forked from MISP/misp-galaxy
-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathmitre-attack-pattern.json
10405 lines (10405 loc) · 647 KB
/
mitre-attack-pattern.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
{
"authors": [
"MITRE"
],
"category": "attack-pattern",
"description": "ATT&CK tactic",
"name": "Attack Pattern",
"source": "https://github.com/mitre/cti",
"type": "mitre-attack-pattern",
"uuid": "dcb864dc-775f-11e7-9fbb-1f41b4996683",
"values": [
{
"description": "Many mobile devices are configured to only allow applications to be installed from the mainstream vendor app stores (e.g., Apple App Store and Google Play Store). An adversary can submit multiple code samples to these stores deliberately designed to probe the stores' security analysis capabilities, with the goal of determining effective techniques to place malicious applications in the stores that could then be delivered to targeted devices. (Citation: Android Bouncer) (Citation: Adventures in BouncerLand) (Citation: Jekyll on iOS) (Citation: Fruit vs Zombies)",
"meta": {
"external_id": "T1393",
"kill_chain": [
"mitre-pre-attack:test-capabilities"
],
"refs": [
"https://attack.mitre.org/techniques/T1393"
]
},
"uuid": "c9e85b80-39e8-42df-b275-86a2afcea9e8",
"value": "Test ability to evade automated mobile application security analysis performed by app stores - T1393"
},
{
"description": "The adversary can use account credentials or signing keys of an existing mobile app developer to publish malicious updates of existing mobile apps to an application store, or to abuse the developer's identity and reputation to publish new malicious apps. Many mobile devices are configured to automatically install new versions of already-installed apps. (Citation: Fraudenlent Apps Stolen Dev Credentials)",
"meta": {
"external_id": "T1391",
"kill_chain": [
"mitre-pre-attack:persona-development"
],
"refs": [
"https://attack.mitre.org/techniques/T1391"
]
},
"uuid": "7a265bf0-6acc-4f43-8b22-2e58b443e62e",
"value": "Choose pre-compromised mobile app developer account credentials or signing keys - T1391"
},
{
"description": "Software applications will be built using different technologies, languages, and dependencies. This information may reveal vulnerabilities or opportunities to an adversary. (Citation: CommonApplicationAttacks) (Citation: WebApplicationSecurity) (Citation: SANSTop25)",
"meta": {
"external_id": "T1261",
"kill_chain": [
"mitre-pre-attack:technical-information-gathering"
],
"refs": [
"https://attack.mitre.org/techniques/T1261"
]
},
"uuid": "ef6197fd-a58a-4006-bfd6-1d7765d8409d",
"value": "Enumerate externally facing software applications technologies, languages, and dependencies - T1261"
},
{
"description": "The adversary can obtain an Apple iOS enterprise distribution key pair and certificate and use it to distribute malicious apps directly to Apple iOS devices without the need to publish the apps to the Apple App Store (where the apps could potentially be detected). (Citation: Apple Developer Enterprise Porgram Apps) (Citation: Fruit vs Zombies) (Citation: WIRELURKER) (Citation: Sideloading Change)",
"meta": {
"external_id": "T1392",
"kill_chain": [
"mitre-pre-attack:persona-development"
],
"refs": [
"https://attack.mitre.org/techniques/T1392"
]
},
"uuid": "d58f3996-e293-4f69-a2c8-0e1851cb8297",
"value": "Obtain Apple iOS enterprise distribution key pair and certificate - T1392"
},
{
"description": "Social media provides insight into the target's affiliations with groups and organizations. Certification information can explain their technical associations and professional associations. Personal information can provide data for exploitation or even blackmail. (Citation: Scasny2015)",
"meta": {
"external_id": "T1295",
"kill_chain": [
"mitre-pre-attack:people-weakness-identification"
],
"refs": [
"https://attack.mitre.org/techniques/T1295"
]
},
"uuid": "ee40d054-6e83-4302-88dc-a3af98821d8d",
"value": "Analyze social and business relationships, interests, and affiliations - T1295"
},
{
"description": "An adversary needs the necessary skills to set up procured equipment and software to create their desired infrastructure. (Citation: KasperskyRedOctober)",
"meta": {
"external_id": "T1336",
"kill_chain": [
"mitre-pre-attack:establish-&-maintain-infrastructure"
],
"refs": [
"https://attack.mitre.org/techniques/T1336"
]
},
"uuid": "73e394e5-3d8a-40d1-ab8c-a1b4ea9db424",
"value": "Install and configure hardware, network, and systems - T1336"
},
{
"description": "There is usually a delay between when a vulnerability or exploit is discovered and when it is made public. An adversary may target the systems of those known to research vulnerabilities in order to gain that knowledge for use during a different attack. (Citation: TempertonDarkHotel)",
"meta": {
"external_id": "T1354",
"kill_chain": [
"mitre-pre-attack:build-capabilities"
],
"refs": [
"https://attack.mitre.org/techniques/T1354"
]
},
"uuid": "5a68c603-d7f9-4535-927e-ab56819eaa85",
"value": "Compromise 3rd party or closed-source vulnerability/exploit information - T1354"
},
{
"description": "An exploit takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer hardware or software. The adversary may need to discover new exploits when existing exploits are no longer relevant to the environment they are trying to compromise. An adversary may monitor exploit provider forums to understand the state of existing, as well as newly discovered, exploits. (Citation: EquationQA)",
