diff --git a/CHANGELOG.md b/CHANGELOG.md index ca3cb2f0b7e..c1a15a12982 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,5 +1,12 @@ # Website Changelog +## v4.4.1 (2025-11-13) + +### Features + +* Release ATT&CK content version 18.1. + See detailed changes [here](https://github.com/mitre/cti/releases/tag/ATT%26CK-v18.1). + ## v4.4.0 (2025-10-28) ### Features diff --git a/data/versions.json b/data/versions.json index f4bbf861ab8..d82e7d79863 100644 --- a/data/versions.json +++ b/data/versions.json @@ -1,9 +1,9 @@ { "current": { - "name": "v18.0", + "name": "v18.1", "date_start": "October 28, 2025", "changelog": "updates-october-2025", - "cti_url": "https://github.com/mitre/cti/releases/tag/ATT%26CK-v18.0" + "cti_url": "https://github.com/mitre/cti/releases/tag/ATT%26CK-v18.1" }, "previous": [ { diff --git a/modules/resources/docs/changelogs/v18.0-v18.1/changelog-detailed.html b/modules/resources/docs/changelogs/v18.0-v18.1/changelog-detailed.html new file mode 100644 index 00000000000..1eca7bb8877 --- /dev/null +++ b/modules/resources/docs/changelogs/v18.0-v18.1/changelog-detailed.html @@ -0,0 +1,4997 @@ + + + + ATT&CK Changes + + + + +

ATT&CK Changes Between v18.0 and v18.1

Key

+ + + + +
+ + + + + +
Colors for description field
Added
Changed
Deleted
+
+

Additional formats

+

These ATT&CK Navigator layer files can be uploaded to ATT&CK Navigator manually.

+ +

This JSON file contains the machine readble output used to create this page: changelog.json

+

Techniques

enterprise-attack

Patches

[T1574.001] Hijack Execution Flow: DLL

Current version: 2.1

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-24 17:48:35.900000+00:002025-11-06 17:52:37.747000+00:00
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributorsYusuke Niwa, ITOCHU Cyber & Intelligence Inc.
x_mitre_contributorsSuguru Ishimaru, ITOCHU Cyber & Intelligence Inc.
x_mitre_contributorsHajime Yanagishita, Macnica, Inc.

