|
"name": "Application Access Token",
|
|
"id": "T1527",
|
|
"url": "https://attack.mitre.org/techniques/T1527"
|
|
},
|
|
{
|
|
"name": "Safe Mode Boot",
|
|
"id": "T1562.009",
|
|
"url": "https://attack.mitre.org/techniques/T1562/009"
|
|
},
|
|
{
|
|
"name": "Screensaver",
|
|
"id": "T1180",
|
|
"url": "https://attack.mitre.org/techniques/T1180"
|
|
},
|
|
{
|
|
"name": "TFTP Boot",
|
|
"id": "T1542.005",
|
|
"url": "https://attack.mitre.org/techniques/T1542/005"
|
|
},
|
|
{
|
|
"name": "Windows Service",
|
|
"id": "T1543.003",
|
|
"url": "https://attack.mitre.org/techniques/T1543/003"
|
|
},
|
|
{
|
|
"name": "Fast Flux DNS",
|
|
"id": "T1568.001",
|
|
"url": "https://attack.mitre.org/techniques/T1568/001"
|
|
},
|
|
{
|
|
"name": "System Checks",
|
|
"id": "T1497.001",
|
|
"url": "https://attack.mitre.org/techniques/T1497/001"
|
|
},
|
|
{
|
|
"name": "Cron",
|
|
"id": "T1053.003",
|
|
"url": "https://attack.mitre.org/techniques/T1053/003"
|
|
},
|
|
{
|
|
"name": "Domain Groups",
|
|
"id": "T1069.002",
|
|
"url": "https://attack.mitre.org/techniques/T1069/002"
|
|
},
|
|
{
|
|
"name": "Vulnerabilities",
|
|
"id": "T1588.006",
|
|
"url": "https://attack.mitre.org/techniques/T1588/006"
|
|
},
|
|
{
|
|
"name": "Spearphishing Link",
|
|
"id": "T1566.002",
|
|
"url": "https://attack.mitre.org/techniques/T1566/002"
|
|
},
|
|
{
|
|
"name": "Startup Items",
|
|
"id": "T1165",
|
|
"url": "https://attack.mitre.org/techniques/T1165"
|
|
},
|
|
{
|
|
"name": "Clear Linux or Mac System Logs",
|
|
"id": "T1070.002",
|
|
"url": "https://attack.mitre.org/techniques/T1070/002"
|
|
},
|
|
{
|
|
"name": "Application or System Exploitation",
|
|
"id": "T1499.004",
|
|
"url": "https://attack.mitre.org/techniques/T1499/004"
|
|
},
|
|
{
|
|
"name": "Office Application Startup",
|
|
"id": "T1137",
|
|
"url": "https://attack.mitre.org/techniques/T1137"
|
|
},
|
|
{
|
|
"name": "InstallUtil",
|
|
"id": "T1218.004",
|
|
"url": "https://attack.mitre.org/techniques/T1218/004"
|
|
},
|
|
{
|
|
"name": "Spearphishing Link",
|
|
"id": "T1598.003",
|
|
"url": "https://attack.mitre.org/techniques/T1598/003"
|
|
},
|
|
{
|
|
"name": "SSH",
|
|
"id": "T1021.004",
|
|
"url": "https://attack.mitre.org/techniques/T1021/004"
|
|
},
|
|
{
|
|
"name": "Additional Cloud Roles",
|
|
"id": "T1098.003",
|
|
"url": "https://attack.mitre.org/techniques/T1098/003"
|
|
},
|
|
{
|
|
"name": "Print Processors",
|
|
"id": "T1547.012",
|
|
"url": "https://attack.mitre.org/techniques/T1547/012"
|
|
},
|
|
{
|
|
"name": "Disabling Security Tools",
|
|
"id": "T1089",
|
|
"url": "https://attack.mitre.org/techniques/T1089"
|
|
},
|
|
{
|
|
"name": "Disk Structure Wipe",
|
|
"id": "T1487",
|
|
"url": "https://attack.mitre.org/techniques/T1487"
|
|
},
|
|
{
|
|
"name": "Spearphishing Attachment",
|
|
"id": "T1566.001",
|
|
"url": "https://attack.mitre.org/techniques/T1566/001"
|
|
},
|
|
{
|
|
"name": "Credentials in Registry",
|
|
"id": "T1214",
|
|
"url": "https://attack.mitre.org/techniques/T1214"
|
|
},
|
|
{
|
|
"name": "Stripped Payloads",
|
|
"id": "T1027.008",
|
|
"url": "https://attack.mitre.org/techniques/T1027/008"
|
|
},
|
|
{
|
|
"name": "Component Object Model",
|
|
"id": "T1559.001",
|
|
"url": "https://attack.mitre.org/techniques/T1559/001"
|
|
},
|
|
{
|
|
"name": "DLL",
|
|
"id": "T1574.001",
|
|
"url": "https://attack.mitre.org/techniques/T1574/001"
|
|
},
|
|
{
|
|
"name": "Automated Collection",
|
|
"id": "T1119",
|
|
"url": "https://attack.mitre.org/techniques/T1119"
|
|
},
|
|
{
|
|
"name": "Clipboard Data",
|
|
"id": "T1115",
|
|
"url": "https://attack.mitre.org/techniques/T1115"
|
|
},
|
|
{
|
|
"name": "Proc Filesystem",
|
|
"id": "T1003.007",
|
|
"url": "https://attack.mitre.org/techniques/T1003/007"
|
|
},
|
|
{
|
|
"name": "Botnet",
|
|
"id": "T1583.005",
|
|
"url": "https://attack.mitre.org/techniques/T1583/005"
|
|
},
|
|
{
|
|
"name": "Password Managers",
|
|
"id": "T1555.005",
|
|
"url": "https://attack.mitre.org/techniques/T1555/005"
|
|
},
|
|
{
|
|
"name": "AppInit DLLs",
|
|
"id": "T1103",
|
|
"url": "https://attack.mitre.org/techniques/T1103"
|
|
},
|
|
{
|
|
"name": "Gatekeeper Bypass",
|
|
"id": "T1553.001",
|
|
"url": "https://attack.mitre.org/techniques/T1553/001"
|
|
},
|
|
{
|
|
"name": "ESXi Administration Command",
|
|
"id": "T1675",
|
|
"url": "https://attack.mitre.org/techniques/T1675"
|
|
},
|
|
{
|
|
"name": "Drive-by Target",
|
|
"id": "T1608.004",
|
|
"url": "https://attack.mitre.org/techniques/T1608/004"
|
|
},
|
|
{
|
|
"name": "System Service Discovery",
|
|
"id": "T1007",
|
|
"url": "https://attack.mitre.org/techniques/T1007"
|
|
},
|
|
{
|
|
"name": "Network Sniffing",
|
|
"id": "T1040",
|
|
"url": "https://attack.mitre.org/techniques/T1040"
|
|
},
|
|
{
|
|
"name": "Application Deployment Software",
|
|
"id": "T1017",
|
|
"url": "https://attack.mitre.org/techniques/T1017"
|
|
},
|
|
{
|
|
"name": "Code Signing",
|
|
"id": "T1553.002",
|
|
"url": "https://attack.mitre.org/techniques/T1553/002"
|
|
},
|
|
{
|
|
"name": "Data from Cloud Storage",
|
|
"id": "T1530",
|
|
"url": "https://attack.mitre.org/techniques/T1530"
|
|
},
|
|
{
|
|
"name": "Runtime Data Manipulation",
|
|
"id": "T1565.003",
|
|
"url": "https://attack.mitre.org/techniques/T1565/003"
|
|
},
|
|
{
|
|
"name": "Credentials in Registry",
|
|
"id": "T1552.002",
|
|
"url": "https://attack.mitre.org/techniques/T1552/002"
|
|
},
|
|
{
|
|
"name": "Network Share Discovery",
|
|
"id": "T1135",
|
|
"url": "https://attack.mitre.org/techniques/T1135"
|
|
},
|
|
{
|
|
"name": "Peripheral Device Discovery",
|
|
"id": "T1120",
|
|
"url": "https://attack.mitre.org/techniques/T1120"
|
|
},
|
|
{
|
|
"name": "Break Process Trees",
|
|
"id": "T1036.009",
|
|
"url": "https://attack.mitre.org/techniques/T1036/009"
|
|
},
|
|
{
|
|
"name": "Network Topology",
|
|
"id": "T1590.004",
|
|
"url": "https://attack.mitre.org/techniques/T1590/004"
|
|
},
|
|
{
|
|
"name": "Code Signing Certificates",
|
|
"id": "T1587.002",
|
|
"url": "https://attack.mitre.org/techniques/T1587/002"
|
|
},
|
|
{
|
|
"name": "Windows File and Directory Permissions Modification",
|
|
"id": "T1222.001",
|
|
"url": "https://attack.mitre.org/techniques/T1222/001"
|
|
},
|
|
{
|
|
"name": "Add-ins",
|
|
"id": "T1137.006",
|
|
"url": "https://attack.mitre.org/techniques/T1137/006"
|
|
},
|
|
{
|
|
"name": "Transport Agent",
|
|
"id": "T1505.002",
|
|
"url": "https://attack.mitre.org/techniques/T1505/002"
|
|
},
|
|
{
|
|
"name": "System Information Discovery",
|
|
"id": "T1082",
|
|
"url": "https://attack.mitre.org/techniques/T1082"
|
|
},
|
|
{
|
|
"name": "Application Layer Protocol",
|
|
"id": "T1071",
|
|
"url": "https://attack.mitre.org/techniques/T1071"
|
|
},
|
|
{
|
|
"name": "AppDomainManager",
|
|
"id": "T1574.014",
|
|
"url": "https://attack.mitre.org/techniques/T1574/014"
|
|
},
|
|
{
|
|
"name": "Remote Data Staging",
|
|
"id": "T1074.002",
|
|
"url": "https://attack.mitre.org/techniques/T1074/002"
|
|
},
|
|
{
|
|
"name": "Additional Container Cluster Roles",
|
|
"id": "T1098.006",
|
|
"url": "https://attack.mitre.org/techniques/T1098/006"
|
|
},
|
|
{
|
|
"name": "Scheduled Task/Job",
|
|
"id": "T1053",
|
|
"url": "https://attack.mitre.org/techniques/T1053"
|
|
},
|
|
{
|
|
"name": "Msiexec",
|
|
"id": "T1218.007",
|
|
"url": "https://attack.mitre.org/techniques/T1218/007"
|
|
},
|
|
{
|
|
"name": "Login Item",
|
|
"id": "T1162",
|
|
"url": "https://attack.mitre.org/techniques/T1162"
|
|
},
|
|
{
|
|
"name": "Network Trust Dependencies",
|
|
"id": "T1590.003",
|
|
"url": "https://attack.mitre.org/techniques/T1590/003"
|
|
},
|
|
{
|
|
"name": "Reflection Amplification",
|
|
"id": "T1498.002",
|
|
"url": "https://attack.mitre.org/techniques/T1498/002"
|
|
},
|
|
{
|
|
"name": "Password Filter DLL",
|
|
"id": "T1556.002",
|
|
"url": "https://attack.mitre.org/techniques/T1556/002"
|
|
},
|
|
{
|
|
"name": "Terminal Services DLL",
|
|
"id": "T1505.005",
|
|
"url": "https://attack.mitre.org/techniques/T1505/005"
|
|
},
|
|
{
|
|
"name": "AppleScript",
|
|
"id": "T1059.002",
|
|
"url": "https://attack.mitre.org/techniques/T1059/002"
|
|
},
|
|
{
|
|
"name": "Software Extensions",
|
|
"id": "T1176",
|
|
"url": "https://attack.mitre.org/techniques/T1176"
|
|
},
|
|
{
|
|
"name": "Service Exhaustion Flood",
|
|
"id": "T1499.002",
|
|
"url": "https://attack.mitre.org/techniques/T1499/002"
|
|
},
|
|
{
|
|
"name": "Compromise Hardware Supply Chain",
|
|
"id": "T1195.003",
|
|
"url": "https://attack.mitre.org/techniques/T1195/003"
|
|
},
|
|
{
|
|
"name": "Native API",
|
|
"id": "T1106",
|
|
"url": "https://attack.mitre.org/techniques/T1106"
|
|
},
|
|
{
|
|
"name": "Ccache Files",
|
|
"id": "T1558.005",
|
|
"url": "https://attack.mitre.org/techniques/T1558/005"
|
|
},
|
|
{
|
|
"name": "Clear Network Connection History and Configurations",
|
|
"id": "T1070.007",
|
|
"url": "https://attack.mitre.org/techniques/T1070/007"
|
|
},
|
|
{
|
|
"name": "AS-REP Roasting",
|
|
"id": "T1558.004",
|
|
"url": "https://attack.mitre.org/techniques/T1558/004"
|
|
},
|
|
{
|
|
"name": "Service Registry Permissions Weakness",
|
|
"id": "T1058",
|
|
"url": "https://attack.mitre.org/techniques/T1058"
|
|
},
|
|
{
|
|
"name": "Virtual Private Server",
|
|
"id": "T1584.003",
|
|
"url": "https://attack.mitre.org/techniques/T1584/003"
|
|
},
|
|
{
|
|
"name": "AutoHotKey & AutoIT",
|
|
"id": "T1059.010",
|
|
"url": "https://attack.mitre.org/techniques/T1059/010"
|
|
},
|
|
{
|
|
"name": "Reduce Key Space",
|
|
"id": "T1600.001",
|
|
"url": "https://attack.mitre.org/techniques/T1600/001"
|
|
},
|
|
{
|
|
"name": "Clear Command History",
|
|
"id": "T1070.003",
|
|
"url": "https://attack.mitre.org/techniques/T1070/003"
|
|
},
|
|
{
|
|
"name": "Indirect Command Execution",
|
|
"id": "T1202",
|
|
"url": "https://attack.mitre.org/techniques/T1202"
|
|
},
|
|
{
|
|
"name": "Custom Cryptographic Protocol",
|
|
"id": "T1024",
|
|
"url": "https://attack.mitre.org/techniques/T1024"
|
|
},
|
|
{
|
|
"name": "Revert Cloud Instance",
|
|
"id": "T1536",
|
|
"url": "https://attack.mitre.org/techniques/T1536"
|
|
},
|
|
{
|
|
"name": "Replication Through Removable Media",
|
|
"id": "T1091",
|
|
"url": "https://attack.mitre.org/techniques/T1091"
|
|
},
|
|
{
|
|
"name": "Data from Local System",
|
|
"id": "T1005",
|
|
"url": "https://attack.mitre.org/techniques/T1005"
|
|
},
|
|
{
|
|
"name": "Deobfuscate/Decode Files or Information",
|
|
"id": "T1140",
|
|
"url": "https://attack.mitre.org/techniques/T1140"
|
|
},
|
|
{
|
|
"name": "Outlook Rules",
|
|
"id": "T1137.005",
|
|
"url": "https://attack.mitre.org/techniques/T1137/005"
|
|
},
|
|
{
|
|
"name": "Impair Defenses",
|
|
"id": "T1562",
|
|
"url": "https://attack.mitre.org/techniques/T1562"
|
|
},
|
|
{
|
|
"name": "Cloud Accounts",
|
|
"id": "T1586.003",
|
|
"url": "https://attack.mitre.org/techniques/T1586/003"
|
|
},
|
|
{
|
|
"name": "Email Accounts",
|
|
"id": "T1586.002",
|
|
"url": "https://attack.mitre.org/techniques/T1586/002"
|
|
},
|
|
{
|
|
"name": "Additional Local or Domain Groups",
|
|
"id": "T1098.007",
|
|