"meta": {
"external_id": "T1350",
"kill_chain": [
"mitre-pre-attack:build-capabilities"
],
"refs": [
"https://attack.mitre.org/techniques/T1350",
"https://www.threatminer.org/_reports/2015/Equation_group_questions_and_answers.pdf"
]
},
"uuid": "82bbd209-f516-45e0-9542-4ffbbc2a8717",
"value": "Discover new exploits and monitor exploit-provider forums - T1350"
},
{
"description": "A wide variety of 3rd party software services are available (e.g., [Twitter](https://twitter.com), [Dropbox](https://www.dropbox.com), [GoogleDocs](https://www.google.com/docs/about)). Use of these solutions allow an adversary to stage, launch, and execute an attack from infrastructure that does not physically tie back to them and can be rapidly provisioned, modified, and shut down. (Citation: LOWBALL2015)",
"meta": {
"external_id": "T1330",
"kill_chain": [
"mitre-pre-attack:establish-&-maintain-infrastructure"
],
"refs": [
"https://attack.mitre.org/techniques/T1330"
]
},
"related": [
{
"dest-uuid": "1a295f87-af63-4d94-b130-039d6221fb11",
"tags": [
"estimative-language:likelihood-probability=\"almost-certain\""
],
"type": "related-to"
}
],
"uuid": "488da8ed-2887-4ef6-a39a-5b69bc6682c6",
"value": "Acquire and/or use 3rd party software services - T1330"
},
{
"description": "A wide variety of cloud, virtual private services, hosting, compute, and storage solutions are available. Additionally botnets are available for rent or purchase. Use of these solutions allow an adversary to stage, launch, and execute an attack from infrastructure that does not physically tie back to them and can be rapidly provisioned, modified, and shut down. (Citation: LUCKYCAT2012)",
"meta": {
"external_id": "T1307",
"kill_chain": [
"mitre-pre-attack:adversary-opsec"
],
"refs": [
"https://attack.mitre.org/techniques/T1307"
]
},
"related": [
{
"dest-uuid": "795c1a92-3a26-453e-b99a-6a566aa94dc6",
"tags": [
"estimative-language:likelihood-probability=\"almost-certain\""
],
"type": "related-to"
}
],
"uuid": "286cc500-4291-45c2-99a1-e760db176402",
"value": "Acquire and/or use 3rd party infrastructure services - T1307"
},
{
"description": "A wide variety of 3rd party software services are available (e.g., [Twitter](https://twitter.com), [Dropbox](https://www.dropbox.com), [GoogleDocs](https://www.google.com/docs/about)). Use of these solutions allow an adversary to stage, launch, and execute an attack from infrastructure that does not physically tie back to them and can be rapidly provisioned, modified, and shut down. (Citation: LUCKYCAT2012) (Citation: Nemucod Facebook)",
"meta": {
"external_id": "T1308",
"kill_chain": [
"mitre-pre-attack:adversary-opsec"
],
"refs": [
"https://attack.mitre.org/techniques/T1308"
]
},
"related": [
{
"dest-uuid": "488da8ed-2887-4ef6-a39a-5b69bc6682c6",
"tags": [
"estimative-language:likelihood-probability=\"almost-certain\""
],
"type": "related-to"
}
],
"uuid": "1a295f87-af63-4d94-b130-039d6221fb11",
"value": "Acquire and/or use 3rd party software services - T1308"
},
{
"description": "An adversary can test their planned method of attack against existing security products such as email filters or intrusion detection sensors (IDS). (Citation: WiredVirusTotal)",
"meta": {
"external_id": "T1361",
"kill_chain": [
"mitre-pre-attack:test-capabilities"
],
"refs": [
"https://attack.mitre.org/techniques/T1361"
]
},
"uuid": "c9ac5715-ee5c-4380-baf4-6f12e304ca93",
"value": "Test signature detection for file upload/email filters - T1361"
},
{
"description": "A wide variety of cloud, virtual private services, hosting, compute, and storage solutions are available. Additionally botnets are available for rent or purchase. Use of these solutions allow an adversary to stage, launch, and execute an attack from infrastructure that does not physically tie back to them and can be rapidly provisioned, modified, and shut down. (Citation: TrendmicroHideoutsLease)",
"meta": {
"external_id": "T1329",
"kill_chain": [
"mitre-pre-attack:establish-&-maintain-infrastructure"
],
"refs": [
"https://attack.mitre.org/techniques/T1329"
]
},
"related": [
{
"dest-uuid": "286cc500-4291-45c2-99a1-e760db176402",
"tags": [
"estimative-language:likelihood-probability=\"almost-certain\""
],
"type": "related-to"
}
],
"uuid": "795c1a92-3a26-453e-b99a-6a566aa94dc6",
"value": "Acquire and/or use 3rd party infrastructure services - T1329"
},
{
"description": "Code signing is the process of digitally signing executables or scripts to confirm the software author and guarantee that the code has not been altered or corrupted. Users may trust a signed piece of code more than an signed piece of code even if they don't know who issued the certificate or who the author is. (Citation: Adobe Code Signing Cert)",
"meta": {
"external_id": "T1310",
"kill_chain": [
"mitre-pre-attack:adversary-opsec"
],
"refs": [
"https://attack.mitre.org/techniques/T1310"
]
},
"related": [
{
"dest-uuid": "03f4a766-7a21-4b5e-9ccf-e0cf422ab983",
"tags": [
"estimative-language:likelihood-probability=\"almost-certain\""
],
"type": "related-to"
}
],
"uuid": "e5164428-03ca-4336-a9a7-4d9ea1417e59",
"value": "Acquire or compromise 3rd party signing certificates - T1310"
},
{
"description": "A malicious application can request Device Administrator privileges. If the user grants the privileges, the application can take steps to make its removal more difficult.",