[T1564.006] Hide Artifacts: Run Virtual Instance

Current version: 1.3

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Adversaries may carry out malicious operations using a virtut1Adversaries may carry out malicious operations using a virtu
>al instance to avoid detection. A wide variety of virtualiza>al instance to avoid detection. A wide variety of virtualiza
>tion technologies exist that allow for the emulation of a co>tion technologies exist that allow for the emulation of a co
>mputer or computing environment. By running malicious code i>mputer or computing environment. By running malicious code i
>nside of a virtual instance, adversaries can hide artifacts >nside of a virtual instance, adversaries can hide artifacts 
>associated with their behavior from security tools that are >associated with their behavior from security tools that are 
>unable to monitor activity inside the virtual instance.(Cita>unable to monitor activity inside the virtual instance.(Cita
>tion: CyberCX Akira Ransomware) Additionally, depending on t>tion: CyberCX Akira Ransomware) Additionally, depending on t
>he virtual networking implementation (ex: bridged adapter), >he virtual networking implementation (ex: bridged adapter), 
>network traffic generated by the virtual instance can be dif>network traffic generated by the virtual instance can be dif
>ficult to trace back to the compromised host as the IP addre>ficult to trace back to the compromised host as the IP addre
>ss and hostname might not match known values.(Citation: Sing>ss and hostname might not match known values.(Citation: Sing
>Health Breach Jan 2019)  Adversaries may utilize native supp>Health Breach Jan 2019)  Adversaries may utilize native supp
>ort for virtualization (ex: Hyper-V), deploy lightweight emu>ort for virtualization (ex: Hyper-V), deploy lightweight emu
>lators (ex: QEMU), or drop the necessary files to run a virt>lators (ex: QEMU), or drop the necessary files to run a virt
>ual instance (ex: VirtualBox binaries).(Citation: Securonix >ual instance (ex: VirtualBox binaries).(Citation: Securonix 
>CronTrap 2024) After running a virtual instance, adversaries>CronTrap 2024) After running a virtual instance, adversaries
> may create a shared folder between the guest and host with > may create a shared folder between the guest and host with 
>permissions that enable the virtual instance to interact wit>permissions that enable the virtual instance to interact wit
>h the host file system.(Citation: Sophos Ragnar May 2020)  T>h the host file system.(Citation: Sophos Ragnar May 2020)  T
>hreat actors may also leverage temporary virtualized environ>hreat actors may also leverage temporary virtualized environ
>ments such as the Windows Sandbox, which supports the use of>ments such as the Windows Sandbox, which supports the use of
> `.wsb` configuration files for defining execution parameter> `.wsb` configuration files for defining execution parameter
>s. For example, the `<MappedFolder>` property supports the c>s. For example, the `<MappedFolder>` property supports the c
>reation of a shared folder, while the `<LogonCommand>` prope>reation of a shared folder, while the `<LogonCommand>` prope
>rty allows the specification of a payload.(Citation: ESET Mi>rty allows the specification of a payload.(Citation: ESET Mi
>rrorFace 2025)  In VMWare environments, adversaries may leve>rrorFace 2025)(Citation: ITOCHU Hack the Sandbox)(Citation: 
>rage the vCenter console to create new virtual machines. How>ITOCHU Sandbox PPT)  In VMWare environments, adversaries may
>ever, they may also create virtual machines directly on ESXi> leverage the vCenter console to create new virtual machines
> servers by running a valid `.vmx` file with the `/bin/vmx` >. However, they may also create virtual machines directly on
>utility. Adding this command to `/etc/rc.local.d/local.sh` (> ESXi servers by running a valid `.vmx` file with the `/bin/
>i.e., [RC Scripts](https://attack.mitre.org/techniques/T1037>vmx` utility. Adding this command to `/etc/rc.local.d/local.
>/004)) will cause the VM to persistently restart.(Citation: >sh` (i.e., [RC Scripts](https://attack.mitre.org/techniques/
>vNinja Rogue VMs 2024) Creating a VM this way prevents it fr>T1037/004)) will cause the VM to persistently restart.(Citat
>om appearing in the vCenter console or in the output to the >ion: vNinja Rogue VMs 2024) Creating a VM this way prevents 
>`vim-cmd vmsvc/getallvms` command on the ESXi server, thereb>it from appearing in the vCenter console or in the output to
>y hiding it from typical administrative activities.(Citation> the `vim-cmd vmsvc/getallvms` command on the ESXi server, t
>: MITRE VMware Abuse 2024)>hereby hiding it from typical administrative activities.(Cit
 >ation: MITRE VMware Abuse 2024)
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-24 17:49:15.607000+00:002025-11-05 15:22:05.269000+00:00