"url": "https://attack.mitre.org/techniques/T1098/007"
|
|
},
|
|
{
|
|
"name": "Upload Malware",
|
|
"id": "T1608.001",
|
|
"url": "https://attack.mitre.org/techniques/T1608/001"
|
|
},
|
|
{
|
|
"name": "Supply Chain Compromise",
|
|
"id": "T1195",
|
|
"url": "https://attack.mitre.org/techniques/T1195"
|
|
},
|
|
{
|
|
"name": "Exploit Public-Facing Application",
|
|
"id": "T1190",
|
|
"url": "https://attack.mitre.org/techniques/T1190"
|
|
},
|
|
{
|
|
"name": "Steal or Forge Kerberos Tickets",
|
|
"id": "T1558",
|
|
"url": "https://attack.mitre.org/techniques/T1558"
|
|
},
|
|
{
|
|
"name": "Credentials from Password Stores",
|
|
"id": "T1555",
|
|
"url": "https://attack.mitre.org/techniques/T1555"
|
|
},
|
|
{
|
|
"name": "Exfiltration Over Web Service",
|
|
"id": "T1567",
|
|
"url": "https://attack.mitre.org/techniques/T1567"
|
|
},
|
|
{
|
|
"name": "Remote Access Tools",
|
|
"id": "T1219",
|
|
"url": "https://attack.mitre.org/techniques/T1219"
|
|
},
|
|
{
|
|
"name": "Domains",
|
|
"id": "T1583.001",
|
|
"url": "https://attack.mitre.org/techniques/T1583/001"
|
|
},
|
|
{
|
|
"name": "Archive via Library",
|
|
"id": "T1560.002",
|
|
"url": "https://attack.mitre.org/techniques/T1560/002"
|
|
},
|
|
{
|
|
"name": "Thread Execution Hijacking",
|
|
"id": "T1055.003",
|
|
"url": "https://attack.mitre.org/techniques/T1055/003"
|
|
},
|
|
{
|
|
"name": "Multilayer Encryption",
|
|
"id": "T1079",
|
|
"url": "https://attack.mitre.org/techniques/T1079"
|
|
},
|
|
{
|
|
"name": "Masquerading",
|
|
"id": "T1036",
|
|
"url": "https://attack.mitre.org/techniques/T1036"
|
|
},
|
|
{
|
|
"name": "Application Shimming",
|
|
"id": "T1546.011",
|
|
"url": "https://attack.mitre.org/techniques/T1546/011"
|
|
},
|
|
{
|
|
"name": "Unsecured Credentials",
|
|
"id": "T1552",
|
|
"url": "https://attack.mitre.org/techniques/T1552"
|
|
},
|
|
{
|
|
"name": "Port Monitors",
|
|
"id": "T1547.010",
|
|
"url": "https://attack.mitre.org/techniques/T1547/010"
|
|
},
|
|
{
|
|
"name": "Clear Mailbox Data",
|
|
"id": "T1070.008",
|
|
"url": "https://attack.mitre.org/techniques/T1070/008"
|
|
},
|
|
{
|
|
"name": "Login Hook",
|
|
"id": "T1037.002",
|
|
"url": "https://attack.mitre.org/techniques/T1037/002"
|
|
},
|
|
{
|
|
"name": "Content Injection",
|
|
"id": "T1659",
|
|
"url": "https://attack.mitre.org/techniques/T1659"
|
|
},
|
|
{
|
|
"name": "Process Injection",
|
|
"id": "T1055",
|
|
"url": "https://attack.mitre.org/techniques/T1055"
|
|
},
|
|
{
|
|
"name": "Exfiltration Over Webhook",
|
|
"id": "T1567.004",
|
|
"url": "https://attack.mitre.org/techniques/T1567/004"
|
|
},
|
|
{
|
|
"name": "Bash History",
|
|
"id": "T1139",
|
|
"url": "https://attack.mitre.org/techniques/T1139"
|
|
},
|
|
{
|
|
"name": "Traffic Signaling",
|
|
"id": "T1205",
|
|
"url": "https://attack.mitre.org/techniques/T1205"
|
|
},
|
|
{
|
|
"name": "Direct Cloud VM Connections",
|
|
"id": "T1021.008",
|
|
"url": "https://attack.mitre.org/techniques/T1021/008"
|
|
},
|
|
{
|
|
"name": "Credentials from Web Browsers",
|
|
"id": "T1503",
|
|
"url": "https://attack.mitre.org/techniques/T1503"
|
|
},
|
|
{
|
|
"name": "System Binary Proxy Execution",
|
|
"id": "T1218",
|
|
"url": "https://attack.mitre.org/techniques/T1218"
|
|
},
|
|
{
|
|
"name": "Source",
|
|
"id": "T1153",
|
|
"url": "https://attack.mitre.org/techniques/T1153"
|
|
},
|
|
{
|
|
"name": "DLL Search Order Hijacking",
|
|
"id": "T1038",
|
|
"url": "https://attack.mitre.org/techniques/T1038"
|
|
},
|
|
{
|
|
"name": "New Service",
|
|
"id": "T1050",
|
|
"url": "https://attack.mitre.org/techniques/T1050"
|
|
},
|
|
{
|
|
"name": "Timestomp",
|
|
"id": "T1070.006",
|
|
"url": "https://attack.mitre.org/techniques/T1070/006"
|
|
},
|
|
{
|
|
"name": "Evil Twin",
|
|
"id": "T1557.004",
|
|
"url": "https://attack.mitre.org/techniques/T1557/004"
|
|
},
|
|
{
|
|
"name": "Reflective Code Loading",
|
|
"id": "T1620",
|
|
"url": "https://attack.mitre.org/techniques/T1620"
|
|
},
|
|
{
|
|
"name": "Wi-Fi Discovery",
|
|
"id": "T1016.002",
|
|
"url": "https://attack.mitre.org/techniques/T1016/002"
|
|
},
|
|
{
|
|
"name": "Mutual Exclusion",
|
|
"id": "T1480.002",
|
|
"url": "https://attack.mitre.org/techniques/T1480/002"
|
|
},
|
|
{
|
|
"name": "Ignore Process Interrupts",
|
|
"id": "T1564.011",
|
|
"url": "https://attack.mitre.org/techniques/T1564/011"
|
|
},
|
|
{
|
|
"name": "Escape to Host",
|
|
"id": "T1611",
|
|
"url": "https://attack.mitre.org/techniques/T1611"
|
|
},
|
|
{
|
|
"name": "Backup Software Discovery",
|
|
"id": "T1518.002",
|
|
"url": "https://attack.mitre.org/techniques/T1518/002"
|
|
},
|
|
{
|
|
"name": "Shortcut Modification",
|
|
"id": "T1547.009",
|
|
"url": "https://attack.mitre.org/techniques/T1547/009"
|
|
},
|
|
{
|
|
"name": "Application Window Discovery",
|
|
"id": "T1010",
|
|
"url": "https://attack.mitre.org/techniques/T1010"
|
|
},
|
|
{
|
|
"name": "Systemctl",
|
|
"id": "T1569.003",
|
|
"url": "https://attack.mitre.org/techniques/T1569/003"
|
|
},
|
|
{
|
|
"name": "Standard Cryptographic Protocol",
|
|
"id": "T1032",
|
|
"url": "https://attack.mitre.org/techniques/T1032"
|
|
},
|
|
{
|
|
"name": "Email Account",
|
|
"id": "T1087.003",
|
|
"url": "https://attack.mitre.org/techniques/T1087/003"
|
|
},
|
|
{
|
|
"name": "Hypervisor",
|
|
"id": "T1062",
|
|
"url": "https://attack.mitre.org/techniques/T1062"
|
|
},
|
|
{
|
|
"name": "Time Based Checks",
|
|
"id": "T1497.003",
|
|
"url": "https://attack.mitre.org/techniques/T1497/003"
|
|
},
|
|
{
|
|
"name": "AppCert DLLs",
|
|
"id": "T1182",
|
|
"url": "https://attack.mitre.org/techniques/T1182"
|
|
},
|
|
{
|
|
"name": "CMSTP",
|
|
"id": "T1218.003",
|
|
"url": "https://attack.mitre.org/techniques/T1218/003"
|
|
},
|
|
{
|
|
"name": "SSH Hijacking",
|
|
"id": "T1563.001",
|
|
"url": "https://attack.mitre.org/techniques/T1563/001"
|
|
},
|
|
{
|
|
"name": "Disable Windows Event Logging",
|
|
"id": "T1562.002",
|
|
"url": "https://attack.mitre.org/techniques/T1562/002"
|
|
},
|
|
{
|
|
"name": "Scheduled Transfer",
|
|
"id": "T1029",
|
|
"url": "https://attack.mitre.org/techniques/T1029"
|
|
},
|
|
{
|
|
"name": "SMB/Windows Admin Shares",
|
|
"id": "T1021.002",
|
|
"url": "https://attack.mitre.org/techniques/T1021/002"
|
|
},
|
|
{
|
|
"name": "Implant Internal Image",
|
|
"id": "T1525",
|
|
"url": "https://attack.mitre.org/techniques/T1525"
|
|
},
|
|
{
|
|
"name": "Protocol Tunneling",
|
|
"id": "T1572",
|
|
"url": "https://attack.mitre.org/techniques/T1572"
|
|
},
|
|
{
|
|
"name": "Control Panel",
|
|
"id": "T1218.002",
|
|
"url": "https://attack.mitre.org/techniques/T1218/002"
|
|
},
|
|
{
|
|
"name": "Network Address Translation Traversal",
|
|
"id": "T1599.001",
|
|
"url": "https://attack.mitre.org/techniques/T1599/001"
|
|
},
|
|
{
|
|
"name": "Upload Tool",
|
|
"id": "T1608.002",
|
|
"url": "https://attack.mitre.org/techniques/T1608/002"
|
|
},
|
|
{
|
|
"name": "Security Support Provider",
|
|
"id": "T1547.005",
|
|
"url": "https://attack.mitre.org/techniques/T1547/005"
|
|
},
|
|
{
|
|
"name": "Overwrite Process Arguments",
|
|
"id": "T1036.011",
|
|
"url": "https://attack.mitre.org/techniques/T1036/011"
|
|
},
|
|
{
|
|
"name": "Winlogon Helper DLL",
|
|
"id": "T1004",
|
|
"url": "https://attack.mitre.org/techniques/T1004"
|
|
},
|
|
{
|
|
"name": "Binary Padding",
|
|
"id": "T1009",
|
|
"url": "https://attack.mitre.org/techniques/T1009"
|
|
},
|
|
{
|
|
"name": "Use Alternate Authentication Material",
|
|
"id": "T1550",
|
|
"url": "https://attack.mitre.org/techniques/T1550"
|
|
},
|
|
{
|
|
"name": "Remote Desktop Protocol",
|
|
"id": "T1076",
|
|
"url": "https://attack.mitre.org/techniques/T1076"
|
|
},
|
|
{
|
|
"name": "Threat Intel Vendors",
|
|
"id": "T1597.001",
|
|
"url": "https://attack.mitre.org/techniques/T1597/001"
|
|
},
|
|
{
|
|
"name": "Exfiltration Over Other Network Medium",
|
|
"id": "T1011",
|
|
"url": "https://attack.mitre.org/techniques/T1011"
|
|
},
|
|
{
|
|
"name": "Network Device Configuration Dump",
|
|
"id": "T1602.002",
|
|
"url": "https://attack.mitre.org/techniques/T1602/002"
|
|
},
|
|
{
|
|
"name": "Gather Victim Identity Information",
|
|
"id": "T1589",
|
|
"url": "https://attack.mitre.org/techniques/T1589"
|
|
},
|
|
{
|
|
"name": "Authentication Package",
|
|
"id": "T1131",
|
|
"url": "https://attack.mitre.org/techniques/T1131"
|
|
},
|
|
{
|
|
"name": "Extra Window Memory Injection",
|
|
"id": "T1181",
|
|
"url": "https://attack.mitre.org/techniques/T1181"
|
|
},
|
|
{
|
|
"name": "Disable or Modify System Firewall",
|
|
"id": "T1562.004",
|
|
"url": "https://attack.mitre.org/techniques/T1562/004"
|
|
},
|
|
{
|
|
"name": "Archive Collected Data",
|
|
"id": "T1560",
|
|
"url": "https://attack.mitre.org/techniques/T1560"
|
|
},
|
|
{
|
|
"name": "Launchctl",
|
|
"id": "T1152",
|
|
"url": "https://attack.mitre.org/techniques/T1152"
|
|
},
|
|
{
|
|
"name": "SIP and Trust Provider Hijacking",
|
|
"id": "T1553.003",
|
|
"url": "https://attack.mitre.org/techniques/T1553/003"
|
|
},
|
|
{
|
|
"name": "Domain Generation Algorithms",
|
|
"id": "T1483",
|
|
"url": "https://attack.mitre.org/techniques/T1483"
|
|
},
|
|
{
|
|
"name": "Browser Session Hijacking",
|
|
"id": "T1185",
|
|
"url": "https://attack.mitre.org/techniques/T1185"
|
|
},
|
|
{
|
|
"name": "Remote Services",
|
|
"id": "T1021",
|
|
"url": "https://attack.mitre.org/techniques/T1021"
|
|
},
|
|
{
|
|
"name": "Mail Protocols",
|
|
"id": "T1071.003",
|
|
"url": "https://attack.mitre.org/techniques/T1071/003"
|
|
},
|
|
{
|
|
"name": "Hybrid Identity",
|
|
"id": "T1556.007",
|
|
"url": "https://attack.mitre.org/techniques/T1556/007"
|
|
},
|
|
{
|
|
"name": "Vulnerability Scanning",
|
|
"id": "T1595.002",
|
|
"url": "https://attack.mitre.org/techniques/T1595/002"
|
|
},
|
|
{
|
|
"name": "Cloud API",
|
|
"id": "T1059.009",
|
|
"url": "https://attack.mitre.org/techniques/T1059/009"
|
|
},
|
|
{
|
|
"name": "Search Open Technical Databases",
|
|
"id": "T1596",
|
|
"url": "https://attack.mitre.org/techniques/T1596"
|
|
},
|
|
{
|
|
"name": "Electron Applications",
|
|
"id": "T1218.015",
|
|
"url": "https://attack.mitre.org/techniques/T1218/015"
|
|
},
|
|
{
|
|
"name": "Disable or Modify Linux Audit System",
|
|
"id": "T1562.012",
|
|
"url": "https://attack.mitre.org/techniques/T1562/012"
|
|
},
|
|
{
|
|
"name": "Rogue Domain Controller",
|
|
"id": "T1207",
|
|
"url": "https://attack.mitre.org/techniques/T1207"
|
|
},
|
|
{
|
|
"name": "Code Signing Policy Modification",
|
|
"id": "T1553.006",
|
|
"url": "https://attack.mitre.org/techniques/T1553/006"
|
|
},
|
|
{
|
|
"name": "Deploy Container",
|
|
"id": "T1610",
|
|
"url": "https://attack.mitre.org/techniques/T1610"
|
|
},
|
|
{
|
|
"name": "File Deletion",
|
|
"id": "T1107",
|
|
"url": "https://attack.mitre.org/techniques/T1107"
|
|
},
|
|
{
|
|
"name": "Private Keys",
|
|
"id": "T1145",
|
|
"url": "https://attack.mitre.org/techniques/T1145"
|
|
},
|
|
{
|
|
"name": "Modify Registry",
|
|
"id": "T1112",
|
|
"url": "https://attack.mitre.org/techniques/T1112"
|
|
},
|
|
{
|
|
"name": "Launch Daemon",
|
|
"id": "T1543.004",
|
|