"meta": {
"external_id": "APP-22",
"kill_chain": [
"mitre-mobile-attack:persistence"
],
"mitre_platforms": [
"Android"
],
"refs": [
"https://attack.mitre.org/techniques/T1401",
"https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-22.html"
]
},
"uuid": "82f04b1e-5371-4a6f-be06-411f0f43b483",
"value": "Abuse Device Administrator Access to Prevent Removal - T1401"
},
{
"description": "An adversary could attempt to read files that contain sensitive data or credentials (e.g., private keys, passwords, access tokens). This technique requires either escalated privileges or for the targeted app to have stored the data in an insecure manner (e.g., with insecure file permissions or in an insecure location such as an external storage directory).",
"meta": {
"external_id": "AUT-0",
"kill_chain": [
"mitre-mobile-attack:collection",
"mitre-mobile-attack:credential-access"
],
"mitre_platforms": [
"Android",
"iOS"
],
"refs": [
"https://attack.mitre.org/techniques/T1409",
"https://pages.nist.gov/mobile-threat-catalogue/authentication-threats/AUT-0.html"
]
},
"uuid": "702055ac-4e54-4ae9-9527-e23a38e0b160",
"value": "Access Sensitive Data or Credentials in Files - T1409"
},
{
"description": "Instead of buying, leasing, or renting infrastructure an adversary may compromise infrastructure and use it for some or all of the attack cycle. (Citation: WateringHole2014) (Citation: FireEye Operation SnowMan)",
"meta": {
"external_id": "T1312",
"kill_chain": [
"mitre-pre-attack:adversary-opsec"
],
"refs": [
"https://attack.mitre.org/techniques/T1312"
]
},
"related": [
{
"dest-uuid": "e51398e6-53dc-4e9f-a323-e54683d8672b",
"tags": [
"estimative-language:likelihood-probability=\"almost-certain\""
],
"type": "related-to"
}
],
"uuid": "4900fabf-1142-4c1f-92f5-0b590e049077",
"value": "Compromise 3rd party infrastructure to support delivery - T1312"
},
{
"description": "Code signing is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted. Users may trust a signed piece of code more than an signed piece of code even if they don't know who issued the certificate or who the author is. (Citation: DiginotarCompromise)",
"meta": {
"external_id": "T1332",
"kill_chain": [
"mitre-pre-attack:establish-&-maintain-infrastructure"
],
"refs": [
"https://attack.mitre.org/techniques/T1332"
]
},
"related": [
{
"dest-uuid": "e5164428-03ca-4336-a9a7-4d9ea1417e59",
"tags": [
"estimative-language:likelihood-probability=\"almost-certain\""
],
"type": "related-to"
}
],
"uuid": "03f4a766-7a21-4b5e-9ccf-e0cf422ab983",
"value": "Acquire or compromise 3rd party signing certificates - T1332"
},
{
"description": "Instead of buying, leasing, or renting infrastructure an adversary may compromise infrastructure and use it for some or all of the attack cycle. (Citation: WateringHole2014) (Citation: FireEye Operation SnowMan)",
"meta": {
"external_id": "T1334",
"kill_chain": [
"mitre-pre-attack:establish-&-maintain-infrastructure"
],
"refs": [
"https://attack.mitre.org/techniques/T1334"
]
},
"related": [
{
"dest-uuid": "4900fabf-1142-4c1f-92f5-0b590e049077",
"tags": [
"estimative-language:likelihood-probability=\"almost-certain\""
],
"type": "related-to"
}
],
"uuid": "e51398e6-53dc-4e9f-a323-e54683d8672b",
"value": "Compromise 3rd party infrastructure to support delivery - T1334"
},
{
"description": "This technique has been deprecated. Please see ATT&CK's Initial Access and Execution tactics for replacement techniques.\n\nThrough social engineering or other methods, an adversary can get users to perform physical actions that provide access to an adversary. This could include providing a password over the phone or inserting a 'found' CD or USB into a system. (Citation: AnonHBGary) (Citation: CSOInsideOutside)",
"meta": {
"external_id": "T1385",
"kill_chain": [
"mitre-pre-attack:compromise"
],
"refs": [
"https://attack.mitre.org/techniques/T1385"
]
},
"uuid": "fb39384c-00e4-414a-88af-e80c4904e0b8",
"value": "Human performs requested action of physical nature - T1385"
},
{
"description": "An adversary could abuse an iOS enterprise app signing key (intended for enterprise in-house distribution of apps) to sign malicious iOS apps so that they can be installed on iOS devices without the app needing to be published on Apple's App Store. For example, Xiao describes use of this technique in (Citation: Xiao-iOS).\n\nDetection: iOS 9 and above typically requires explicit user consent before allowing installation of applications signed with enterprise distribution keys rather than installed from Apple's App Store.\n\nPlatforms: iOS",
"meta": {
"external_id": "T1445",
"refs": [
"https://attack.mitre.org/techniques/T1445"
]
},
"related": [
{
"dest-uuid": "53263a67-075e-48fa-974b-91c5b5445db7",
"tags": [
"estimative-language:likelihood-probability=\"almost-certain\""
],
"type": "revoked-by"
}
],
"uuid": "51aedbd6-2837-4d15-aeb0-cb09f2bf22ac",
"value": "Abuse of iOS Enterprise App Signing Key - T1445"
},
{