descriptionAdversaries may carry out malicious operations using a virtual instance to avoid detection. A wide variety of virtualization technologies exist that allow for the emulation of a computer or computing environment. By running malicious code inside of a virtual instance, adversaries can hide artifacts associated with their behavior from security tools that are unable to monitor activity inside the virtual instance.(Citation: CyberCX Akira Ransomware) Additionally, depending on the virtual networking implementation (ex: bridged adapter), network traffic generated by the virtual instance can be difficult to trace back to the compromised host as the IP address and hostname might not match known values.(Citation: SingHealth Breach Jan 2019) + +Adversaries may utilize native support for virtualization (ex: Hyper-V), deploy lightweight emulators (ex: QEMU), or drop the necessary files to run a virtual instance (ex: VirtualBox binaries).(Citation: Securonix CronTrap 2024) After running a virtual instance, adversaries may create a shared folder between the guest and host with permissions that enable the virtual instance to interact with the host file system.(Citation: Sophos Ragnar May 2020) + +Threat actors may also leverage temporary virtualized environments such as the Windows Sandbox, which supports the use of `.wsb` configuration files for defining execution parameters. For example, the `` property supports the creation of a shared folder, while the `` property allows the specification of a payload.(Citation: ESET MirrorFace 2025) + +In VMWare environments, adversaries may leverage the vCenter console to create new virtual machines. However, they may also create virtual machines directly on ESXi servers by running a valid `.vmx` file with the `/bin/vmx` utility. Adding this command to `/etc/rc.local.d/local.sh` (i.e., [RC Scripts](https://attack.mitre.org/techniques/T1037/004)) will cause the VM to persistently restart.(Citation: vNinja Rogue VMs 2024) Creating a VM this way prevents it from appearing in the vCenter console or in the output to the `vim-cmd vmsvc/getallvms` command on the ESXi server, thereby hiding it from typical administrative activities.(Citation: MITRE VMware Abuse 2024)Adversaries may carry out malicious operations using a virtual instance to avoid detection. A wide variety of virtualization technologies exist that allow for the emulation of a computer or computing environment. By running malicious code inside of a virtual instance, adversaries can hide artifacts associated with their behavior from security tools that are unable to monitor activity inside the virtual instance.(Citation: CyberCX Akira Ransomware) Additionally, depending on the virtual networking implementation (ex: bridged adapter), network traffic generated by the virtual instance can be difficult to trace back to the compromised host as the IP address and hostname might not match known values.(Citation: SingHealth Breach Jan 2019) + +Adversaries may utilize native support for virtualization (ex: Hyper-V), deploy lightweight emulators (ex: QEMU), or drop the necessary files to run a virtual instance (ex: VirtualBox binaries).(Citation: Securonix CronTrap 2024) After running a virtual instance, adversaries may create a shared folder between the guest and host with permissions that enable the virtual instance to interact with the host file system.(Citation: Sophos Ragnar May 2020) + +Threat actors may also leverage temporary virtualized environments such as the Windows Sandbox, which supports the use of `.wsb` configuration files for defining execution parameters. For example, the `` property supports the creation of a shared folder, while the `` property allows the specification of a payload.(Citation: ESET MirrorFace 2025)(Citation: ITOCHU Hack the Sandbox)(Citation: ITOCHU Sandbox PPT) + +In VMWare environments, adversaries may leverage the vCenter console to create new virtual machines. However, they may also create virtual machines directly on ESXi servers by running a valid `.vmx` file with the `/bin/vmx` utility. Adding this command to `/etc/rc.local.d/local.sh` (i.e., [RC Scripts](https://attack.mitre.org/techniques/T1037/004)) will cause the VM to persistently restart.(Citation: vNinja Rogue VMs 2024) Creating a VM this way prevents it from appearing in the vCenter console or in the output to the `vim-cmd vmsvc/getallvms` command on the ESXi server, thereby hiding it from typical administrative activities.(Citation: MITRE VMware Abuse 2024)
external_references[6]['source_name']Shadowbunny VM Defense EvasionITOCHU Sandbox PPT
external_references[6]['description']Johann Rehberger. (2020, September 23). Beware of the Shadowbunny - Using virtual machines to persist and evade detections. Retrieved September 22, 2021.ITOCHU Cyber & Intelligence Inc.. (n.d.). Hack The Sandbox: Unveiling the Truth Behind Disappearing Artifacts. Retrieved November 5, 2025.
external_references[6]['url']https://embracethered.com/blog/posts/2020/shadowbunny-virtual-machine-red-teaming-technique/https://jsac.jpcert.or.jp/archive/2025/pdf/JSAC2025_2_9_kamekawa_sasada_niwa_en.pdf
iterable_item_added
STIX FieldOld valueNew Value
external_references{'source_name': 'ITOCHU Hack the Sandbox', 'description': 'ITOCHU Cyber & Intelligence Inc.. (2025, March 12). Hack The Sandbox: Unveiling the Truth Behind Disappearing Artifacts. Retrieved November 5, 2025.', 'url': 'https://blog-en.itochuci.co.jp/entry/2025/03/12/140000'}