"url": "https://attack.mitre.org/techniques/T1543/004"
|
|
},
|
|
{
|
|
"name": "Cloud Infrastructure Discovery",
|
|
"id": "T1580",
|
|
"url": "https://attack.mitre.org/techniques/T1580"
|
|
},
|
|
{
|
|
"name": "Credentials from Web Browsers",
|
|
"id": "T1555.003",
|
|
"url": "https://attack.mitre.org/techniques/T1555/003"
|
|
},
|
|
{
|
|
"name": "Path Interception by Search Order Hijacking",
|
|
"id": "T1574.008",
|
|
"url": "https://attack.mitre.org/techniques/T1574/008"
|
|
},
|
|
{
|
|
"name": "Defacement",
|
|
"id": "T1491",
|
|
"url": "https://attack.mitre.org/techniques/T1491"
|
|
},
|
|
{
|
|
"name": "Unused/Unsupported Cloud Regions",
|
|
"id": "T1535",
|
|
"url": "https://attack.mitre.org/techniques/T1535"
|
|
},
|
|
{
|
|
"name": "DHCP Spoofing",
|
|
"id": "T1557.003",
|
|
"url": "https://attack.mitre.org/techniques/T1557/003"
|
|
},
|
|
{
|
|
"name": "AppleScript",
|
|
"id": "T1155",
|
|
"url": "https://attack.mitre.org/techniques/T1155"
|
|
},
|
|
{
|
|
"name": "Remote Service Session Hijacking",
|
|
"id": "T1563",
|
|
"url": "https://attack.mitre.org/techniques/T1563"
|
|
},
|
|
{
|
|
"name": "Bind Mounts",
|
|
"id": "T1564.013",
|
|
"url": "https://attack.mitre.org/techniques/T1564/013"
|
|
},
|
|
{
|
|
"name": "Binary Padding",
|
|
"id": "T1027.001",
|
|
"url": "https://attack.mitre.org/techniques/T1027/001"
|
|
},
|
|
{
|
|
"name": "Web Shell",
|
|
"id": "T1505.003",
|
|
"url": "https://attack.mitre.org/techniques/T1505/003"
|
|
},
|
|
{
|
|
"name": "Group Policy Modification",
|
|
"id": "T1484.001",
|
|
"url": "https://attack.mitre.org/techniques/T1484/001"
|
|
},
|
|
{
|
|
"name": "Browser Information Discovery",
|
|
"id": "T1217",
|
|
"url": "https://attack.mitre.org/techniques/T1217"
|
|
},
|
|
{
|
|
"name": "Private Keys",
|
|
"id": "T1552.004",
|
|
"url": "https://attack.mitre.org/techniques/T1552/004"
|
|
},
|
|
{
|
|
"name": "Server",
|
|
"id": "T1583.004",
|
|
"url": "https://attack.mitre.org/techniques/T1583/004"
|
|
},
|
|
{
|
|
"name": "Windows Remote Management",
|
|
"id": "T1021.006",
|
|
"url": "https://attack.mitre.org/techniques/T1021/006"
|
|
},
|
|
{
|
|
"name": "Exfiltration Over Bluetooth",
|
|
"id": "T1011.001",
|
|
"url": "https://attack.mitre.org/techniques/T1011/001"
|
|
},
|
|
{
|
|
"name": "Default Accounts",
|
|
"id": "T1078.001",
|
|
"url": "https://attack.mitre.org/techniques/T1078/001"
|
|
},
|
|
{
|
|
"name": "Time Providers",
|
|
"id": "T1547.003",
|
|
"url": "https://attack.mitre.org/techniques/T1547/003"
|
|
},
|
|
{
|
|
"name": "Image File Execution Options Injection",
|
|
"id": "T1183",
|
|
"url": "https://attack.mitre.org/techniques/T1183"
|
|
},
|
|
{
|
|
"name": "Rundll32",
|
|
"id": "T1085",
|
|
"url": "https://attack.mitre.org/techniques/T1085"
|
|
},
|
|
{
|
|
"name": "Modify Existing Service",
|
|
"id": "T1031",
|
|
"url": "https://attack.mitre.org/techniques/T1031"
|
|
},
|
|
{
|
|
"name": "Trap",
|
|
"id": "T1546.005",
|
|
"url": "https://attack.mitre.org/techniques/T1546/005"
|
|
},
|
|
{
|
|
"name": "Dynamic Linker Hijacking",
|
|
"id": "T1574.006",
|
|
"url": "https://attack.mitre.org/techniques/T1574/006"
|
|
},
|
|
{
|
|
"name": "Local Account",
|
|
"id": "T1136.001",
|
|
"url": "https://attack.mitre.org/techniques/T1136/001"
|
|
},
|
|
{
|
|
"name": "Search Threat Vendor Data",
|
|
"id": "T1681",
|
|
"url": "https://attack.mitre.org/techniques/T1681"
|
|
},
|
|
{
|
|
"name": "Input Injection",
|
|
"id": "T1674",
|
|
"url": "https://attack.mitre.org/techniques/T1674"
|
|
},
|
|
{
|
|
"name": "Communication Through Removable Media",
|
|
"id": "T1092",
|
|
"url": "https://attack.mitre.org/techniques/T1092"
|
|
},
|
|
{
|
|
"name": "Clear Windows Event Logs",
|
|
"id": "T1070.001",
|
|
"url": "https://attack.mitre.org/techniques/T1070/001"
|
|
},
|
|
{
|
|
"name": "Email Accounts",
|
|
"id": "T1585.002",
|
|
"url": "https://attack.mitre.org/techniques/T1585/002"
|
|
},
|
|
{
|
|
"name": "LLMNR/NBT-NS Poisoning and SMB Relay",
|
|
"id": "T1557.001",
|
|
"url": "https://attack.mitre.org/techniques/T1557/001"
|
|
},
|
|
{
|
|
"name": "File and Directory Permissions Modification",
|
|
"id": "T1222",
|
|
"url": "https://attack.mitre.org/techniques/T1222"
|
|
},
|
|
{
|
|
"name": "LSASS Memory",
|
|
"id": "T1003.001",
|
|
"url": "https://attack.mitre.org/techniques/T1003/001"
|
|
},
|
|
{
|
|
"name": "At (Linux)",
|
|
"id": "T1053.001",
|
|
"url": "https://attack.mitre.org/techniques/T1053/001"
|
|
},
|
|
{
|
|
"name": "IDE Extensions",
|
|
"id": "T1176.002",
|
|
"url": "https://attack.mitre.org/techniques/T1176/002"
|
|
},
|
|
{
|
|
"name": "Hooking",
|
|
"id": "T1179",
|
|
"url": "https://attack.mitre.org/techniques/T1179"
|
|
},
|
|
{
|
|
"name": "Active Scanning",
|
|
"id": "T1595",
|
|
"url": "https://attack.mitre.org/techniques/T1595"
|
|
},
|
|
{
|
|
"name": "Junk Code Insertion",
|
|
"id": "T1027.016",
|
|
"url": "https://attack.mitre.org/techniques/T1027/016"
|
|
},
|
|
{
|
|
"name": "Plist Modification",
|
|
"id": "T1547.011",
|
|
"url": "https://attack.mitre.org/techniques/T1547/011"
|
|
},
|
|
{
|
|
"name": "Abuse Elevation Control Mechanism",
|
|
"id": "T1548",
|
|
"url": "https://attack.mitre.org/techniques/T1548"
|
|
},
|
|
{
|
|
"name": "Create Process with Token",
|
|
"id": "T1134.002",
|
|
"url": "https://attack.mitre.org/techniques/T1134/002"
|
|
},
|
|
{
|
|
"name": "Setuid and Setgid",
|
|
"id": "T1548.001",
|
|
"url": "https://attack.mitre.org/techniques/T1548/001"
|
|
},
|
|
{
|
|
"name": "Winlogon Helper DLL",
|
|
"id": "T1547.004",
|
|
"url": "https://attack.mitre.org/techniques/T1547/004"
|
|
},
|
|
{
|
|
"name": "System Firmware",
|
|
"id": "T1019",
|
|
"url": "https://attack.mitre.org/techniques/T1019"
|
|
},
|
|
{
|
|
"name": "Distributed Component Object Model",
|
|
"id": "T1021.003",
|
|
"url": "https://attack.mitre.org/techniques/T1021/003"
|
|
},
|
|
{
|
|
"name": "Change Default File Association",
|
|
"id": "T1042",
|
|
"url": "https://attack.mitre.org/techniques/T1042"
|
|
},
|
|
{
|
|
"name": "Regsvr32",
|
|
"id": "T1117",
|
|
"url": "https://attack.mitre.org/techniques/T1117"
|
|
},
|
|
{
|
|
"name": "Password Spraying",
|
|
"id": "T1110.003",
|
|
"url": "https://attack.mitre.org/techniques/T1110/003"
|
|
},
|
|
{
|
|
"name": "External Proxy",
|
|
"id": "T1090.002",
|
|
"url": "https://attack.mitre.org/techniques/T1090/002"
|
|
},
|
|
{
|
|
"name": "Web Portal Capture",
|
|
"id": "T1056.003",
|
|
"url": "https://attack.mitre.org/techniques/T1056/003"
|
|
},
|
|
{
|
|
"name": "Email Addresses",
|
|
"id": "T1589.002",
|
|
"url": "https://attack.mitre.org/techniques/T1589/002"
|
|
},
|
|
{
|
|
"name": "Re-opened Applications",
|
|
"id": "T1164",
|
|
"url": "https://attack.mitre.org/techniques/T1164"
|
|
},
|
|
{
|
|
"name": "Indicator Blocking",
|
|
"id": "T1054",
|
|
"url": "https://attack.mitre.org/techniques/T1054"
|
|
},
|
|
{
|
|
"name": "Spearphishing Voice",
|
|
"id": "T1598.004",
|
|
"url": "https://attack.mitre.org/techniques/T1598/004"
|
|
},
|
|
{
|
|
"name": "Redundant Access",
|
|
"id": "T1108",
|
|
"url": "https://attack.mitre.org/techniques/T1108"
|
|
},
|
|
{
|
|
"name": "Spearphishing Attachment",
|
|
"id": "T1193",
|
|
"url": "https://attack.mitre.org/techniques/T1193"
|
|
},
|
|
{
|
|
"name": "Cached Domain Credentials",
|
|
"id": "T1003.005",
|
|
"url": "https://attack.mitre.org/techniques/T1003/005"
|
|
},
|
|
{
|
|
"name": "SSH Authorized Keys",
|
|
"id": "T1098.004",
|
|
"url": "https://attack.mitre.org/techniques/T1098/004"
|
|
},
|
|
{
|
|
"name": "Virtual Machine Discovery",
|
|
"id": "T1673",
|
|
"url": "https://attack.mitre.org/techniques/T1673"
|
|
},
|
|
{
|
|
"name": "Kernel Modules and Extensions",
|
|
"id": "T1215",
|
|
"url": "https://attack.mitre.org/techniques/T1215"
|
|
},
|
|
{
|
|
"name": "Security Support Provider",
|
|
"id": "T1101",
|
|
"url": "https://attack.mitre.org/techniques/T1101"
|
|
},
|
|
{
|
|
"name": "Network Security Appliances",
|
|
"id": "T1590.006",
|
|
"url": "https://attack.mitre.org/techniques/T1590/006"
|
|
},
|
|
{
|
|
"name": "Image File Execution Options Injection",
|
|
"id": "T1546.012",
|
|
"url": "https://attack.mitre.org/techniques/T1546/012"
|
|
},
|
|
{
|
|
"name": "Odbcconf",
|
|
"id": "T1218.008",
|
|
"url": "https://attack.mitre.org/techniques/T1218/008"
|
|
},
|
|
{
|
|
"name": "Search Engines",
|
|
"id": "T1593.002",
|
|
"url": "https://attack.mitre.org/techniques/T1593/002"
|
|
},
|
|
{
|
|
"name": "LSASS Driver",
|
|
"id": "T1177",
|
|
"url": "https://attack.mitre.org/techniques/T1177"
|
|
},
|
|
{
|
|
"name": "Business Relationships",
|
|
"id": "T1591.002",
|
|
"url": "https://attack.mitre.org/techniques/T1591/002"
|
|
},
|
|
{
|
|
"name": "Temporary Elevated Cloud Access",
|
|
"id": "T1548.005",
|
|
"url": "https://attack.mitre.org/techniques/T1548/005"
|
|
},
|
|
{
|
|
"name": "Video Capture",
|
|
"id": "T1125",
|
|
"url": "https://attack.mitre.org/techniques/T1125"
|
|
},
|
|
{
|
|
"name": "Gatekeeper Bypass",
|
|
"id": "T1144",
|
|
"url": "https://attack.mitre.org/techniques/T1144"
|
|
},
|
|
{
|
|
"name": "Software Packing",
|
|
"id": "T1045",
|
|
"url": "https://attack.mitre.org/techniques/T1045"
|
|
},
|
|
{
|
|
"name": "Process Doppelgänging",
|
|
"id": "T1055.013",
|
|
"url": "https://attack.mitre.org/techniques/T1055/013"
|
|
},
|
|
{
|
|
"name": "System Network Configuration Discovery",
|
|
"id": "T1016",
|
|
"url": "https://attack.mitre.org/techniques/T1016"
|
|
},
|
|
{
|
|
"name": "Delete Cloud Instance",
|
|
"id": "T1578.003",
|
|
"url": "https://attack.mitre.org/techniques/T1578/003"
|
|
},
|
|
{
|
|
"name": "Code Repositories",
|
|
"id": "T1593.003",
|
|
"url": "https://attack.mitre.org/techniques/T1593/003"
|
|
},
|
|
{
|
|
"name": "Executable Installer File Permissions Weakness",
|
|
"id": "T1574.005",
|
|
"url": "https://attack.mitre.org/techniques/T1574/005"
|
|
},
|
|
{
|
|
"name": "Accessibility Features",
|
|
"id": "T1546.008",
|
|
"url": "https://attack.mitre.org/techniques/T1546/008"
|
|
},
|
|
{
|
|
"name": "Bandwidth Hijacking",
|
|
"id": "T1496.002",
|
|
"url": "https://attack.mitre.org/techniques/T1496/002"
|
|
},
|
|
{
|
|
"name": "PowerShell Profile",
|
|
"id": "T1504",
|
|
"url": "https://attack.mitre.org/techniques/T1504"
|
|
},
|
|
{
|
|
"name": "SIP and Trust Provider Hijacking",
|
|
"id": "T1198",
|
|
"url": "https://attack.mitre.org/techniques/T1198"
|
|
},
|
|
{
|
|
"name": "Account Discovery",
|
|
"id": "T1087",
|
|
"url": "https://attack.mitre.org/techniques/T1087"
|
|
},
|
|
{
|
|
"name": "Proxy",
|
|
"id": "T1090",
|
|
"url": "https://attack.mitre.org/techniques/T1090"
|
|
},
|
|
{
|
|
"name": "Command and Scripting Interpreter",
|
|
"id": "T1059",
|
|
"url": "https://attack.mitre.org/techniques/T1059"
|
|
},
|
|
{
|
|
"name": "Malicious Library",
|
|
"id": "T1204.005",
|
|
"url": "https://attack.mitre.org/techniques/T1204/005"
|
|
},
|
|
{
|
|
"name": "Indicator Blocking",
|
|
"id": "T1562.006",
|
|
"url": "https://attack.mitre.org/techniques/T1562/006"
|
|
},
|
|
{
|
|
"name": "Domain Account",
|
|
"id": "T1136.002",
|
|
"url": "https://attack.mitre.org/techniques/T1136/002"
|
|
},