"description": "Malicious applications are a common attack vector used by adversaries to gain a presence on mobile devices. Mobile devices often are configured to allow application installation only from an authorized app store (e.g., Google Play Store or Apple App Store). An adversary may seek to place a malicious application in an authorized app store, enabling the application to be installed onto targeted devices.\n\nApp stores typically require developer registration and use vetting techniques to identify malicious applications. Adversaries may use these techniques against app store defenses:\n\n* [Download New Code at Runtime](https://attack.mitre.org/techniques/T1407)\n* [Obfuscated or Encrypted Payload](https://attack.mitre.org/techniques/T1406)\n* PRE-ATT&CK: [Choose pre-compromised mobile app developer account credentials or signing keys](https://attack.mitre.org/techniques/T1391)\n* PRE-ATT&CK: [Test ability to evade automated mobile application security analysis performed by app stores](https://attack.mitre.org/techniques/T1393)\n\nAdversaries may also seek to evade vetting by placing code in a malicious application to detect whether it is running in an app analysis environment and, if so, avoid performing malicious actions while under analysis. (Citation: Petsas) (Citation: Oberheide-Bouncer) (Citation: Percoco-Bouncer) (Citation: Wang)\n\nAdversaries may also use fake identities, payment cards, etc., to create developer accounts to publish malicious applications to app stores. (Citation: Oberheide-Bouncer)\n\nAdversaries may also use control of a target's Google account to use the Google Play Store's remote installation capability to install apps onto the Android devices associated with the Google account. (Citation: Oberheide-RemoteInstall) (Citation: Konoth) (Only applications that are available for download through the Google Play Store can be remotely installed using this technique.)",
"meta": {
"external_id": "ECO-22",
"kill_chain": [
"mitre-mobile-attack:initial-access"
],
"mitre_platforms": [
"Android",
"iOS"
],
"refs": [
"https://attack.mitre.org/techniques/T1475",
"https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-4.html",
"https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-16.html",
"https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-17.html",
"https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-20.html",
"https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-21.html",
"https://pages.nist.gov/mobile-threat-catalogue/ecosystem-threats/ECO-22.html",
"http://dl.acm.org/citation.cfm?id=2592796",
"https://jon.oberheide.org/files/summercon12-bouncer.pdf",
"https://media.blackhat.com/bh-us-12/Briefings/Percoco/BH_US_12_Percoco_Adventures_in_Bouncerland_WP.pdf",
"https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/wang_tielei",
"https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/",
"http://www.vvdveen.com/publications/BAndroid.pdf"
]
},
"uuid": "d9db3d46-66ca-44b4-9daa-1ef97cb7465a",
"value": "Deliver Malicious App via Authorized App Store - T1475"
},
{
"description": "An adversary could make educated guesses of the device lock screen's PIN/password (e.g., commonly used values, birthdays, anniversaries) or attempt a dictionary or brute force attack against it. Brute force attacks could potentially be automated (Citation: PopSci-IPBox).\n\nPlatforms: Android, iOS",
"meta": {
"external_id": "T1459",
"refs": [
"https://attack.mitre.org/techniques/T1459"
]
},
"related": [
{
"dest-uuid": "dfe29258-ce59-421c-9dee-e85cb9fa90cd",
"tags": [
"estimative-language:likelihood-probability=\"almost-certain\""
],
"type": "revoked-by"
}
],
"uuid": "f296fc9c-2ff5-43ee-941e-6b49c438270a",
"value": "Device Unlock Code Guessing or Brute Force - T1459"
},
{
"description": "Once generated, Key Intelligence Topics (KITs), Key Intelligence Questions (KIQs), and/or intelligence requirements are assigned to applicable agencies and/or personnel. For example, an adversary may decide nuclear energy requirements should be assigned to a specific organization based on their mission. (Citation: AnalystsAndPolicymaking) (Citation: JP2-01)",
"meta": {
"external_id": "T1238",
"kill_chain": [
"mitre-pre-attack:priority-definition-direction"
],
"refs": [
"https://attack.mitre.org/techniques/T1238"
]
},
"uuid": "4fad17d3-8f42-449d-ac4b-dbb4c486127d",
"value": "Assign KITs, KIQs, and/or intelligence requirements - T1238"
},
{
"description": "Analysts assess current information available against requirements that outline needs and wants as part of the research baselining process to begin satisfying a requirement. (Citation: CyberAdvertisingChar) (Citation: CIATradecraft) (Citation: ForensicAdversaryModeling) (Citation: CyberAdversaryBehavior)",
"meta": {
"external_id": "T1236",
"kill_chain": [
"mitre-pre-attack:priority-definition-planning"
],
"refs": [
"https://attack.mitre.org/techniques/T1236"
]
},
"uuid": "8e927b19-04a6-4aaa-a42f-4f0a53411d27",
"value": "Assess current holdings, needs, and wants - T1236"
},
{
"description": "Once they have been created, intelligence requirements, Key Intelligence Topics (KITs), and Key Intelligence Questions (KIQs) are submitted into a central management system. (Citation: ICD204) (Citation: KIT-Herring)",
"meta": {
"external_id": "T1237",
"kill_chain": [
"mitre-pre-attack:priority-definition-direction"
],
"refs": [
"https://attack.mitre.org/techniques/T1237"
]
},
"uuid": "03da0598-ed46-4a73-bf43-0313b3522400",
"value": "Submit KITs, KIQs, and intelligence requirements - T1237"
},
{
"description": "Certain types of traffic (e.g., Twitter14, HTTP) are more commonly used than others. Utilizing more common protocols and software may make an adversary's traffic more difficult to distinguish from legitimate traffic. (Citation: symantecNITRO)",
"meta": {
"external_id": "T1321",
"kill_chain": [
"mitre-pre-attack:adversary-opsec"
],
"refs": [
