You are on page 1of 2

attack.mitre.

org

Using Adversary Behavior to Get Started with ATT&CK


Strengthen Cyber Defense Use ATT&CK for Cyber Threat Intelligence Use ATT&CK for Adversary Emulation and Red Teaming

No matter how strong your patching, compliance and security software, Cyber threat intelligence comes from many sources, including knowledge The best defense is a well-tested defense. ATT&CK provides a common
a determined cyber adversary can typically find a way into your network. of past incidents, commercial threat feeds, information-sharing groups, adversary behavior framework based on threat intelligence that red teams
government threat-sharing programs, and more. ATT&CK gives analysts can use to emulate specific threats. This helps cyber defenders find gaps in
But how did the attacker get in? How are they moving around? And how a common language to communicate across reports and organizations, visibility, defensive tools and processes—and then fix them.
can you use that knowledge to detect, mitigate and prevent future providing a way to structure, compare, and analyze threat intelligence.
attacks? The MITRE ATT&CK™ framework answers those questions by
providing a globally accessible knowledge base of adversary tactics and
techniques that are based on real-world observations of adversaries’
operations against computer networks. Armed with this knowledge,
organizations and security vendors can work toward improving detection
and prevention methods. Comparing APT 28 to Deep Panda

Pioneering with the Cyber Community for Join the ATT&CK Community
Collaborative Defense
MITRE encourages other researchers, analysts and cyber defenders to join
ATT&CK was first created by a MITRE internal research program using our community and contribute new techniques and information.
our own data and operations. Now based on published, open source Use ATT&CK to Build Your Defensive Platform
threat information, MITRE provides the framework as a resource to the
ATT&CK includes resources designed to help cyber defenders develop
cyber community. Anyone is free to leverage it, and everyone is free to
analytics that detect the techniques used by an adversary. Based on MITRE ATT&CK Resources
use and contribute to ATT&CK.
threat intelligence included in ATT&CK or provided by analysts, cyber attack.mitre.org
defenders can create a comprehensive set of analytics to detect threats.
By making the ATT&CK knowledge base globally accessible, MITRE • Access ATT&CK technical information
supports a growing community that is fostering innovation in open • Contribute to ATT&CK
source tools, products and services based on the framework. ATT&CK is • Follow our blog
experiencing significant growth across the cybersecurity community, with • Watch ATT&CK presentations
wide adoption from industry, government and security vendors including
organizations like Microsoft, IBM, USAA, JPMorgan Chase, and Palo Alto. Finding Gaps in Defense @MITREattack
Follow us on Twitter for the latest news.
With the creation of ATT&CK, MITRE is partnering with the cyber
community to fulfill its mission to solve problems for a safer world.
Ini�al Access Execu�on Persistence Privilege Escala�on Defense Evasion Creden�alAccess Discovery Lateral Movement Collec�on Exfiltra�on Command and Control
Valid Accounts Scheduled Task XSL Script Processing Network Sniffing Windows Remote Video Capture Scheduled Transfer Web Service
Trusted Rela�onship Trap Process Injec�on Two-Factor Authen�ca�on System Time Discovery Management Screen Capture Exfiltra�on Over Uncommonly Used Port
Supply Chain Compromise LSASS Driver Extra Window Memory Injec�on Intercep�on System Service Discovery Third-party So�ware Man in the Browser Physical Medium Standard Non-Applica�on
Spearphishing via Service Local Job Scheduling Bypass User Account Control Private Keys System Owner/User Taint Shared Content Input Capture Exfiltra�on Over Command Layer Protocol
Spearphishing Link Launchctl Access Token Manipula�on Password Filter DLL Discovery SSH Hijacking Email Collec�on and Control Channel Standard Applica�on
Spearphishing A�achment XSL Script Processing Valid Accounts LLMNR/NBT-NS Poisoning System Network Shared Webroot Data Staged Data Transfer Size Limits Layer Protocol
Replica�on Through Windows Remote Plist Modifica�on Keychain Configura�on Discovery Replica�on Through Data from Removable Media Data Encrypted Remote Access Tools
Removable Media Management Image File Execu�on Op�ons Injec�on Kerberoas�ng Security So�ware Discovery Removable Media Data from Network Data Compressed Port Knocking
Exploit Public-Facing User Execu�on DLL Search Order Hijacking Input Prompt Remote System Discovery Remote File Copy Shared Drive Automated Exfiltra�on Mul�layer Encryp�on
Applica�on Trusted Developer U�li�es Web Shell Web Service Input Capture Query Registry Remote Desktop Protocol Data from Informa�on Exfiltra�on Over Other Mul�band Communica�on
Hardware Addi�ons Third-party So�ware Startup Items Trusted Developer U�li�es Hooking Process Discovery Pass the Ticket Repositories Network Medium Mul�-Stage Channels
Drive-by Compromise Space a�er Filename Setuid and Setgid Timestomp Forced Authen�ca�on Permission Groups Discovery Pass the Hash Automated Collec�on Exfiltra�on Over Mul�-hop Proxy
Source Service Registry Permissions Weakness Template Injec�on Exploita�on for Peripheral Device Discovery Logon Scripts Audio Capture Alterna�ve Protocol Fallback Channels
Signed Script Port Monitors Space a�er Filename Creden�al Access Password Policy Discovery Exploita�on of Data from Local System Domain Fron�ng
Proxy Execu�on Path Intercep�on So�ware Packing Creden�als in Files Network Share Discovery Remote Services Clipboard Data Data Obfusca�on
Service Execu�on New Service SIP and Trust Creden�al Dumping Network Service Scanning Applica�on Deployment Data Encoding
Scrip�ng Launch Daemon Provider Hijacking Brute Force File and Directory Discovery So�ware Custom Cryptographic
Rundll32 Hooking Signed Binary Bash History Browser Bookmark Discovery Windows Admin Shares Protocol
Regsvr32 File System Permissions Weakness Proxy Execu�on Account Manipula�on Applica�on Window Remote Services Connec�on Proxy
Regsvcs/Regasm Dylib Hijacking Rundll32 Securityd Memory Discovery Distributed Component Communica�on Through
PowerShell Applica�on Shimming Rootkit Creden�als in Registry System Network Object Model Removable Media
Mshta AppInit DLLs Regsvr32 Connec�ons Discovery AppleScript Standard Cryptographic
InstallU�l AppCert DLLs Regsvcs/Regasm System Informa�on Protocol
Graphical User Interface Accessibility Features Redundant Access Discovery Remote File Copy
Exploita�on for Winlogon Helper DLL Sudo Caching Process Hollowing Account Discovery Custom Command and
Client Execu�on Windows Management Sudo Process Doppelganging Control Protocol
Execu�on through API Instrumenta�on SID-History Injec�on Port Knocking Commonly Used Port
Dynamic Data Exchange Event Subscrip�on Exploita�on for Obfuscated Files
Control Panel Items SIP and Trust Provider Privilege Escala�on or Informa�on
Compiled HTML File Hijacking Network Share
Command-Line Interface Security Support Provider Connec�on Removal
CMSTP Screensaver Modify Registry
AppleScript Registry Run Masquerading
Windows Management Keys / Startup Folder LC_MAIN Hijacking
Instrumenta�on Re-opened Applica�ons Launchctl
Signed Binary Rc.common InstallU�l
Proxy Execu�on Port Knocking Install Root Cer�ficate
Execu�on through Office Applica�on Startup Indirect Command Execu�on
Module Load Netsh Helper DLL Component Firmware
Modify Exis�ng Service Indicator Removal from Tools