|
|
{
|
|
"name": "Extended Attributes",
|
|
"id": "T1564.014",
|
|
"url": "https://attack.mitre.org/techniques/T1564/014"
|
|
},
|
|
{
|
|
"name": "Employee Names",
|
|
"id": "T1589.003",
|
|
"url": "https://attack.mitre.org/techniques/T1589/003"
|
|
},
|
|
{
|
|
"name": "Poisoned Pipeline Execution",
|
|
"id": "T1677",
|
|
"url": "https://attack.mitre.org/techniques/T1677"
|
|
},
|
|
{
|
|
"name": "Domain Trust Discovery",
|
|
"id": "T1482",
|
|
"url": "https://attack.mitre.org/techniques/T1482"
|
|
},
|
|
{
|
|
"name": "Golden Ticket",
|
|
"id": "T1558.001",
|
|
"url": "https://attack.mitre.org/techniques/T1558/001"
|
|
},
|
|
{
|
|
"name": "Component Object Model and Distributed COM",
|
|
"id": "T1175",
|
|
"url": "https://attack.mitre.org/techniques/T1175"
|
|
},
|
|
{
|
|
"name": "Automated Exfiltration",
|
|
"id": "T1020",
|
|
"url": "https://attack.mitre.org/techniques/T1020"
|
|
},
|
|
{
|
|
"name": "Client Configurations",
|
|
"id": "T1592.004",
|
|
"url": "https://attack.mitre.org/techniques/T1592/004"
|
|
},
|
|
{
|
|
"name": "Disable or Modify Cloud Firewall",
|
|
"id": "T1562.007",
|
|
"url": "https://attack.mitre.org/techniques/T1562/007"
|
|
},
|
|
{
|
|
"name": "IDE Tunneling",
|
|
"id": "T1219.001",
|
|
"url": "https://attack.mitre.org/techniques/T1219/001"
|
|
},
|
|
{
|
|
"name": "Right-to-Left Override",
|
|
"id": "T1036.002",
|
|
"url": "https://attack.mitre.org/techniques/T1036/002"
|
|
},
|
|
{
|
|
"name": "Malware",
|
|
"id": "T1588.001",
|
|
"url": "https://attack.mitre.org/techniques/T1588/001"
|
|
},
|
|
{
|
|
"name": "SVG Smuggling",
|
|
"id": "T1027.017",
|
|
"url": "https://attack.mitre.org/techniques/T1027/017"
|
|
},
|
|
{
|
|
"name": "Component Firmware",
|
|
"id": "T1542.002",
|
|
"url": "https://attack.mitre.org/techniques/T1542/002"
|
|
},
|
|
{
|
|
"name": "Indicator Removal",
|
|
"id": "T1070",
|
|
"url": "https://attack.mitre.org/techniques/T1070"
|
|
},
|
|
{
|
|
"name": "Exfiltration Over Symmetric Encrypted Non-C2 Protocol",
|
|
"id": "T1048.001",
|
|
"url": "https://attack.mitre.org/techniques/T1048/001"
|
|
},
|
|
{
|
|
"name": "Office Template Macros",
|
|
"id": "T1137.001",
|
|
"url": "https://attack.mitre.org/techniques/T1137/001"
|
|
},
|
|
{
|
|
"name": "Virtual Private Server",
|
|
"id": "T1583.003",
|
|
"url": "https://attack.mitre.org/techniques/T1583/003"
|
|
},
|
|
{
|
|
"name": "Confluence",
|
|
"id": "T1213.001",
|
|
"url": "https://attack.mitre.org/techniques/T1213/001"
|
|
},
|
|
{
|
|
"name": "Pass the Ticket",
|
|
"id": "T1550.003",
|
|
"url": "https://attack.mitre.org/techniques/T1550/003"
|
|
},
|
|
{
|
|
"name": "Container Administration Command",
|
|
"id": "T1609",
|
|
"url": "https://attack.mitre.org/techniques/T1609"
|
|
},
|
|
{
|
|
"name": "File and Directory Discovery",
|
|
"id": "T1083",
|
|
"url": "https://attack.mitre.org/techniques/T1083"
|
|
},
|
|
{
|
|
"name": "Dynamic Resolution",
|
|
"id": "T1568",
|
|
"url": "https://attack.mitre.org/techniques/T1568"
|
|
},
|
|
{
|
|
"name": "Masquerade Task or Service",
|
|
"id": "T1036.004",
|
|
"url": "https://attack.mitre.org/techniques/T1036/004"
|
|
},
|
|
{
|
|
"name": "Asynchronous Procedure Call",
|
|
"id": "T1055.004",
|
|
"url": "https://attack.mitre.org/techniques/T1055/004"
|
|
},
|
|
{
|
|
"name": "Traffic Duplication",
|
|
"id": "T1020.001",
|
|
"url": "https://attack.mitre.org/techniques/T1020/001"
|
|
},
|
|
{
|
|
"name": "Application Shimming",
|
|
"id": "T1138",
|
|
"url": "https://attack.mitre.org/techniques/T1138"
|
|
},
|
|
{
|
|
"name": "Plist File Modification",
|
|
"id": "T1647",
|
|
"url": "https://attack.mitre.org/techniques/T1647"
|
|
},
|
|
{
|
|
"name": "JamPlus",
|
|
"id": "T1127.003",
|
|
"url": "https://attack.mitre.org/techniques/T1127/003"
|
|
},
|
|
{
|
|
"name": "AppCert DLLs",
|
|
"id": "T1546.009",
|
|
"url": "https://attack.mitre.org/techniques/T1546/009"
|
|
},
|
|
{
|
|
"name": "CMSTP",
|
|
"id": "T1191",
|
|
"url": "https://attack.mitre.org/techniques/T1191"
|
|
},
|
|
{
|
|
"name": "Multi-hop Proxy",
|
|
"id": "T1188",
|
|
"url": "https://attack.mitre.org/techniques/T1188"
|
|
},
|
|
{
|
|
"name": "Email Forwarding Rule",
|
|
"id": "T1114.003",
|
|
"url": "https://attack.mitre.org/techniques/T1114/003"
|
|
},
|
|
{
|
|
"name": "Data Staged",
|
|
"id": "T1074",
|
|
"url": "https://attack.mitre.org/techniques/T1074"
|
|
},
|
|
{
|
|
"name": "Steal or Forge Authentication Certificates",
|
|
"id": "T1649",
|
|
"url": "https://attack.mitre.org/techniques/T1649"
|
|
},
|
|
{
|
|
"name": "Device Registration",
|
|
"id": "T1098.005",
|
|
"url": "https://attack.mitre.org/techniques/T1098/005"
|
|
},
|
|
{
|
|
"name": "System Network Connections Discovery",
|
|
"id": "T1049",
|
|
"url": "https://attack.mitre.org/techniques/T1049"
|
|
},
|
|
{
|
|
"name": "Compromise Infrastructure",
|
|
"id": "T1584",
|
|
"url": "https://attack.mitre.org/techniques/T1584"
|
|
},
|
|
{
|
|
"name": "Mark-of-the-Web Bypass",
|
|
"id": "T1553.005",
|
|
"url": "https://attack.mitre.org/techniques/T1553/005"
|
|
},
|
|
{
|
|
"name": "Disable Crypto Hardware",
|
|
"id": "T1600.002",
|
|
"url": "https://attack.mitre.org/techniques/T1600/002"
|
|
},
|
|
{
|
|
"name": "Pre-OS Boot",
|
|
"id": "T1542",
|
|
"url": "https://attack.mitre.org/techniques/T1542"
|
|
},
|
|
{
|
|
"name": "Scripting",
|
|
"id": "T1064",
|
|
"url": "https://attack.mitre.org/techniques/T1064"
|
|
},
|
|
{
|
|
"name": "Build Image on Host",
|
|
"id": "T1612",
|
|
"url": "https://attack.mitre.org/techniques/T1612"
|
|
},
|
|
{
|
|
"name": "Shared Webroot",
|
|
"id": "T1051",
|
|
"url": "https://attack.mitre.org/techniques/T1051"
|
|
},
|
|
{
|
|
"name": "Portable Executable Injection",
|
|
"id": "T1055.002",
|
|
"url": "https://attack.mitre.org/techniques/T1055/002"
|
|
},
|
|
{
|
|
"name": "Verclsid",
|
|
"id": "T1218.012",
|
|
"url": "https://attack.mitre.org/techniques/T1218/012"
|
|
},
|
|
{
|
|
"name": "Compromise Accounts",
|
|
"id": "T1586",
|
|
"url": "https://attack.mitre.org/techniques/T1586"
|
|
},
|
|
{
|
|
"name": "Launchctl",
|
|
"id": "T1569.001",
|
|
"url": "https://attack.mitre.org/techniques/T1569/001"
|
|
},
|
|
{
|
|
"name": "Botnet",
|
|
"id": "T1584.005",
|
|
"url": "https://attack.mitre.org/techniques/T1584/005"
|
|
},
|
|
{
|
|
"name": "Network Device CLI",
|
|
"id": "T1059.008",
|
|
"url": "https://attack.mitre.org/techniques/T1059/008"
|
|
},
|
|
{
|
|
"name": "Shell History",
|
|
"id": "T1552.003",
|
|
"url": "https://attack.mitre.org/techniques/T1552/003"
|
|
},
|
|
{
|
|
"name": "Downgrade Attack",
|
|
"id": "T1562.010",
|
|
"url": "https://attack.mitre.org/techniques/T1562/010"
|
|
},
|
|
{
|
|
"name": "XPC Services",
|
|
"id": "T1559.003",
|
|
"url": "https://attack.mitre.org/techniques/T1559/003"
|
|
},
|
|
{
|
|
"name": "Virtualization/Sandbox Evasion",
|
|
"id": "T1497",
|
|
"url": "https://attack.mitre.org/techniques/T1497"
|
|
},
|
|
{
|
|
"name": "Web Service",
|
|
"id": "T1102",
|
|
"url": "https://attack.mitre.org/techniques/T1102"
|
|
},
|
|
{
|
|
"name": "Credentials In Files",
|
|
"id": "T1552.001",
|
|
"url": "https://attack.mitre.org/techniques/T1552/001"
|
|
},
|
|
{
|
|
"name": "DNS Calculation",
|
|
"id": "T1568.003",
|
|
"url": "https://attack.mitre.org/techniques/T1568/003"
|
|
},
|
|
{
|
|
"name": "Mshta",
|
|
"id": "T1218.005",
|
|
"url": "https://attack.mitre.org/techniques/T1218/005"
|
|
},
|
|
{
|
|
"name": "Login Items",
|
|
"id": "T1547.015",
|
|
"url": "https://attack.mitre.org/techniques/T1547/015"
|
|
},
|
|
{
|
|
"name": "Stage Capabilities",
|
|
"id": "T1608",
|
|
"url": "https://attack.mitre.org/techniques/T1608"
|
|
},
|
|
{
|
|
"name": "Link Target",
|
|
"id": "T1608.005",
|
|
"url": "https://attack.mitre.org/techniques/T1608/005"
|
|
},
|
|
{
|
|
"name": "Multi-Stage Channels",
|
|
"id": "T1104",
|
|
"url": "https://attack.mitre.org/techniques/T1104"
|
|
},
|
|
{
|
|
"name": "Financial Theft",
|
|
"id": "T1657",
|
|
"url": "https://attack.mitre.org/techniques/T1657"
|
|
},
|
|
{
|
|
"name": "Execution Guardrails",
|
|
"id": "T1480",
|
|
"url": "https://attack.mitre.org/techniques/T1480"
|
|
},
|
|
{
|
|
"name": "Cloud Storage Object Discovery",
|
|
"id": "T1619",
|
|
"url": "https://attack.mitre.org/techniques/T1619"
|
|
},
|
|
{
|
|
"name": "Web Cookies",
|
|
"id": "T1606.001",
|
|
"url": "https://attack.mitre.org/techniques/T1606/001"
|
|
},
|
|
{
|
|
"name": "Log Enumeration",
|
|
"id": "T1654",
|
|
"url": "https://attack.mitre.org/techniques/T1654"
|
|
},
|
|
{
|
|
"name": "Token Impersonation/Theft",
|
|
"id": "T1134.001",
|
|
"url": "https://attack.mitre.org/techniques/T1134/001"
|
|
},
|
|
{
|
|
"name": "Exfiltration to Code Repository",
|
|
"id": "T1567.001",
|
|
"url": "https://attack.mitre.org/techniques/T1567/001"
|
|
},
|
|
{
|
|
"name": "Cloud Services",
|
|
"id": "T1021.007",
|
|
"url": "https://attack.mitre.org/techniques/T1021/007"
|
|
},
|
|
{
|
|
"name": "Port Knocking",
|
|
"id": "T1205.001",
|
|
"url": "https://attack.mitre.org/techniques/T1205/001"
|
|
},
|
|
{
|
|
"name": "LNK Icon Smuggling",
|
|
"id": "T1027.012",
|
|
"url": "https://attack.mitre.org/techniques/T1027/012"
|
|
},
|
|
{
|
|
"name": "Web Services",
|
|
"id": "T1583.006",
|
|
"url": "https://attack.mitre.org/techniques/T1583/006"
|
|
},
|
|
{
|
|
"name": "Steal Application Access Token",
|
|
"id": "T1528",
|
|
"url": "https://attack.mitre.org/techniques/T1528"
|
|
},
|
|
{
|
|
"name": "Spearphishing Attachment",
|
|
"id": "T1598.002",
|
|
"url": "https://attack.mitre.org/techniques/T1598/002"
|
|
},
|
|
{
|
|
"name": "Additional Cloud Credentials",
|
|
"id": "T1098.001",
|
|
"url": "https://attack.mitre.org/techniques/T1098/001"
|
|
},
|
|
{
|
|
"name": "User Execution",
|
|
"id": "T1204",
|
|
"url": "https://attack.mitre.org/techniques/T1204"
|
|
},
|
|
{
|
|
"name": "Internal Defacement",
|
|
"id": "T1491.001",
|
|
"url": "https://attack.mitre.org/techniques/T1491/001"
|
|
},
|
|
{
|
|
"name": "Hidden Users",
|
|
"id": "T1564.002",
|
|
"url": "https://attack.mitre.org/techniques/T1564/002"
|
|
},
|
|
{
|
|
"name": "Make and Impersonate Token",
|
|
"id": "T1134.003",
|
|
"url": "https://attack.mitre.org/techniques/T1134/003"
|
|
},
|
|
{
|
|
"name": "Group Policy Preferences",
|
|
"id": "T1552.006",
|
|
"url": "https://attack.mitre.org/techniques/T1552/006"
|
|
},
|
|
{
|
|
"name": "Control Panel Items",
|
|
"id": "T1196",
|
|
"url": "https://attack.mitre.org/techniques/T1196"
|
|
},
|
|
{
|
|
"name": "Exfiltration Over Asymmetric Encrypted Non-C2 Protocol",
|
|
"id": "T1048.002",
|
|
"url": "https://attack.mitre.org/techniques/T1048/002"
|
|
},
|
|
{
|
|
"name": "Cloud Account",
|
|
"id": "T1087.004",
|
|
"url": "https://attack.mitre.org/techniques/T1087/004"
|
|
},
|
|
{
|
|
"name": "Process Discovery",
|
|
"id": "T1057",
|
|
"url": "https://attack.mitre.org/techniques/T1057"
|
|
},
|
|
{
|
|
"name": "Impair Command History Logging",
|
|
"id": "T1562.003",
|
|
"url": "https://attack.mitre.org/techniques/T1562/003"
|
|
},
|
|
{
|
|
"name": "Launchd",
|
|
"id": "T1053.004",
|
|
"url": "https://attack.mitre.org/techniques/T1053/004"