"https://attack.mitre.org/techniques/T1321"
]
},
"uuid": "0c592c79-29a7-4a94-81a4-c87eae3aead6",
"value": "Common, high volume protocols and software - T1321"
},
{
"description": "Using alternative payment options allows an adversary to hide their activities. Options include crypto currencies, barter systems, pre-paid cards or shell accounts. (Citation: Goodin300InBitcoins)",
"meta": {
"external_id": "T1316",
"kill_chain": [
"mitre-pre-attack:adversary-opsec"
],
"refs": [
"https://attack.mitre.org/techniques/T1316"
]
},
"uuid": "b79e8a3f-a109-47c2-a0e3-564955590a3d",
"value": "Non-traditional or less attributable payment options - T1316"
},
{
"description": "For attacks incorporating social engineering the utilization of an on-line persona is important. Utilizing an existing persona with compromised accounts may engender a level of trust in a potential victim if they have a relationship, or knowledge of, the compromised persona. (Citation: AnonHBGary) (Citation: Hacked Social Media Accounts)",
"meta": {
"external_id": "T1343",
"kill_chain": [
"mitre-pre-attack:persona-development"
],
"refs": [
"https://attack.mitre.org/techniques/T1343"
]
},
"uuid": "9a8c47f6-ae69-4044-917d-4b1602af64d9",
"value": "Choose pre-compromised persona and affiliated accounts - T1343"
},
{
"description": "The mobile device could contain built-in functionality with malicious behavior or exploitable vulnerabilities. An adversary could deliberately insert and take advantage of the malicious behavior or could exploit inadvertent vulnerabilities. In many cases, it is difficult to be certain whether exploitable functionality is due to malicious intent or simply an inadvertent mistake.\n\nPlatforms: Android, iOS",
"meta": {
"external_id": "T1473",
"refs": [
"https://attack.mitre.org/techniques/T1473"
]
},
"related": [
{
"dest-uuid": "0d95940f-9583-4e0f-824c-a42c1be47fad",
"tags": [
"estimative-language:likelihood-probability=\"almost-certain\""
],
"type": "revoked-by"
}
],
"uuid": "f9e4f526-ac9d-4df5-8949-833a82a1d2df",
"value": "Malicious or Vulnerable Built-in Device Functionality - T1473"
},
{
"description": "Many applications use third-party software libraries, often without full knowledge of the behavior of the libraries by the application developer. For example, mobile applications often incorporate advertising libraries to generate revenue for the application developer. Vulnerabilities in these third-party libraries could potentially be exploited in any application that uses the library, and even if the vulnerabilities are fixed, many applications may still use older, vulnerable versions of the library. (Citation: Flexera News Vulnerabilities) (Citation: Android Security Review 2015) (Citation: Android Multidex RCE)",
"meta": {
"external_id": "T1389",
"kill_chain": [
"mitre-pre-attack:technical-weakness-identification"
],
"refs": [
"https://attack.mitre.org/techniques/T1389"
]
},
"uuid": "ad124f84-52d2-40e3-95dd-cfdd44eae6ef",
"value": "Identify vulnerabilities in third-party software libraries - T1389"
},
{
"description": "Adding an entry to the \"run keys\" in the Registry or startup folder will cause the program referenced to be executed when a user logs in. (Citation: Microsoft Run Key) These programs will be executed under the context of the user and will have the account's associated permissions level.\n\nThe following run keys are created by default on Windows systems:\n* <code>HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run</code>\n* <code>HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce</code>\n* <code>HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Run</code>\n* <code>HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce</code>\n\nThe <code>HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\RunOnceEx</code> is also available but is not created by default on Windows Visa and newer. Registry run key entries can reference programs directly or list them as a dependency. (Citation: Microsoft RunOnceEx APR 2018) For example, it is possible to load a DLL at logon using a \"Depend\" key with RunOnceEx: <code>reg add HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\RunOnceEx\\0001\\Depend /v 1 /d \"C:\\temp\\evil[.]dll\"</code> (Citation: Oddvar Moe RunOnceEx Mar 2018)\n\nThe following Registry keys can be used to set startup folder items for persistence:\n* <code>HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\User Shell Folders</code>\n* <code>HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Shell Folders</code>\n* <code>HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Shell Folders</code>\n* <code>HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\User Shell Folders</code>\n\nAdversaries can use these configuration locations to execute malware, such as remote access tools, to maintain persistence through system reboots. Adversaries may also use [Masquerading](https://attack.mitre.org/techniques/T1036) to make the Registry entries look as if they are associated with legitimate programs.",
"meta": {
"external_id": "CAPEC-270",
"kill_chain": [
"mitre-attack:persistence"
],
"mitre_data_sources": [
"Windows Registry",
"File monitoring"
],
"mitre_platforms": [
"Windows"
],
"refs": [
"https://attack.mitre.org/techniques/T1060",
"https://capec.mitre.org/data/definitions/270.html",
"http://msdn.microsoft.com/en-us/library/aa376977",
"https://support.microsoft.com/help/310593/description-of-the-runonceex-registry-key",