The MITRE ATT&CK™


Logon Scripts Indicator Blocking
Login Item HISTCONTROL
LC_LOAD_DYLIB Addi�on Hidden Window
Launch Agent Hidden Users

Enterprise Framework
Kernel Modules Hidden Files and Directories
and Extensions Gatekeeper Bypass
Hidden Files and Directories File System Logical Offsets
External Remote Services File Permissions Modifica�on
Create Account File Dele�on
Component Object Model Exploita�on for
Hijacking Defense Evasion
Change Default
File Associa�on
Disabling Security Tools
Deobfuscate/Decode Files
attack.mitre.org
Bootkit or Informa�on
BITS Jobs Control Panel Items
Authen�ca�on Package Component Object
Account Manipula�on Model Hijacking
.bash_profile and .bashrc Compiled HTML File
Time Providers Code Signing
System Firmware CMSTP
Shortcut Modifica�on Clear Command History
Redundant Access BITS Jobs
Hypervisor Signed Script Proxy Execu�on
Component Firmware Scrip�ng
Browser Extensions NTFS File A�ributes
Mshta
Indicator Removal on Host
DLL Side-Loading
DCShadow © 2019 The MITRE Corporation. All rights reserved. Approved for Public Release; Distribution Unlimited. Case Number 15-1288.

You might also like