|
|
},
|
|
{
|
|
"name": "Network Provider DLL",
|
|
"id": "T1556.008",
|
|
"url": "https://attack.mitre.org/techniques/T1556/008"
|
|
},
|
|
{
|
|
"name": "Windows Management Instrumentation Event Subscription",
|
|
"id": "T1546.003",
|
|
"url": "https://attack.mitre.org/techniques/T1546/003"
|
|
},
|
|
{
|
|
"name": "CDNs",
|
|
"id": "T1596.004",
|
|
"url": "https://attack.mitre.org/techniques/T1596/004"
|
|
},
|
|
{
|
|
"name": "User Activity Based Checks",
|
|
"id": "T1497.002",
|
|
"url": "https://attack.mitre.org/techniques/T1497/002"
|
|
},
|
|
{
|
|
"name": "Input Prompt",
|
|
"id": "T1141",
|
|
"url": "https://attack.mitre.org/techniques/T1141"
|
|
},
|
|
{
|
|
"name": "Cloud Service Hijacking",
|
|
"id": "T1496.004",
|
|
"url": "https://attack.mitre.org/techniques/T1496/004"
|
|
},
|
|
{
|
|
"name": "Cloud Accounts",
|
|
"id": "T1585.003",
|
|
"url": "https://attack.mitre.org/techniques/T1585/003"
|
|
},
|
|
{
|
|
"name": "Software Deployment Tools",
|
|
"id": "T1072",
|
|
"url": "https://attack.mitre.org/techniques/T1072"
|
|
},
|
|
{
|
|
"name": "Exfiltration Over C2 Channel",
|
|
"id": "T1041",
|
|
"url": "https://attack.mitre.org/techniques/T1041"
|
|
},
|
|
{
|
|
"name": "Parent PID Spoofing",
|
|
"id": "T1134.004",
|
|
"url": "https://attack.mitre.org/techniques/T1134/004"
|
|
},
|
|
{
|
|
"name": "Gather Victim Org Information",
|
|
"id": "T1591",
|
|
"url": "https://attack.mitre.org/techniques/T1591"
|
|
},
|
|
{
|
|
"name": "Registry Run Keys / Startup Folder",
|
|
"id": "T1060",
|
|
"url": "https://attack.mitre.org/techniques/T1060"
|
|
},
|
|
{
|
|
"name": "Forge Web Credentials",
|
|
"id": "T1606",
|
|
"url": "https://attack.mitre.org/techniques/T1606"
|
|
},
|
|
{
|
|
"name": "Multi-Factor Authentication Request Generation",
|
|
"id": "T1621",
|
|
"url": "https://attack.mitre.org/techniques/T1621"
|
|
},
|
|
{
|
|
"name": "Compromise Host Software Binary",
|
|
"id": "T1554",
|
|
"url": "https://attack.mitre.org/techniques/T1554"
|
|
},
|
|
{
|
|
"name": "Chat Messages",
|
|
"id": "T1552.008",
|
|
"url": "https://attack.mitre.org/techniques/T1552/008"
|
|
},
|
|
{
|
|
"name": "PowerShell",
|
|
"id": "T1059.001",
|
|
"url": "https://attack.mitre.org/techniques/T1059/001"
|
|
},
|
|
{
|
|
"name": "Shortcut Modification",
|
|
"id": "T1023",
|
|
"url": "https://attack.mitre.org/techniques/T1023"
|
|
},
|
|
{
|
|
"name": "Change Default File Association",
|
|
"id": "T1546.001",
|
|
"url": "https://attack.mitre.org/techniques/T1546/001"
|
|
},
|
|
{
|
|
"name": "VDSO Hijacking",
|
|
"id": "T1055.014",
|
|
"url": "https://attack.mitre.org/techniques/T1055/014"
|
|
},
|
|
{
|
|
"name": "Multiband Communication",
|
|
"id": "T1026",
|
|
"url": "https://attack.mitre.org/techniques/T1026"
|
|
},
|
|
{
|
|
"name": "File Transfer Protocols",
|
|
"id": "T1071.002",
|
|
"url": "https://attack.mitre.org/techniques/T1071/002"
|
|
},
|
|
{
|
|
"name": "Selective Exclusion",
|
|
"id": "T1679",
|
|
"url": "https://attack.mitre.org/techniques/T1679"
|
|
},
|
|
{
|
|
"name": "Component Object Model Hijacking",
|
|
"id": "T1122",
|
|
"url": "https://attack.mitre.org/techniques/T1122"
|
|
},
|
|
{
|
|
"name": "Accessibility Features",
|
|
"id": "T1015",
|
|
"url": "https://attack.mitre.org/techniques/T1015"
|
|
},
|
|
{
|
|
"name": "Exploitation for Credential Access",
|
|
"id": "T1212",
|
|
"url": "https://attack.mitre.org/techniques/T1212"
|
|
},
|
|
{
|
|
"name": "Emond",
|
|
"id": "T1546.014",
|
|
"url": "https://attack.mitre.org/techniques/T1546/014"
|
|
},
|
|
{
|
|
"name": "One-Way Communication",
|
|
"id": "T1102.003",
|
|
"url": "https://attack.mitre.org/techniques/T1102/003"
|
|
},
|
|
{
|
|
"name": "Gather Victim Network Information",
|
|
"id": "T1590",
|
|
"url": "https://attack.mitre.org/techniques/T1590"
|
|
},
|
|
{
|
|
"name": "Exploitation of Remote Services",
|
|
"id": "T1210",
|
|
"url": "https://attack.mitre.org/techniques/T1210"
|
|
},
|
|
{
|
|
"name": "Parent PID Spoofing",
|
|
"id": "T1502",
|
|
"url": "https://attack.mitre.org/techniques/T1502"
|
|
},
|
|
{
|
|
"name": "Keychain",
|
|
"id": "T1142",
|
|
"url": "https://attack.mitre.org/techniques/T1142"
|
|
},
|
|
{
|
|
"name": "Internal Spearphishing",
|
|
"id": "T1534",
|
|
"url": "https://attack.mitre.org/techniques/T1534"
|
|
},
|
|
{
|
|
"name": "Sudo",
|
|
"id": "T1169",
|
|
"url": "https://attack.mitre.org/techniques/T1169"
|
|
},
|
|
{
|
|
"name": "Services File Permissions Weakness",
|
|
"id": "T1574.010",
|
|
"url": "https://attack.mitre.org/techniques/T1574/010"
|
|
},
|
|
{
|
|
"name": "Registry Run Keys / Startup Folder",
|
|
"id": "T1547.001",
|
|
"url": "https://attack.mitre.org/techniques/T1547/001"
|
|
},
|
|
{
|
|
"name": "Trusted Relationship",
|
|
"id": "T1199",
|
|
"url": "https://attack.mitre.org/techniques/T1199"
|
|
},
|
|
{
|
|
"name": "Cloud Account",
|
|
"id": "T1136.003",
|
|
"url": "https://attack.mitre.org/techniques/T1136/003"
|
|
},
|
|
{
|
|
"name": "Local Groups",
|
|
"id": "T1069.001",
|
|
"url": "https://attack.mitre.org/techniques/T1069/001"
|
|
},
|
|
{
|
|
"name": "LC_MAIN Hijacking",
|
|
"id": "T1149",
|
|
"url": "https://attack.mitre.org/techniques/T1149"
|
|
},
|
|
{
|
|
"name": "Search Open Websites/Domains",
|
|
"id": "T1593",
|
|
"url": "https://attack.mitre.org/techniques/T1593"
|
|
},
|
|
{
|
|
"name": "Disable or Modify Network Device Firewall",
|
|
"id": "T1562.013",
|
|
"url": "https://attack.mitre.org/techniques/T1562/013"
|
|
},
|
|
{
|
|
"name": "Account Manipulation",
|
|
"id": "T1098",
|
|
"url": "https://attack.mitre.org/techniques/T1098"
|
|
},
|
|
{
|
|
"name": "Mshta",
|
|
"id": "T1170",
|
|
"url": "https://attack.mitre.org/techniques/T1170"
|
|
},
|
|
{
|
|
"name": "Exfiltration Over Alternative Protocol",
|
|
"id": "T1048",
|
|
"url": "https://attack.mitre.org/techniques/T1048"
|
|
},
|
|
{
|
|
"name": "Kernel Modules and Extensions",
|
|
"id": "T1547.006",
|
|
"url": "https://attack.mitre.org/techniques/T1547/006"
|
|
},
|
|
{
|
|
"name": "Delay Execution",
|
|
"id": "T1678",
|
|
"url": "https://attack.mitre.org/techniques/T1678"
|
|
},
|
|
{
|
|
"name": "GUI Input Capture",
|
|
"id": "T1056.002",
|
|
"url": "https://attack.mitre.org/techniques/T1056/002"
|
|
},
|
|
{
|
|
"name": "Pass the Ticket",
|
|
"id": "T1097",
|
|
"url": "https://attack.mitre.org/techniques/T1097"
|
|
},
|
|
{
|
|
"name": "Tool",
|
|
"id": "T1588.002",
|
|
"url": "https://attack.mitre.org/techniques/T1588/002"
|
|
},
|
|
{
|
|
"name": "Exfiltration over USB",
|
|
"id": "T1052.001",
|
|
"url": "https://attack.mitre.org/techniques/T1052/001"
|
|
},
|
|
{
|
|
"name": "KernelCallbackTable",
|
|
"id": "T1574.013",
|
|
"url": "https://attack.mitre.org/techniques/T1574/013"
|
|
},
|
|
{
|
|
"name": "Search Closed Sources",
|
|
"id": "T1597",
|
|
"url": "https://attack.mitre.org/techniques/T1597"
|
|
},
|
|
{
|
|
"name": "Systemd Timers",
|
|
"id": "T1053.006",
|
|
"url": "https://attack.mitre.org/techniques/T1053/006"
|
|
},
|
|
{
|
|
"name": "Phishing",
|
|
"id": "T1566",
|
|
"url": "https://attack.mitre.org/techniques/T1566"
|
|
},
|
|
{
|
|
"name": "Graphical User Interface",
|
|
"id": "T1061",
|
|
"url": "https://attack.mitre.org/techniques/T1061"
|
|
},
|
|
{
|
|
"name": "ROMMONkit",
|
|
"id": "T1542.004",
|
|
"url": "https://attack.mitre.org/techniques/T1542/004"
|
|
},
|
|
{
|
|
"name": "Compiled HTML File",
|
|
"id": "T1218.001",
|
|
"url": "https://attack.mitre.org/techniques/T1218/001"
|
|
},
|
|
{
|
|
"name": "Compute Hijacking",
|
|
"id": "T1496.001",
|
|
"url": "https://attack.mitre.org/techniques/T1496/001"
|
|
},
|
|
{
|
|
"name": "Network Share Connection Removal",
|
|
"id": "T1070.005",
|
|
"url": "https://attack.mitre.org/techniques/T1070/005"
|
|
},
|
|
{
|
|
"name": "Multi-hop Proxy",
|
|
"id": "T1090.003",
|
|
"url": "https://attack.mitre.org/techniques/T1090/003"
|
|
},
|
|
{
|
|
"name": "Brute Force",
|
|
"id": "T1110",
|
|
"url": "https://attack.mitre.org/techniques/T1110"
|
|
},
|
|
{
|
|
"name": "Unix Shell",
|
|
"id": "T1059.004",
|
|
"url": "https://attack.mitre.org/techniques/T1059/004"
|
|
},
|
|
{
|
|
"name": "Outlook Forms",
|
|
"id": "T1137.003",
|
|
"url": "https://attack.mitre.org/techniques/T1137/003"
|
|
},
|
|
{
|
|
"name": "Remote Access Hardware",
|
|
"id": "T1219.003",
|
|
"url": "https://attack.mitre.org/techniques/T1219/003"
|
|
},
|
|
{
|
|
"name": "Dylib Hijacking",
|
|
"id": "T1157",
|
|
"url": "https://attack.mitre.org/techniques/T1157"
|
|
},
|
|
{
|
|
"name": "Disable or Modify Tools",
|
|
"id": "T1562.001",
|
|
"url": "https://attack.mitre.org/techniques/T1562/001"
|
|
},
|
|
{
|
|
"name": "Data Manipulation",
|
|
"id": "T1565",
|
|
"url": "https://attack.mitre.org/techniques/T1565"
|
|
},
|
|
{
|
|
"name": "Inter-Process Communication",
|
|
"id": "T1559",
|
|
"url": "https://attack.mitre.org/techniques/T1559"
|
|
},
|
|
{
|
|
"name": "Data Obfuscation",
|
|
"id": "T1001",
|
|
"url": "https://attack.mitre.org/techniques/T1001"
|
|
},
|
|
{
|
|
"name": "Data from Network Shared Drive",
|
|
"id": "T1039",
|
|
"url": "https://attack.mitre.org/techniques/T1039"
|
|
},
|
|
{
|
|
"name": "Web Services",
|
|
"id": "T1584.006",
|
|
"url": "https://attack.mitre.org/techniques/T1584/006"
|
|
},
|
|
{
|
|
"name": "Modify System Image",
|
|
"id": "T1601",
|
|
"url": "https://attack.mitre.org/techniques/T1601"
|
|
},
|
|
{
|
|
"name": "Hijack Execution Flow",
|
|
"id": "T1574",
|
|
"url": "https://attack.mitre.org/techniques/T1574"
|
|
},
|
|
{
|
|
"name": "Browser Fingerprint",
|
|
"id": "T1036.012",
|
|
"url": "https://attack.mitre.org/techniques/T1036/012"
|
|
},
|
|
{
|
|
"name": "Lua",
|
|
"id": "T1059.011",
|
|
"url": "https://attack.mitre.org/techniques/T1059/011"
|
|
},
|
|
{
|
|
"name": "Indicator Removal from Tools",
|
|
"id": "T1027.005",
|
|
"url": "https://attack.mitre.org/techniques/T1027/005"
|
|
},
|
|
{
|
|
"name": "Malicious Image",
|
|
"id": "T1204.003",
|
|
"url": "https://attack.mitre.org/techniques/T1204/003"
|
|
},
|
|
{
|
|
"name": "Container Service",
|
|
"id": "T1543.005",
|
|
"url": "https://attack.mitre.org/techniques/T1543/005"
|
|
},
|
|
{
|
|
"name": "Valid Accounts",
|
|
"id": "T1078",
|
|
"url": "https://attack.mitre.org/techniques/T1078"
|
|
},
|
|
{
|
|
"name": "Non-Standard Port",
|
|
"id": "T1571",
|
|
"url": "https://attack.mitre.org/techniques/T1571"
|
|
},
|
|
{
|
|
"name": "Social Media Accounts",
|
|
"id": "T1585.001",
|
|
"url": "https://attack.mitre.org/techniques/T1585/001"
|
|
},
|
|
{
|
|
"name": "DLL Side-Loading",
|
|
"id": "T1073",
|
|
"url": "https://attack.mitre.org/techniques/T1073"
|
|
},
|
|
{
|
|
"name": "Process Hollowing",
|
|
"id": "T1055.012",
|
|
"url": "https://attack.mitre.org/techniques/T1055/012"
|
|
},
|
|
{
|
|
"name": "Exploitation for Privilege Escalation",
|
|
"id": "T1068",
|
|
"url": "https://attack.mitre.org/techniques/T1068"
|
|
},
|
|
{
|
|
"name": "Resource Forking",
|
|
"id": "T1564.009",
|
|
"url": "https://attack.mitre.org/techniques/T1564/009"
|
|
},
|
|
{
|
|
"name": "Account Access Removal",
|
|
"id": "T1531",
|
|
"url": "https://attack.mitre.org/techniques/T1531"