"https://oddvar.moe/2018/03/21/persistence-using-runonceex-hidden-from-autoruns-exe/",
"https://technet.microsoft.com/en-us/sysinternals/bb963902"
]
},
"uuid": "9422fc14-1c43-410d-ab0f-a709b76c72dc",
"value": "Registry Run Keys / Startup Folder - T1060"
},
{
"description": "An adversary could exploit signaling system vulnerabilities to redirect calls or text messages to a phone number under the attacker's control. The adversary could then act as a man-in-the-middle to intercept or manipulate the communication. (Citation: Engel-SS7) (Citation: Engel-SS7-2008) (Citation: 3GPP-Security) (Citation: Positive-SS7) (Citation: CSRIC5-WG10-FinalReport)",
"meta": {
"external_id": "CEL-37",
"kill_chain": [
"mitre-mobile-attack:network-effects"
],
"mitre_platforms": [
"Android",
"iOS"
],
"refs": [
"https://attack.mitre.org/techniques/T1449",
"https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-37.html",
"https://berlin.ccc.de/~tobias/31c3-ss7-locate-track-manipulate.pdf",
"https://www.youtube.com/watch?v=q0n5ySqbfdI",
"http://www.3gpp.org/ftp/tsg_sa/wg3_security/_specs/33900-120.pdf",
"https://www.ptsecurity.com/upload/ptcom/PT-SS7-AD-Data-Sheet-eng.pdf",
"https://www.fcc.gov/files/csric5-wg10-finalreport031517pdf"
]
},
"uuid": "fb3fa94a-3aee-4ab0-b7e7-abdf0a51286d",
"value": "Exploit SS7 to Redirect Phone Calls/SMS - T1449"
},
{
"description": "Data exfiltration is performed over the Command and Control channel. Data is encoded into the normal communications channel using the same protocol as command and control communications.",
"meta": {
"external_id": "T1041",
"kill_chain": [
"mitre-attack:exfiltration"
],
"mitre_data_sources": [
"User interface",
"Process monitoring"
],
"mitre_platforms": [
"Linux",
"macOS",
"Windows"
],
"refs": [
"https://attack.mitre.org/techniques/T1041",
"https://arxiv.org/ftp/arxiv/papers/1408/1408.1136.pdf"
]
},
"uuid": "92d7da27-2d91-488e-a00c-059dc162766d",
"value": "Exfiltration Over Command and Control Channel - T1041"
},
{
"description": "Physical access may be required for certain types of adversarial actions. (Citation: CyberPhysicalAssessment) (Citation: CriticalInfrastructureAssessment)",
"meta": {
"external_id": "T1302",
"kill_chain": [
"mitre-pre-attack:organizational-weakness-identification"
],
"refs": [
"https://attack.mitre.org/techniques/T1302"
]
},
"uuid": "31a57c70-6709-4d06-a473-c3df1f74c1d4",
"value": "Assess security posture of physical locations - T1302"
},
{
"description": "Domain Names are the human readable names used to represent one or more IP addresses. IP addresses are the unique identifier of computing devices on a network. Both pieces of information are valuable to an adversary who is looking to understand the structure of a network. (Citation: RSA-APTRecon)",
"meta": {
"external_id": "T1250",
"kill_chain": [
"mitre-pre-attack:technical-information-gathering"
],
"refs": [
"https://attack.mitre.org/techniques/T1250"
]
},
"uuid": "23ecb7e0-0340-43d9-80a5-8971fe866ddf",
"value": "Determine domain and IP address space - T1250"
},
{
"description": "If an adversary can identify which security tools a victim is using they may be able to identify ways around those tools. (Citation: CrowdStrike Putter Panda)",
"meta": {
"external_id": "T1290",
"kill_chain": [
"mitre-pre-attack:technical-weakness-identification"
],
"refs": [
"https://attack.mitre.org/techniques/T1290",
"http://cdn0.vox-cdn.com/assets/4589853/crowdstrike-intelligence-report-putter-panda.original.pdf"
]
},
"uuid": "b26babc7-9127-4bd5-9750-5e49748c9be3",
"value": "Research visibility gap of security vendors - T1290"
},
{
"description": "An adversary could exploit signaling system vulnerabilities to track the location of mobile devices. (Citation: Engel-SS7) (Citation: Engel-SS7-2008) (Citation: 3GPP-Security) (Citation: Positive-SS7) (Citation: CSRIC5-WG10-FinalReport)",
"meta": {
"external_id": "CEL-38",
"kill_chain": [
"mitre-mobile-attack:network-effects"
],
"mitre_platforms": [
"Android",
"iOS"
],
"refs": [
"https://attack.mitre.org/techniques/T1450",
"https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-38.html",
"https://berlin.ccc.de/~tobias/31c3-ss7-locate-track-manipulate.pdf",
"http://www.3gpp.org/ftp/tsg_sa/wg3_security/_specs/33900-120.pdf",
"https://www.youtube.com/watch?v=q0n5ySqbfdI",
"https://www.ptsecurity.com/upload/ptcom/PT-SS7-AD-Data-Sheet-eng.pdf",
"https://www.fcc.gov/files/csric5-wg10-finalreport031517pdf"
]
},
"uuid": "52651225-0b3a-482d-aa7e-10618fd063b5",
"value": "Exploit SS7 to Track Device Location - T1450"
},
{
"description": "On versions of Android prior to 4.1, an adversary may use a malicious application that holds the READ_LOGS permission to obtain private keys, passwords, other credentials, or other sensitive data stored in the device's system log. On Android 4.1 and later, an adversary would need to attempt to perform an operating system privilege escalation attack to be able to access the log.",
"meta": {
"external_id": "APP-13",
"kill_chain": [
"mitre-mobile-attack:collection",
"mitre-mobile-attack:credential-access"
],
"mitre_platforms": [
"Android"
],
"refs": [
"https://attack.mitre.org/techniques/T1413",
"https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-3.html",
"https://pages.nist.gov/mobile-threat-catalogue/application-threats/APP-13.html"
]
},
"uuid": "29e07491-8947-43a3-8d4e-9a787c45f3d3",
