Create Mitre-Unknown_2020_04-27.json

This commit is contained in:
StrangerealIntel 2020-04-27 21:34:41 +02:00 committed by GitHub
parent 8056a018ac
commit bd12476e87
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -0,0 +1,37 @@
[
{
"Id": "T1012",
"Name": "Query Registry",
"Type": "Discovery",
"Description": "Adversaries may interact with the Windows Registry to gather information about the system, configuration, and installed software.",
"URL": "https://attack.mitre.org/techniques/T1012"
},
{
"Id": "T1033",
"Name": "System Owner/User Discovery",
"Type": "Discovery",
"Description": "Adversaries may attempt to identify the primary user, currently logged in user, set of users that commonly uses a system, or whether a user is actively using the system. They may do this, for example, by retrieving account usernames or by using Credential Dumping. The information may be collected in a number of different ways using other Discovery techniques, because user and username details are prevalent throughout a system and include running process ownership, file/directory ownership, session information, and system logs.",
"URL": "https://attack.mitre.org/techniques/T1033"
},
{
"Id": "T1064",
"Name": "Scripting",
"Type": "Defense Evasion, Execution",
"Description": "Adversaries may use scripts to aid in operations and perform multiple actions that would otherwise be manual. Scripting is useful for speeding up operational tasks and reducing the time required to gain access to critical resources. Some scripting languages may be used to bypass process monitoring mechanisms by directly interacting with the operating system at an API level instead of calling other programs. Common scripting languages for Windows include VBScript and PowerShell but could also be in the form of command-line batch scripts.",
"URL": "https://attack.mitre.org/techniques/T1064"
},
{
"Id": "T1086",
"Name": "PowerShell",
"Type": "Execution",
"Description": "PowerShell is a powerful interactive command-line interface and scripting environment included in the Windows operating system. Adversaries can use PowerShell to perform a number of actions, including discovery of information and execution of code. Examples include the Start-Process cmdlet which can be used to run an executable and the Invoke-Command cmdlet which runs a command locally or on a remote computer.",
"URL": "https://attack.mitre.org/techniques/T1086"
},
{
"Id": "T1170",
"Name": "Mshta",
"Type": "Defense Evasion, Execution",
"Description": "Mshta.exe is a utility that executes Microsoft HTML Applications (HTA). HTA files have the file extension .hta. HTAs are standalone applications that execute using the same models and technologies of Internet Explorer, but outside of the browser.",
"URL": "https://attack.mitre.org/techniques/T1170"
}
]