|
|
},
|
|
{
|
|
"name": "Credential Stuffing",
|
|
"id": "T1110.004",
|
|
"url": "https://attack.mitre.org/techniques/T1110/004"
|
|
},
|
|
{
|
|
"name": "Kerberoasting",
|
|
"id": "T1208",
|
|
"url": "https://attack.mitre.org/techniques/T1208"
|
|
},
|
|
{
|
|
"name": "Obfuscated Files or Information",
|
|
"id": "T1027",
|
|
"url": "https://attack.mitre.org/techniques/T1027"
|
|
},
|
|
{
|
|
"name": "Multi-Factor Authentication",
|
|
"id": "T1556.006",
|
|
"url": "https://attack.mitre.org/techniques/T1556/006"
|
|
},
|
|
{
|
|
"name": "Remote Email Collection",
|
|
"id": "T1114.002",
|
|
"url": "https://attack.mitre.org/techniques/T1114/002"
|
|
},
|
|
{
|
|
"name": "IIS Components",
|
|
"id": "T1505.004",
|
|
"url": "https://attack.mitre.org/techniques/T1505/004"
|
|
},
|
|
{
|
|
"name": "Invalid Code Signature",
|
|
"id": "T1036.001",
|
|
"url": "https://attack.mitre.org/techniques/T1036/001"
|
|
},
|
|
{
|
|
"name": "Run Virtual Instance",
|
|
"id": "T1564.006",
|
|
"url": "https://attack.mitre.org/techniques/T1564/006"
|
|
},
|
|
{
|
|
"name": "Trap",
|
|
"id": "T1154",
|
|
"url": "https://attack.mitre.org/techniques/T1154"
|
|
},
|
|
{
|
|
"name": "Polymorphic Code",
|
|
"id": "T1027.014",
|
|
"url": "https://attack.mitre.org/techniques/T1027/014"
|
|
},
|
|
{
|
|
"name": "Password Policy Discovery",
|
|
"id": "T1201",
|
|
"url": "https://attack.mitre.org/techniques/T1201"
|
|
},
|
|
{
|
|
"name": "Event Triggered Execution",
|
|
"id": "T1546",
|
|
"url": "https://attack.mitre.org/techniques/T1546"
|
|
},
|
|
{
|
|
"name": "Unix Shell Configuration Modification",
|
|
"id": "T1546.004",
|
|
"url": "https://attack.mitre.org/techniques/T1546/004"
|
|
},
|
|
{
|
|
"name": "Forced Authentication",
|
|
"id": "T1187",
|
|
"url": "https://attack.mitre.org/techniques/T1187"
|
|
},
|
|
{
|
|
"name": "SID-History Injection",
|
|
"id": "T1134.005",
|
|
"url": "https://attack.mitre.org/techniques/T1134/005"
|
|
},
|
|
{
|
|
"name": "Network Boundary Bridging",
|
|
"id": "T1599",
|
|
"url": "https://attack.mitre.org/techniques/T1599"
|
|
},
|
|
{
|
|
"name": "Data Encrypted for Impact",
|
|
"id": "T1486",
|
|
"url": "https://attack.mitre.org/techniques/T1486"
|
|
},
|
|
{
|
|
"name": "Disk Content Wipe",
|
|
"id": "T1488",
|
|
"url": "https://attack.mitre.org/techniques/T1488"
|
|
},
|
|
{
|
|
"name": "Subvert Trust Controls",
|
|
"id": "T1553",
|
|
"url": "https://attack.mitre.org/techniques/T1553"
|
|
},
|
|
{
|
|
"name": "Elevated Execution with Prompt",
|
|
"id": "T1548.004",
|
|
"url": "https://attack.mitre.org/techniques/T1548/004"
|
|
},
|
|
{
|
|
"name": "Firmware",
|
|
"id": "T1592.003",
|
|
"url": "https://attack.mitre.org/techniques/T1592/003"
|
|
},
|
|
{
|
|
"name": "Encrypted Channel",
|
|
"id": "T1573",
|
|
"url": "https://attack.mitre.org/techniques/T1573"
|
|
},
|
|
{
|
|
"name": "Password Filter DLL",
|
|
"id": "T1174",
|
|
"url": "https://attack.mitre.org/techniques/T1174"
|
|
},
|
|
{
|
|
"name": "Authentication Package",
|
|
"id": "T1547.002",
|
|
"url": "https://attack.mitre.org/techniques/T1547/002"
|
|
},
|
|
{
|
|
"name": "Regsvr32",
|
|
"id": "T1218.010",
|
|
"url": "https://attack.mitre.org/techniques/T1218/010"
|
|
},
|
|
{
|
|
"name": "Data Compressed",
|
|
"id": "T1002",
|
|
"url": "https://attack.mitre.org/techniques/T1002"
|
|
},
|
|
{
|
|
"name": "Exfiltration to Text Storage Sites",
|
|
"id": "T1567.003",
|
|
"url": "https://attack.mitre.org/techniques/T1567/003"
|
|
},
|
|
{
|
|
"name": "Credentials in Files",
|
|
"id": "T1081",
|
|
"url": "https://attack.mitre.org/techniques/T1081"
|
|
},
|
|
{
|
|
"name": "Software",
|
|
"id": "T1592.002",
|
|
"url": "https://attack.mitre.org/techniques/T1592/002"
|
|
},
|
|
{
|
|
"name": "Netsh Helper DLL",
|
|
"id": "T1128",
|
|
"url": "https://attack.mitre.org/techniques/T1128"
|
|
},
|
|
{
|
|
"name": "Input Capture",
|
|
"id": "T1056",
|
|
"url": "https://attack.mitre.org/techniques/T1056"
|
|
},
|
|
{
|
|
"name": "Spearphishing Voice",
|
|
"id": "T1566.004",
|
|
"url": "https://attack.mitre.org/techniques/T1566/004"
|
|
},
|
|
{
|
|
"name": "Exploits",
|
|
"id": "T1587.004",
|
|
"url": "https://attack.mitre.org/techniques/T1587/004"
|
|
},
|
|
{
|
|
"name": "Social Media",
|
|
"id": "T1593.001",
|
|
"url": "https://attack.mitre.org/techniques/T1593/001"
|
|
},
|
|
{
|
|
"name": "Customer Relationship Management Software",
|
|
"id": "T1213.004",
|
|
"url": "https://attack.mitre.org/techniques/T1213/004"
|
|
},
|
|
{
|
|
"name": "Component Object Model Hijacking",
|
|
"id": "T1546.015",
|
|
"url": "https://attack.mitre.org/techniques/T1546/015"
|
|
},
|
|
{
|
|
"name": "Credentials",
|
|
"id": "T1589.001",
|
|
"url": "https://attack.mitre.org/techniques/T1589/001"
|
|
},
|
|
{
|
|
"name": "Compromise Software Supply Chain",
|
|
"id": "T1195.002",
|
|
"url": "https://attack.mitre.org/techniques/T1195/002"
|
|
},
|
|
{
|
|
"name": "Rename Legitimate Utilities",
|
|
"id": "T1036.003",
|
|
"url": "https://attack.mitre.org/techniques/T1036/003"
|
|
},
|
|
{
|
|
"name": "Bidirectional Communication",
|
|
"id": "T1102.002",
|
|
"url": "https://attack.mitre.org/techniques/T1102/002"
|
|
},
|
|
{
|
|
"name": "Exploitation for Client Execution",
|
|
"id": "T1203",
|
|
"url": "https://attack.mitre.org/techniques/T1203"
|
|
},
|
|
{
|
|
"name": "Wordlist Scanning",
|
|
"id": "T1595.003",
|
|
"url": "https://attack.mitre.org/techniques/T1595/003"
|
|
},
|
|
{
|
|
"name": "Email Bombing",
|
|
"id": "T1667",
|
|
"url": "https://attack.mitre.org/techniques/T1667"
|
|
},
|
|
{
|
|
"name": "Spoof Security Alerting",
|
|
"id": "T1562.011",
|
|
"url": "https://attack.mitre.org/techniques/T1562/011"
|
|
},
|
|
{
|
|
"name": "Outlook Home Page",
|
|
"id": "T1137.004",
|
|
"url": "https://attack.mitre.org/techniques/T1137/004"
|
|
},
|
|
{
|
|
"name": "Asymmetric Cryptography",
|
|
"id": "T1573.002",
|
|
"url": "https://attack.mitre.org/techniques/T1573/002"
|
|
},
|
|
{
|
|
"name": "Exfiltration to Cloud Storage",
|
|
"id": "T1567.002",
|
|
"url": "https://attack.mitre.org/techniques/T1567/002"
|
|
},
|
|
{
|
|
"name": "Lateral Tool Transfer",
|
|
"id": "T1570",
|
|
"url": "https://attack.mitre.org/techniques/T1570"
|
|
},
|
|
{
|
|
"name": "Path Interception by Unquoted Path",
|
|
"id": "T1574.009",
|
|
"url": "https://attack.mitre.org/techniques/T1574/009"
|
|
},
|
|
{
|
|
"name": "Install Digital Certificate",
|
|
"id": "T1608.003",
|
|
"url": "https://attack.mitre.org/techniques/T1608/003"
|
|
},
|
|
{
|
|
"name": "Local Job Scheduling",
|
|
"id": "T1168",
|
|
"url": "https://attack.mitre.org/techniques/T1168"
|
|
},
|
|
{
|
|
"name": "Setuid and Setgid",
|
|
"id": "T1166",
|
|
"url": "https://attack.mitre.org/techniques/T1166"
|
|
},
|
|
{
|
|
"name": "Startup Items",
|
|
"id": "T1037.005",
|
|
"url": "https://attack.mitre.org/techniques/T1037/005"
|
|
},
|
|
{
|
|
"name": "Web Shell",
|
|
"id": "T1100",
|
|
"url": "https://attack.mitre.org/techniques/T1100"
|
|
},
|
|
{
|
|
"name": "Process Doppelgänging",
|
|
"id": "T1186",
|
|
"url": "https://attack.mitre.org/techniques/T1186"
|
|
},
|
|
{
|
|
"name": "SSH Hijacking",
|
|
"id": "T1184",
|
|
"url": "https://attack.mitre.org/techniques/T1184"
|
|
},
|
|
{
|
|
"name": "System Language Discovery",
|
|
"id": "T1614.001",
|
|
"url": "https://attack.mitre.org/techniques/T1614/001"
|
|
},
|
|
{
|
|
"name": "Non-Application Layer Protocol",
|
|
"id": "T1095",
|
|
"url": "https://attack.mitre.org/techniques/T1095"
|
|
},
|
|
{
|
|
"name": "Pass the Hash",
|
|
"id": "T1075",
|
|
"url": "https://attack.mitre.org/techniques/T1075"
|
|
},
|
|
{
|
|
"name": "Container CLI/API",
|
|
"id": "T1059.013",
|
|
"url": "https://attack.mitre.org/techniques/T1059/013"
|
|
},
|
|
{
|
|
"name": "Steganography",
|
|
"id": "T1027.003",
|
|
"url": "https://attack.mitre.org/techniques/T1027/003"
|
|
},
|
|
{
|
|
"name": "DNS Server",
|
|
"id": "T1584.002",
|
|
"url": "https://attack.mitre.org/techniques/T1584/002"
|
|
},
|
|
{
|
|
"name": "Cloud Application Integration",
|
|
"id": "T1671",
|
|
"url": "https://attack.mitre.org/techniques/T1671"
|
|
},
|
|
{
|
|
"name": "Protocol or Service Impersonation",
|
|
"id": "T1001.003",
|
|
"url": "https://attack.mitre.org/techniques/T1001/003"
|
|
},
|
|
{
|
|
"name": "Query Registry",
|
|
"id": "T1012",
|
|
"url": "https://attack.mitre.org/techniques/T1012"
|
|
},
|
|
{
|
|
"name": "Data Transfer Size Limits",
|
|
"id": "T1030",
|
|
"url": "https://attack.mitre.org/techniques/T1030"
|
|
},
|
|
{
|
|
"name": "Windows Remote Management",
|
|
"id": "T1028",
|
|
"url": "https://attack.mitre.org/techniques/T1028"
|
|
},
|
|
{
|
|
"name": "Web Session Cookie",
|
|
"id": "T1550.004",
|
|
"url": "https://attack.mitre.org/techniques/T1550/004"
|
|
},
|
|
{
|
|
"name": "Domain Accounts",
|
|
"id": "T1078.002",
|
|
"url": "https://attack.mitre.org/techniques/T1078/002"
|
|
},
|
|
{
|
|
"name": "Regsvcs/Regasm",
|
|
"id": "T1218.009",
|
|
"url": "https://attack.mitre.org/techniques/T1218/009"
|
|
},
|
|
{
|
|
"name": "Path Interception",
|
|
"id": "T1034",
|
|
"url": "https://attack.mitre.org/techniques/T1034"
|
|
},
|
|
{
|
|
"name": "Python Startup Hooks",
|
|
"id": "T1546.018",
|
|
"url": "https://attack.mitre.org/techniques/T1546/018"
|
|
},
|
|
{
|
|
"name": "Web Session Cookie",
|
|
"id": "T1506",
|
|
"url": "https://attack.mitre.org/techniques/T1506"
|
|
},
|
|
{
|
|
"name": "Install Root Certificate",
|
|
"id": "T1553.004",
|
|
"url": "https://attack.mitre.org/techniques/T1553/004"
|
|
},
|
|
{
|
|
"name": "Network Logon Script",
|
|
"id": "T1037.003",
|
|
"url": "https://attack.mitre.org/techniques/T1037/003"
|
|
},
|
|
{
|
|
"name": "Endpoint Denial of Service",
|
|
"id": "T1499",
|
|
"url": "https://attack.mitre.org/techniques/T1499"
|
|
},
|
|
{
|
|
"name": "Compile After Delivery",
|
|
"id": "T1027.004",
|
|
"url": "https://attack.mitre.org/techniques/T1027/004"
|
|
},
|
|
{
|
|
"name": "Uncommonly Used Port",
|
|
"id": "T1065",
|
|
"url": "https://attack.mitre.org/techniques/T1065"
|
|
},
|
|
{
|
|
"name": "System Location Discovery",
|
|
"id": "T1614",
|
|
"url": "https://attack.mitre.org/techniques/T1614"
|
|
},
|
|
{
|
|
"name": "VBA Stomping",
|
|
"id": "T1564.007",
|
|
"url": "https://attack.mitre.org/techniques/T1564/007"
|
|
},
|
|
{
|
|
"name": "BITS Jobs",
|
|
"id": "T1197",
|
|
"url": "https://attack.mitre.org/techniques/T1197"
|
|
},
|
|
{
|
|
"name": "MSBuild",
|
|
"id": "T1127.001",
|
|
"url": "https://attack.mitre.org/techniques/T1127/001"
|
|
},
|
|
{
|
|
"name": "Impersonation",
|
|
"id": "T1656",
|
|
"url": "https://attack.mitre.org/techniques/T1656"
|
|
},
|
|
{
|
|
"name": "Modify Cloud Compute Configurations",
|
|
"id": "T1578.005",
|
|
"url": "https://attack.mitre.org/techniques/T1578/005"
|
|
},
|
|
{
|
|
"name": "Bypass User Account Control",
|
|
"id": "T1088",
|
|
"url": "https://attack.mitre.org/techniques/T1088"
|
|
},
|
|
{
|
|
"name": "Runtime Data Manipulation",
|
|
"id": "T1494",
|
|
"url": "https://attack.mitre.org/techniques/T1494"
|
|
},
|
|
{
|
|
"name": "Domain Fronting",
|
|
"id": "T1090.004",
|
|