"value": "Access Sensitive Data in Device Logs - T1413"
},
{
"description": "An adversary could steal developer account credentials on an app store and/or signing keys to publish malicious updates to existing Android or iOS apps, or to abuse the developer's identity and reputation to publish new malicious applications. For example, Infoworld describes this technique and suggests mitigations in (Citation: Infoworld-Appstore).\n\nDetection: Developers can regularly scan (or have a third party scan on their behalf) the app stores for presence of unauthorized apps that were submitted using the developer's identity.\n\nPlatforms: Android, iOS",
"meta": {
"external_id": "T1441",
"refs": [
"https://attack.mitre.org/techniques/T1441"
]
},
"related": [
{
"dest-uuid": "d9db3d46-66ca-44b4-9daa-1ef97cb7465a",
"tags": [
"estimative-language:likelihood-probability=\"almost-certain\""
],
"type": "revoked-by"
}
],
"uuid": "a21a6a79-f9a1-4c87-aed9-ba2d79536881",
"value": "Stolen Developer Credentials or Signing Keys - T1441"
},
{
"description": "Both newly built personas and pre-compromised personas may require development of additional documentation to make them seem real. This could include filling out profile information, developing social networks, or incorporating photos. (Citation: NEWSCASTER2014) (Citation: BlackHatRobinSage) (Citation: RobinSageInterview)",
"meta": {
"external_id": "T1342",
"kill_chain": [
"mitre-pre-attack:persona-development"
],
"refs": [
"https://attack.mitre.org/techniques/T1342"
]
},
"uuid": "271e6d40-e191-421a-8f87-a8102452c201",
"value": "Develop social network persona digital footprint - T1342"
},
{
"description": "Once a 3rd party vendor has been identified as being of interest it can be probed for vulnerabilities just like the main target would be. (Citation: Zetter2015Threats) (Citation: WSJTargetBreach)",
"meta": {
"external_id": "T1298",
"kill_chain": [
"mitre-pre-attack:organizational-weakness-identification"
],
"refs": [
"https://attack.mitre.org/techniques/T1298"
]
},
"uuid": "1def484d-2343-470d-8925-88f45b5f9615",
"value": "Assess vulnerability of 3rd party vendors - T1298"
},
{
"description": "An adversary could use access to a compromised device's credentials to attempt to manipulate app store rankings or ratings by triggering application downloads or posting fake reviews of applications. This technique likely requires privileged access (a rooted or jailbroken device).",
"meta": {
"external_id": "T1452",
"kill_chain": [
"mitre-mobile-attack:effects"
],
"mitre_platforms": [
"Android",
"iOS"
],
"refs": [
"https://attack.mitre.org/techniques/T1452"
]
},
"uuid": "76c12fc8-a4eb-45d6-a3b7-e371a7248f69",
"value": "Manipulate App Store Rankings or Ratings - T1452"
},
{
"description": "Open source intelligence (OSINT) is intelligence gathered from publicly available sources. This can include both information gathered on-line, such as from search engines, as well as in the physical world. (Citation: RSA-APTRecon)",
"meta": {
"external_id": "T1247",
"kill_chain": [
"mitre-pre-attack:technical-information-gathering"
],
"refs": [
"https://attack.mitre.org/techniques/T1247"
]
},
"related": [
{
"dest-uuid": "2b9a666e-bd59-4f67-9031-ed41b428e04a",
"tags": [
"estimative-language:likelihood-probability=\"almost-certain\""
],
"type": "related-to"
},
{
"dest-uuid": "028ad431-84c5-4eb7-a364-2b797c234f88",
"tags": [
"estimative-language:likelihood-probability=\"almost-certain\""
],
"type": "related-to"
}
],
"uuid": "784ff1bc-1483-41fe-a172-4cd9ae25c06b",
"value": "Acquire OSINT data sets and information - T1247"
},
{
"description": "Open source intelligence (OSINT) provides free, readily available information about a target while providing the target no indication they are of interest. Such information can assist an adversary in crafting a successful approach for compromise. (Citation: RSA-APTRecon)",
"meta": {
"external_id": "T1266",
"kill_chain": [
"mitre-pre-attack:people-information-gathering"
],
"refs": [
"https://attack.mitre.org/techniques/T1266"
]
},
"related": [
{
"dest-uuid": "028ad431-84c5-4eb7-a364-2b797c234f88",
"tags": [
"estimative-language:likelihood-probability=\"almost-certain\""
],
"type": "related-to"
},
{
"dest-uuid": "784ff1bc-1483-41fe-a172-4cd9ae25c06b",
"tags": [
"estimative-language:likelihood-probability=\"almost-certain\""
],
"type": "related-to"
}
],
"uuid": "2b9a666e-bd59-4f67-9031-ed41b428e04a",
"value": "Acquire OSINT data sets and information - T1266"
},
{
"description": "Data sets can be anything from Security Exchange Commission (SEC) filings to public phone numbers. Many datasets are now either publicly available for free or can be purchased from a variety of data vendors. Open source intelligence (OSINT) is intelligence gathered from publicly available sources. This can include both information gathered on-line as well as in the physical world. (Citation: SANSThreatProfile) (Citation: Infosec-osint) (Citation: isight-osint)",
"meta": {
"external_id": "T1277",
"kill_chain": [
"mitre-pre-attack:organizational-information-gathering"
],
"refs": [
"https://attack.mitre.org/techniques/T1277"
]
},
"related": [
{
"dest-uuid": "2b9a666e-bd59-4f67-9031-ed41b428e04a",
"tags": [
"estimative-language:likelihood-probability=\"almost-certain\""
],
"type": "related-to"
},
{
"dest-uuid": "784ff1bc-1483-41fe-a172-4cd9ae25c06b",
"tags": [
"estimative-language:likelihood-probability=\"almost-certain\""
],