"url": "https://attack.mitre.org/techniques/T1090/004"
|
|
},
|
|
{
|
|
"name": "ARP Cache Poisoning",
|
|
"id": "T1557.002",
|
|
"url": "https://attack.mitre.org/techniques/T1557/002"
|
|
},
|
|
{
|
|
"name": "Disable or Modify Cloud Logs",
|
|
"id": "T1562.008",
|
|
"url": "https://attack.mitre.org/techniques/T1562/008"
|
|
},
|
|
{
|
|
"name": "Security Software Discovery",
|
|
"id": "T1518.001",
|
|
"url": "https://attack.mitre.org/techniques/T1518/001"
|
|
},
|
|
{
|
|
"name": "Hidden Window",
|
|
"id": "T1564.003",
|
|
"url": "https://attack.mitre.org/techniques/T1564/003"
|
|
},
|
|
{
|
|
"name": "Transmitted Data Manipulation",
|
|
"id": "T1493",
|
|
"url": "https://attack.mitre.org/techniques/T1493"
|
|
},
|
|
{
|
|
"name": "ClickOnce",
|
|
"id": "T1127.002",
|
|
"url": "https://attack.mitre.org/techniques/T1127/002"
|
|
},
|
|
{
|
|
"name": "Python",
|
|
"id": "T1059.006",
|
|
"url": "https://attack.mitre.org/techniques/T1059/006"
|
|
},
|
|
{
|
|
"name": "Relocate Malware",
|
|
"id": "T1070.010",
|
|
"url": "https://attack.mitre.org/techniques/T1070/010"
|
|
},
|
|
{
|
|
"name": "Identify Roles",
|
|
"id": "T1591.004",
|
|
"url": "https://attack.mitre.org/techniques/T1591/004"
|
|
},
|
|
{
|
|
"name": "Data Encoding",
|
|
"id": "T1132",
|
|
"url": "https://attack.mitre.org/techniques/T1132"
|
|
},
|
|
{
|
|
"name": "AppInit DLLs",
|
|
"id": "T1546.010",
|
|
"url": "https://attack.mitre.org/techniques/T1546/010"
|
|
},
|
|
{
|
|
"name": "Phishing for Information",
|
|
"id": "T1598",
|
|
"url": "https://attack.mitre.org/techniques/T1598"
|
|
},
|
|
{
|
|
"name": "Resource Hijacking",
|
|
"id": "T1496",
|
|
"url": "https://attack.mitre.org/techniques/T1496"
|
|
},
|
|
{
|
|
"name": "Establish Accounts",
|
|
"id": "T1585",
|
|
"url": "https://attack.mitre.org/techniques/T1585"
|
|
},
|
|
{
|
|
"name": "Obtain Capabilities",
|
|
"id": "T1588",
|
|
"url": "https://attack.mitre.org/techniques/T1588"
|
|
},
|
|
{
|
|
"name": "Screensaver",
|
|
"id": "T1546.002",
|
|
"url": "https://attack.mitre.org/techniques/T1546/002"
|
|
},
|
|
{
|
|
"name": "Hidden Users",
|
|
"id": "T1147",
|
|
"url": "https://attack.mitre.org/techniques/T1147"
|
|
},
|
|
{
|
|
"name": "Conditional Access Policies",
|
|
"id": "T1556.009",
|
|
"url": "https://attack.mitre.org/techniques/T1556/009"
|
|
},
|
|
{
|
|
"name": "Create Cloud Instance",
|
|
"id": "T1578.002",
|
|
"url": "https://attack.mitre.org/techniques/T1578/002"
|
|
},
|
|
{
|
|
"name": "Compile After Delivery",
|
|
"id": "T1500",
|
|
"url": "https://attack.mitre.org/techniques/T1500"
|
|
},
|
|
{
|
|
"name": "Cloud Secrets Management Stores",
|
|
"id": "T1555.006",
|
|
"url": "https://attack.mitre.org/techniques/T1555/006"
|
|
},
|
|
{
|
|
"name": "Code Repositories",
|
|
"id": "T1213.003",
|
|
"url": "https://attack.mitre.org/techniques/T1213/003"
|
|
},
|
|
{
|
|
"name": "Transmitted Data Manipulation",
|
|
"id": "T1565.002",
|
|
"url": "https://attack.mitre.org/techniques/T1565/002"
|
|
},
|
|
{
|
|
"name": "/etc/passwd and /etc/shadow",
|
|
"id": "T1003.008",
|
|
"url": "https://attack.mitre.org/techniques/T1003/008"
|
|
},
|
|
{
|
|
"name": "Launch Agent",
|
|
"id": "T1543.001",
|
|
"url": "https://attack.mitre.org/techniques/T1543/001"
|
|
},
|
|
{
|
|
"name": "System Services",
|
|
"id": "T1569",
|
|
"url": "https://attack.mitre.org/techniques/T1569"
|
|
},
|
|
{
|
|
"name": "Windows Command Shell",
|
|
"id": "T1059.003",
|
|
"url": "https://attack.mitre.org/techniques/T1059/003"
|
|
},
|
|
{
|
|
"name": "Proc Memory",
|
|
"id": "T1055.009",
|
|
"url": "https://attack.mitre.org/techniques/T1055/009"
|
|
},
|
|
{
|
|
"name": "Compiled HTML File",
|
|
"id": "T1223",
|
|
"url": "https://attack.mitre.org/techniques/T1223"
|
|
},
|
|
{
|
|
"name": "Acquire Access",
|
|
"id": "T1650",
|
|
"url": "https://attack.mitre.org/techniques/T1650"
|
|
},
|
|
{
|
|
"name": "Patch System Image",
|
|
"id": "T1601.001",
|
|
"url": "https://attack.mitre.org/techniques/T1601/001"
|
|
},
|
|
{
|
|
"name": "Silver Ticket",
|
|
"id": "T1558.002",
|
|
"url": "https://attack.mitre.org/techniques/T1558/002"
|
|
},
|
|
{
|
|
"name": "Data from Information Repositories",
|
|
"id": "T1213",
|
|
"url": "https://attack.mitre.org/techniques/T1213"
|
|
},
|
|
{
|
|
"name": "Clear Persistence",
|
|
"id": "T1070.009",
|
|
"url": "https://attack.mitre.org/techniques/T1070/009"
|
|
},
|
|
{
|
|
"name": "Hypervisor CLI",
|
|
"id": "T1059.012",
|
|
"url": "https://attack.mitre.org/techniques/T1059/012"
|
|
},
|
|
{
|
|
"name": "Clear Command History",
|
|
"id": "T1146",
|
|
"url": "https://attack.mitre.org/techniques/T1146"
|
|
},
|
|
{
|
|
"name": "Windows Credential Manager",
|
|
"id": "T1555.004",
|
|
"url": "https://attack.mitre.org/techniques/T1555/004"
|
|
},
|
|
{
|
|
"name": "Masquerade Account Name",
|
|
"id": "T1036.010",
|
|
"url": "https://attack.mitre.org/techniques/T1036/010"
|
|
},
|
|
{
|
|
"name": "Emond",
|
|
"id": "T1519",
|
|
"url": "https://attack.mitre.org/techniques/T1519"
|
|
},
|
|
{
|
|
"name": "Spearphishing via Service",
|
|
"id": "T1194",
|
|
"url": "https://attack.mitre.org/techniques/T1194"
|
|
},
|
|
{
|
|
"name": "Hardware Additions",
|
|
"id": "T1200",
|
|
"url": "https://attack.mitre.org/techniques/T1200"
|
|
},
|
|
{
|
|
"name": "Remote Desktop Software",
|
|
"id": "T1219.002",
|
|
"url": "https://attack.mitre.org/techniques/T1219/002"
|
|
},
|
|
{
|
|
"name": "Server Software Component",
|
|
"id": "T1505",
|
|
"url": "https://attack.mitre.org/techniques/T1505"
|
|
},
|
|
{
|
|
"name": "Data Destruction",
|
|
"id": "T1485",
|
|
"url": "https://attack.mitre.org/techniques/T1485"
|
|
},
|
|
{
|
|
"name": "Non-Standard Encoding",
|
|
"id": "T1132.002",
|
|
"url": "https://attack.mitre.org/techniques/T1132/002"
|
|
},
|
|
{
|
|
"name": "Domain Controller Authentication",
|
|
"id": "T1556.001",
|
|
"url": "https://attack.mitre.org/techniques/T1556/001"
|
|
},
|
|
{
|
|
"name": "Transfer Data to Cloud Account",
|
|
"id": "T1537",
|
|
"url": "https://attack.mitre.org/techniques/T1537"
|
|
},
|
|
{
|
|
"name": "HTML Smuggling",
|
|
"id": "T1027.006",
|
|
"url": "https://attack.mitre.org/techniques/T1027/006"
|
|
},
|
|
{
|
|
"name": "Reversible Encryption",
|
|
"id": "T1556.005",
|
|
"url": "https://attack.mitre.org/techniques/T1556/005"
|
|
},
|
|
{
|
|
"name": "Command Obfuscation",
|
|
"id": "T1027.010",
|
|
"url": "https://attack.mitre.org/techniques/T1027/010"
|
|
},
|
|
{
|
|
"name": "Install Root Certificate",
|
|
"id": "T1130",
|
|
"url": "https://attack.mitre.org/techniques/T1130"
|
|
},
|
|
{
|
|
"name": "Data Encrypted",
|
|
"id": "T1022",
|
|
"url": "https://attack.mitre.org/techniques/T1022"
|
|
},
|
|
{
|
|
"name": "File Deletion",
|
|
"id": "T1070.004",
|
|
"url": "https://attack.mitre.org/techniques/T1070/004"
|
|
},
|
|
{
|
|
"name": "Drive-by Compromise",
|
|
"id": "T1189",
|
|
"url": "https://attack.mitre.org/techniques/T1189"
|
|
},
|
|
{
|
|
"name": "Network Denial of Service",
|
|
"id": "T1498",
|
|
"url": "https://attack.mitre.org/techniques/T1498"
|
|
},
|
|
{
|
|
"name": "Cloud Administration Command",
|
|
"id": "T1651",
|
|
"url": "https://attack.mitre.org/techniques/T1651"
|
|
},
|
|
{
|
|
"name": "Installer Packages",
|
|
"id": "T1546.016",
|
|
"url": "https://attack.mitre.org/techniques/T1546/016"
|
|
},
|
|
{
|
|
"name": "Scanning IP Blocks",
|
|
"id": "T1595.001",
|
|
"url": "https://attack.mitre.org/techniques/T1595/001"
|
|
},
|
|
{
|
|
"name": "Hidden Files and Directories",
|
|
"id": "T1158",
|
|
"url": "https://attack.mitre.org/techniques/T1158"
|
|
},
|
|
{
|
|
"name": "Template Injection",
|
|
"id": "T1221",
|
|
"url": "https://attack.mitre.org/techniques/T1221"
|
|
},
|
|
{
|
|
"name": "RC Scripts",
|
|
"id": "T1037.004",
|
|
"url": "https://attack.mitre.org/techniques/T1037/004"
|
|
},
|
|
{
|
|
"name": "Access Token Manipulation",
|
|
"id": "T1134",
|
|
"url": "https://attack.mitre.org/techniques/T1134"
|
|
},
|
|
{
|
|
"name": "Time Providers",
|
|
"id": "T1209",
|
|
"url": "https://attack.mitre.org/techniques/T1209"
|
|
},
|
|
{
|
|
"name": "Multi-Factor Authentication Interception",
|
|
"id": "T1111",
|
|
"url": "https://attack.mitre.org/techniques/T1111"
|
|
},
|
|
{
|
|
"name": "Launch Agent",
|
|
"id": "T1159",
|
|
"url": "https://attack.mitre.org/techniques/T1159"
|
|
},
|
|
{
|
|
"name": "Software Packing",
|
|
"id": "T1027.002",
|
|
"url": "https://attack.mitre.org/techniques/T1027/002"
|
|
},
|
|
{
|
|
"name": "Serverless",
|
|
"id": "T1584.007",
|
|
"url": "https://attack.mitre.org/techniques/T1584/007"
|
|
},
|
|
{
|
|
"name": "Web Protocols",
|
|
"id": "T1071.001",
|
|
"url": "https://attack.mitre.org/techniques/T1071/001"
|
|
},
|
|
{
|
|
"name": "Visual Basic",
|
|
"id": "T1059.005",
|
|
"url": "https://attack.mitre.org/techniques/T1059/005"
|
|
},
|
|
{
|
|
"name": "Hidden File System",
|
|
"id": "T1564.005",
|
|
"url": "https://attack.mitre.org/techniques/T1564/005"
|
|
},
|
|
{
|
|
"name": "Systemd Service",
|
|
"id": "T1543.002",
|
|
"url": "https://attack.mitre.org/techniques/T1543/002"
|
|
},
|
|
{
|
|
"name": "Exclusive Control",
|
|
"id": "T1668",
|
|
"url": "https://attack.mitre.org/techniques/T1668"
|
|
},
|
|
{
|
|
"name": "RDP Hijacking",
|
|
"id": "T1563.002",
|
|
"url": "https://attack.mitre.org/techniques/T1563/002"
|
|
},
|
|
{
|
|
"name": "Create Account",
|
|
"id": "T1136",
|
|
"url": "https://attack.mitre.org/techniques/T1136"
|
|
},
|
|
{
|
|
"name": "XDG Autostart Entries",
|
|
"id": "T1547.013",
|
|
"url": "https://attack.mitre.org/techniques/T1547/013"
|
|
},
|
|
{
|
|
"name": "Server",
|
|
"id": "T1584.004",
|
|
"url": "https://attack.mitre.org/techniques/T1584/004"
|
|
},
|
|
{
|
|
"name": "Email Spoofing",
|
|
"id": "T1672",
|
|
"url": "https://attack.mitre.org/techniques/T1672"
|
|
},
|
|
{
|
|
"name": "Cloud Service Discovery",
|
|
"id": "T1526",
|
|
"url": "https://attack.mitre.org/techniques/T1526"
|
|
},
|
|
{
|
|
"name": "Malicious Copy and Paste",
|
|
"id": "T1204.004",
|
|
"url": "https://attack.mitre.org/techniques/T1204/004"
|
|
},
|
|
{
|
|
"name": "Space after Filename",
|
|
"id": "T1151",
|
|
"url": "https://attack.mitre.org/techniques/T1151"
|
|
},
|
|
{
|
|
"name": "Remote System Discovery",
|
|
"id": "T1018",
|
|
"url": "https://attack.mitre.org/techniques/T1018"
|
|
},
|
|
{
|
|
"name": "Network Service Discovery",
|
|
"id": "T1046",
|
|
"url": "https://attack.mitre.org/techniques/T1046"
|
|
},
|
|
{
|
|
"name": "Domain Properties",
|
|
"id": "T1590.001",
|
|
"url": "https://attack.mitre.org/techniques/T1590/001"
|
|
},
|
|
{
|
|
"name": "Software Discovery",
|
|
"id": "T1518",
|
|
"url": "https://attack.mitre.org/techniques/T1518"
|
|
},
|
|
{
|
|
"name": "Cloud Service Dashboard",
|
|
"id": "T1538",
|
|
"url": "https://attack.mitre.org/techniques/T1538"
|
|
},
|
|
{
|
|
"name": "Thread Local Storage",
|
|
"id": "T1055.005",
|
|
"url": "https://attack.mitre.org/techniques/T1055/005"
|
|
},
|
|
{
|
|
"name": "Debugger Evasion",
|
|
"id": "T1622",
|
|
"url": "https://attack.mitre.org/techniques/T1622"
|
|
},
|
|
{
|
|
"name": "Space after Filename",
|
|
"id": "T1036.006",
|
|
"url": "https://attack.mitre.org/techniques/T1036/006"
|
|
},
|
|
{
|
|
"name": "Re-opened Applications",
|
|
"id": "T1547.007",
|
|
"url": "https://attack.mitre.org/techniques/T1547/007"
|
|
},
|
|
{
|
|
"name": "SEO Poisoning",
|
|
"id": "T1608.006",
|
|
"url": "https://attack.mitre.org/techniques/T1608/006"
|
|
},
|
|
{
|
|
"name": "Pass the Hash",
|
|
"id": "T1550.002",
|
|
"url": "https://attack.mitre.org/techniques/T1550/002"
|
|
},
|
|
{
|
|
"name": "Exfiltration Over Physical Medium",
|
|
"id": "T1052",
|
|
"url": "https://attack.mitre.org/techniques/T1052"
|
|
},
|
|
{
|
|
"name": "DLL Side-Loading",
|
|
"id": "T1574.002",
|
|
"url": "https://attack.mitre.org/techniques/T1574/002"
|
|
},
|
|
{
|
|
"name": "Ingress Tool Transfer",
|
|
"id": "T1105",
|
|
"url": "https://attack.mitre.org/techniques/T1105"
|
|
},
|
|
{
|
|
"name": "SyncAppvPublishingServer",
|
|
"id": "T1216.002",
|
|
"url": "https://attack.mitre.org/techniques/T1216/002"
|
|
},
|
|
{
|
|
"name": "Additional Email Delegate Permissions",
|
|
"id": "T1098.002",
|
|
"url": "https://attack.mitre.org/techniques/T1098/002"
|
|
},
|
|
{
|
|
"name": "Code Signing Certificates",
|
|
"id": "T1588.003",
|
|
"url": "https://attack.mitre.org/techniques/T1588/003"
|
|
},
|
|
{
|
|
"name": "Network Share Connection Removal",
|
|
"id": "T1126",
|
|
"url": "https://attack.mitre.org/techniques/T1126"
|
|
},
|
|
{
|
|
"name": "Serverless Execution",
|
|
"id": "T1648",
|
|
"url": "https://attack.mitre.org/techniques/T1648"
|
|
},
|
|
{
|
|
"name": "TCC Manipulation",
|
|
"id": "T1548.006",
|
|
"url": "https://attack.mitre.org/techniques/T1548/006"
|
|
},
|
|
{
|
|
"name": "Windows Management Instrumentation Event Subscription",
|
|
"id": "T1084",
|
|
"url": "https://attack.mitre.org/techniques/T1084"
|
|
},
|
|
{
|
|
"name": "Launch Daemon",
|
|
"id": "T1160",
|
|
"url": "https://attack.mitre.org/techniques/T1160"
|
|
},
|
|
{
|
|
"name": "Ptrace System Calls",
|
|
"id": "T1055.008",
|
|
"url": "https://attack.mitre.org/techniques/T1055/008"
|
|
},
|
|
{
|
|
"name": "Power Settings",
|
|
"id": "T1653",
|
|
"url": "https://attack.mitre.org/techniques/T1653"
|
|
},
|
|
{
|
|
"name": "Dynamic API Resolution",
|
|
"id": "T1027.007",
|
|
"url": "https://attack.mitre.org/techniques/T1027/007"
|
|
},
|
|
{
|
|
"name": "Remote Desktop Protocol",
|
|
"id": "T1021.001",
|
|
"url": "https://attack.mitre.org/techniques/T1021/001"
|
|
},
|
|
{
|
|
"name": "Logon Script (Windows)",
|
|
"id": "T1037.001",
|
|
"url": "https://attack.mitre.org/techniques/T1037/001"
|
|
},
|
|
{
|
|
"name": "ListPlanting",
|
|
"id": "T1055.015",
|
|
"url": "https://attack.mitre.org/techniques/T1055/015"
|
|
},
|
|
{
|
|
"name": "Hide Infrastructure",
|
|
"id": "T1665",
|
|
"url": "https://attack.mitre.org/techniques/T1665"
|
|
},
|
|
{
|
|
"name": "Domain or Tenant Policy Modification",
|
|
"id": "T1484",
|
|
"url": "https://attack.mitre.org/techniques/T1484"
|
|
},
|
|
{
|
|
"name": "XSL Script Processing",
|
|
"id": "T1220",
|
|
"url": "https://attack.mitre.org/techniques/T1220"
|
|
},
|
|
{
|
|
"name": "Scan Databases",
|
|
"id": "T1596.005",
|
|
"url": "https://attack.mitre.org/techniques/T1596/005"
|
|
},
|
|
{
|
|
"name": "Hidden Files and Directories",
|
|
"id": "T1564.001",
|
|
"url": "https://attack.mitre.org/techniques/T1564/001"
|
|
},
|
|
{
|
|
"name": "Create Snapshot",
|
|
"id": "T1578.001",
|
|
"url": "https://attack.mitre.org/techniques/T1578/001"
|
|
},
|
|
{
|
|
"name": "Determine Physical Locations",
|
|
"id": "T1591.001",
|
|
"url": "https://attack.mitre.org/techniques/T1591/001"
|
|
},
|
|
{
|
|
"name": "Office Test",
|
|
"id": "T1137.002",
|
|
"url": "https://attack.mitre.org/techniques/T1137/002"
|
|
},
|
|
{
|
|
"name": "Develop Capabilities",
|
|
"id": "T1587",
|
|
"url": "https://attack.mitre.org/techniques/T1587"
|
|
},
|
|
{
|
|
"name": "Dynamic Data Exchange",
|
|
"id": "T1173",
|
|
"url": "https://attack.mitre.org/techniques/T1173"
|
|
},
|
|
{
|
|
"name": "NTDS",
|
|
"id": "T1003.003",
|
|
"url": "https://attack.mitre.org/techniques/T1003/003"
|
|
},
|
|
{
|
|
"name": "SNMP (MIB Dump)",
|
|
"id": "T1602.001",
|
|
"url": "https://attack.mitre.org/techniques/T1602/001"
|
|
},
|
|
{
|
|
"name": "Steganography",
|
|
"id": "T1001.002",
|
|
"url": "https://attack.mitre.org/techniques/T1001/002"
|
|
},
|
|
{
|
|
"name": "Malicious Link",
|
|
"id": "T1204.001",
|
|
"url": "https://attack.mitre.org/techniques/T1204/001"
|
|
},
|
|
{
|
|
"name": "Application Access Token",
|
|
"id": "T1550.001",
|
|
"url": "https://attack.mitre.org/techniques/T1550/001"
|
|
},
|
|
{
|
|
"name": "LSASS Driver",
|
|
"id": "T1547.008",
|
|
"url": "https://attack.mitre.org/techniques/T1547/008"
|
|
},
|
|
{
|
|
"name": "Service Execution",
|
|
"id": "T1569.002",
|
|
"url": "https://attack.mitre.org/techniques/T1569/002"
|
|
},
|
|
{
|
|
"name": "Cloud Accounts",
|
|
"id": "T1078.004",
|
|
"url": "https://attack.mitre.org/techniques/T1078/004"
|
|
},
|
|
{
|
|
"name": "Environmental Keying",
|
|
"id": "T1480.001",
|
|
"url": "https://attack.mitre.org/techniques/T1480/001"
|
|
},
|
|
{
|
|
"name": "Fallback Channels",
|
|
"id": "T1008",
|
|
"url": "https://attack.mitre.org/techniques/T1008"
|
|
},
|
|
{
|
|
"name": "Local Storage Discovery",
|
|
"id": "T1680",
|
|
"url": "https://attack.mitre.org/techniques/T1680"
|
|
},
|
|
{
|
|
"name": "NTFS File Attributes",
|
|
"id": "T1564.004",
|
|
"url": "https://attack.mitre.org/techniques/T1564/004"
|
|
},
|
|
{
|
|
"name": "Kerberoasting",
|
|
"id": "T1558.003",
|
|
"url": "https://attack.mitre.org/techniques/T1558/003"
|
|
},
|
|
{
|
|
"name": "NTFS File Attributes",
|
|
"id": "T1096",
|
|
"url": "https://attack.mitre.org/techniques/T1096"
|
|
},
|
|
{
|
|
"name": "DCSync",
|
|
"id": "T1003.006",
|
|
"url": "https://attack.mitre.org/techniques/T1003/006"
|
|
},
|
|
{
|
|
"name": "System Time Discovery",
|
|
"id": "T1124",
|
|
"url": "https://attack.mitre.org/techniques/T1124"
|
|
},
|
|
{
|
|
"name": "At",
|
|
"id": "T1053.002",
|
|
"url": "https://attack.mitre.org/techniques/T1053/002"
|
|
},
|
|
{
|
|
"name": "Service Execution",
|
|
"id": "T1035",
|
|
"url": "https://attack.mitre.org/techniques/T1035"
|
|
},
|
|
{
|
|
"name": "Dynamic-link Library Injection",
|
|
"id": "T1055.001",
|
|
"url": "https://attack.mitre.org/techniques/T1055/001"
|
|
},
|
|
{
|
|
"name": "PowerShell",
|
|
"id": "T1086",
|
|
"url": "https://attack.mitre.org/techniques/T1086"
|
|
},
|
|
{
|
|
"name": "Exploits",
|
|
"id": "T1588.005",
|
|
"url": "https://attack.mitre.org/techniques/T1588/005"
|
|
},
|
|
{
|
|
"name": "Modify Authentication Process",
|
|
"id": "T1556",
|
|
"url": "https://attack.mitre.org/techniques/T1556"
|
|
},
|
|
{
|
|
"name": "Udev Rules",
|
|
"id": "T1546.017",
|
|
"url": "https://attack.mitre.org/techniques/T1546/017"
|
|
},
|
|
{
|
|
"name": "Credential API Hooking",
|
|
"id": "T1056.004",
|
|
"url": "https://attack.mitre.org/techniques/T1056/004"
|
|
},
|
|
{
|
|
"name": "Firmware Corruption",
|
|
"id": "T1495",
|
|
"url": "https://attack.mitre.org/techniques/T1495"
|
|
},
|
|
{
|
|
"name": "Inhibit System Recovery",
|
|
"id": "T1490",
|
|
"url": "https://attack.mitre.org/techniques/T1490"
|
|
},
|
|
{
|
|
"name": "Netsh Helper DLL",
|
|
"id": "T1546.007",
|
|
"url": "https://attack.mitre.org/techniques/T1546/007"
|
|
},
|
|
{
|
|
"name": "Spearphishing via Service",
|
|
"id": "T1566.003",
|
|
"url": "https://attack.mitre.org/techniques/T1566/003"
|
|
},
|
|
{
|
|
"name": "Internal Proxy",
|
|
"id": "T1090.001",
|
|
"url": "https://attack.mitre.org/techniques/T1090/001"
|
|
},
|
|
{
|
|
"name": "System Script Proxy Execution",
|
|
"id": "T1216",
|
|
"url": "https://attack.mitre.org/techniques/T1216"
|
|
},
|
|
{
|
|
"name": "Custom Command and Control Protocol",
|
|
"id": "T1094",
|
|
"url": "https://attack.mitre.org/techniques/T1094"
|
|
},
|
|
{
|
|
"name": "Dead Drop Resolver",
|
|
"id": "T1102.001",
|
|
"url": "https://attack.mitre.org/techniques/T1102/001"
|
|
},
|
|
{
|
|
"name": "InstallUtil",
|
|
"id": "T1118",
|
|
"url": "https://attack.mitre.org/techniques/T1118"
|
|
},
|
|
{
|
|
"name": "Junk Data",
|
|
"id": "T1001.001",
|
|
"url": "https://attack.mitre.org/techniques/T1001/001"
|
|
},
|
|
{
|
|
"name": "Spearphishing Service",
|
|
"id": "T1598.001",
|
|
"url": "https://attack.mitre.org/techniques/T1598/001"
|
|
},
|
|
{
|
|
"name": "Commonly Used Port",
|
|
"id": "T1043",
|
|
"url": "https://attack.mitre.org/techniques/T1043"
|
|
},
|
|
{
|
|
"name": "vSphere Installation Bundles",
|
|
"id": "T1505.006",
|
|
"url": "https://attack.mitre.org/techniques/T1505/006"
|
|
},
|
|
{
|
|
"name": "Container API",
|
|
"id": "T1552.007",
|
|
"url": "https://attack.mitre.org/techniques/T1552/007"
|
|
},
|
|
{
|
|
"name": "Domains",
|
|
"id": "T1584.001",
|
|
"url": "https://attack.mitre.org/techniques/T1584/001"
|
|
},
|
|
{
|
|
"name": "SQL Stored Procedures",
|
|
"id": "T1505.001",
|
|
"url": "https://attack.mitre.org/techniques/T1505/001"
|
|
},
|
|
{
|
|
"name": "Network Device Authentication",
|
|
"id": "T1556.004",
|
|
"url": "https://attack.mitre.org/techniques/T1556/004"
|
|
},
|
|
{
|
|
"name": "Disk Content Wipe",
|
|
"id": "T1561.001",
|
|
"url": "https://attack.mitre.org/techniques/T1561/001"
|
|
},
|
|
{
|
|
"name": "Messaging Applications",
|
|
"id": "T1213.005",
|
|
"url": "https://attack.mitre.org/techniques/T1213/005"
|
|
},
|
|
{
|
|
"name": "Exfiltration Over Unencrypted Non-C2 Protocol",
|
|
"id": "T1048.003",
|
|
"url": "https://attack.mitre.org/techniques/T1048/003"
|
|
},
|
|
{
|
|
"name": "Compression",
|
|
"id": "T1027.015",
|
|
"url": "https://attack.mitre.org/techniques/T1027/015"
|
|
},
|
|
{
|
|
"name": "Dylib Hijacking",
|
|
"id": "T1574.004",
|
|
"url": "https://attack.mitre.org/techniques/T1574/004"
|
|
},
|
|
{
|
|
"name": "Downgrade System Image",
|
|
"id": "T1601.002",
|
|
"url": "https://attack.mitre.org/techniques/T1601/002"
|
|
},
|
|
{
|
|
"name": "Local Accounts",
|
|
"id": "T1078.003",
|
|
"url": "https://attack.mitre.org/techniques/T1078/003"
|
|
},
|
|
{
|
|
"name": "Wi-Fi Networks",
|
|
"id": "T1669",
|
|
"url": "https://attack.mitre.org/techniques/T1669"
|
|
},
|
|
{
|
|
"name": "Exploitation for Defense Evasion",
|
|
"id": "T1211",
|
|
"url": "https://attack.mitre.org/techniques/T1211"
|
|
},
|
|
{
|
|
"name": "Trusted Developer Utilities Proxy Execution",
|
|
"id": "T1127",
|
|
"url": "https://attack.mitre.org/techniques/T1127"
|
|
},
|
|
{
|
|
"name": "System Shutdown/Reboot",
|
|
"id": "T1529",
|
|
"url": "https://attack.mitre.org/techniques/T1529"
|
|
},
|
|
{
|
|
"name": "MMC",
|
|
"id": "T1218.014",
|
|
"url": "https://attack.mitre.org/techniques/T1218/014"
|
|
},
|
|
{
|
|
"name": "Process Argument Spoofing",
|
|
"id": "T1564.010",
|
|
"url": "https://attack.mitre.org/techniques/T1564/010"
|
|
},
|
|
{
|
|
"name": "Windows Admin Shares",
|
|
"id": "T1077",
|
|
"url": "https://attack.mitre.org/techniques/T1077"
|
|
},
|
|
{
|
|
"name": "COR_PROFILER",
|
|
"id": "T1574.012",
|
|
"url": "https://attack.mitre.org/techniques/T1574/012"
|
|
}
|
|
] |