"type": "related-to"
}
],
"uuid": "028ad431-84c5-4eb7-a364-2b797c234f88",
"value": "Acquire OSINT data sets and information - T1277"
},
{
"description": "During mergers, divestitures, or other period of change in joint infrastructure or business processes there may be an opportunity for exploitation. During this type of churn, unusual requests, or other non standard practices may not be as noticeable. (Citation: RossiMergers) (Citation: MeidlHealthMergers)",
"meta": {
"external_id": "T1299",
"kill_chain": [
"mitre-pre-attack:organizational-weakness-identification"
],
"refs": [
"https://attack.mitre.org/techniques/T1299"
]
},
"uuid": "e2aa077d-60c9-4de5-b015-a9c382877cd9",
"value": "Assess opportunities created by business deals - T1299"
},
{
"description": "Fake certificates can be acquired by legal process or coercion. Or, an adversary can trick a Certificate Authority into issuing a certificate. These fake certificates can be used as a part of Man-in-the-Middle attacks. (Citation: SubvertSSL)",
"meta": {
"external_id": "T1338",
"kill_chain": [
"mitre-pre-attack:establish-&-maintain-infrastructure"
],
"refs": [
"https://attack.mitre.org/techniques/T1338"
]
},
"uuid": "54a42187-a20c-4e4e-ba31-8d15c9e1f57f",
"value": "SSL certificate acquisition for trust breaking - T1338"
},
{
"description": "As with legitimate development efforts, different skill sets may be required for different phases of an attack. The skills needed may be located in house, can be developed, or may need to be contracted out. (Citation: APT1)",
"meta": {
"external_id": "T1348",
"kill_chain": [
"mitre-pre-attack:build-capabilities"
],
"refs": [
"https://attack.mitre.org/techniques/T1348"
]
},
"uuid": "c9fb4451-729d-4771-b205-52c1829f949c",
"value": "Identify resources required to build capabilities - T1348"
},
{
"description": "During production and distribution, the placement of software, firmware, or a CPU chip in a computer, handheld, or other electronic device that enables an adversary to gain illegal entrance. (Citation: McDRecall) (Citation: SeagateMaxtor)",
"meta": {
"external_id": "T1365",
"kill_chain": [
"mitre-pre-attack:stage-capabilities"
],
"refs": [
"https://attack.mitre.org/techniques/T1365"
]
},
"uuid": "388f3a5c-2cdd-466c-9159-b507fa429fcd",
"value": "Hardware or software supply chain implant - T1365"
},
{
"description": "Malware may perform differently on different platforms (computer vs handheld) and different operating systems ([Ubuntu](http://www.ubuntu.com) vs [OS X](http://www.apple.com/osx)), and versions ([Windows](http://windows.microsoft.com) 7 vs 10) so malicious actors will test their malware in the environment(s) where they most expect it to be executed. (Citation: BypassMalwareDefense)",
"meta": {
"external_id": "T1357",
"kill_chain": [
"mitre-pre-attack:test-capabilities"
],
"refs": [
"https://attack.mitre.org/techniques/T1357"
]
},
"uuid": "e042a41b-5ecf-4f3a-8f1f-1b528c534772",
"value": "Test malware in various execution environments - T1357"
},
{
"description": "This technique has been deprecated. Please see ATT&CK's Initial Access and Execution tactics for replacement techniques.\n\nSocial Engineering is the practice of manipulating people in order to get them to divulge information or take an action. Human Intelligence (HUMINT) is intelligence collected and provided by human sources. (Citation: 17millionScam) (Citation: UbiquityEmailScam)",
"meta": {
"external_id": "T1376",
"kill_chain": [
"mitre-pre-attack:launch"
],
"refs": [
"https://attack.mitre.org/techniques/T1376"
]
},
"uuid": "b79a1960-d0be-4b51-bb62-b27e91e1dea0",
"value": "Conduct social engineering or HUMINT operation - T1376"
},
{
"description": "This technique has been deprecated. Please see ATT&CK's Initial Access and Execution tactics for replacement techniques.\n\nEmails with malicious attachments are designed to get a user to open/execute the attachment in order to deliver malware payloads. (Citation: APT1)",
"meta": {
"external_id": "T1367",
"kill_chain": [
"mitre-pre-attack:launch"
],
"refs": [
"https://attack.mitre.org/techniques/T1367"
]
},
"uuid": "e24a9f99-cb76-42a3-a50b-464668773e97",
"value": "Spear phishing messages with malicious attachments - T1367"
},
{
"description": "This technique has been deprecated. Please see ATT&CK's Initial Access and Execution tactics for replacement techniques.\n\nClicking on links in email, opening attachments, or visiting websites that result in drive by downloads can all result in compromise due to users performing actions of a cyber nature. (Citation: AnonHBGary)",
"meta": {
"external_id": "T1386",
"kill_chain": [
"mitre-pre-attack:compromise"
],
"refs": [
"https://attack.mitre.org/techniques/T1386"
]
},
"uuid": "0440f60f-9056-4791-a740-8eae96eb61fa",
"value": "Authorized user performs requested cyber action - T1386"
},
{
"description": "This technique has been deprecated. Please see ATT&CK's Initial Access and Execution tactics for replacement techniques.\n\nEmails with text only phishing messages do not contain any attachments or links to websites. They are designed to get a user to take a follow on action such as calling a phone number or wiring money. They can also be used to elicit an email response to confirm existence of an account or user. (Citation: Paypal Phone Scam)",
"meta": {
"external_id": "T1368",
"kill_chain": [
"mitre-pre-attack:launch"
],
"refs": [
"https://attack.mitre.org/techniques/T1368"