[T1199] Trusted Relationship

Current version: 2.4

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-24 17:49:09.835000+00:002025-11-12 15:42:52.705000+00:00
x_mitre_attack_spec_version3.2.03.3.0

mobile-attack

New Techniques

[T1454] Malicious SMS Message

Current version: 1.0

Description:

Test

Groups

enterprise-attack

Patches

[G0094] Kimsuky

Current version: 5.1

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-24 00:59:31.235000+00:002025-11-12 18:55:12.319000+00:00
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_contributorsWai Linn Oo @ Kernellix

[G0129] Mustang Panda

Current version: 3.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-23 18:52:40.872000+00:002025-11-04 19:40:42.270000+00:00
x_mitre_contributors[2]YH Chang, ZScaler ThreatLabzZScaler ThreatLabz

Campaigns

enterprise-attack

Patches

[C0058] SharePoint ToolShell Exploitation

Current version: 1.0

+ + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1The [SharePoint ToolShell Exploitation](https://attack.mitret1The [SharePoint ToolShell Exploitation](https://attack.mitre
>.org/campaigns/C0058) campaign was conducted in July 2025 an>.org/campaigns/C0058) campaign was conducted in July 2025 an
>d encompassed the first waves of exploitation against incomp>d encompassed the first waves of exploitation against incomp
>etely patched spoofing (CVE-2025-49706) and remote code exec>letely patched spoofing (CVE-2025-49706) and remote code exe
>ution (CVE-2025-49704) vulnerabilities affecting on-premises>cution (CVE-2025-49704) vulnerabilities affecting on-premise
> Microsoft SharePoint servers. Later patched and updated as >s Microsoft SharePoint servers. Later patched and updated as
>CVE-2025-53770 and CVE-2025-53771, the ToolShell vulnerabili> CVE-2025-53770 and CVE-2025-53771, the ToolShell vulnerabil
>ties were widely exploited including by China-based ransomwa>ities were widely exploited including by China-based ransomw
>re actor Storm-2603 and espionage actors [Threat Group-3390]>are actor Storm-2603 and espionage actors [Threat Group-3390
>(https://attack.mitre.org/groups/G0027) and [ZIRCONIUM](http>](https://attack.mitre.org/groups/G0027) and [ZIRCONIUM](htt
>s://attack.mitre.org/groups/G0128). [SharePoint ToolShell Ex>ps://attack.mitre.org/groups/G0128). [SharePoint ToolShell E
>ploitation](https://attack.mitre.org/campaigns/C0058) target>xploitation](https://attack.mitre.org/campaigns/C0058) targe
>ed multiple regions and industries including finance, educat>ted multiple regions and industries including finance, educa
>ion, energy, and healthcare across Asia, Europe, and the Uni>tion, energy, and healthcare across Asia, Europe, and the Un
>ted States.(Citation: Microsoft SharePoint Exploit JUL 2025)>ited States.(Citation: Microsoft SharePoint Exploit JUL 2025
>(Citation: Palo Alto SharePoint Vulnerabilities JUL 2025)(Ci>)(Citation: Palo Alto SharePoint Vulnerabilities JUL 2025)(C
>tation: Eye Research ToolShell JUL 2025)(Citation: ESET Tool>itation: Eye Research ToolShell JUL 2025)(Citation: ESET Too
>Shell JUL 2025)(Citation: Trend Micro SharePoint Attacks JUL>lShell JUL 2025)(Citation: Trend Micro SharePoint Attacks JU
> 2025) >L 2025) 
Details
dictionary_item_added
STIX FieldOld valueNew Value
x_mitre_contributors['Wai Linn Oo @ Kernellix']
values_changed
STIX FieldOld valueNew Value
modified2025-10-24 04:12:20.214000+00:002025-11-12 15:13:10.723000+00:00
descriptionThe [SharePoint ToolShell Exploitation](https://attack.mitre.org/campaigns/C0058) campaign was conducted in July 2025 and encompassed the first waves of exploitation against incompetely patched spoofing (CVE-2025-49706) and remote code execution (CVE-2025-49704) vulnerabilities affecting on-premises Microsoft SharePoint servers. Later patched and updated as CVE-2025-53770 and CVE-2025-53771, the ToolShell vulnerabilities were widely exploited including by China-based ransomware actor Storm-2603 and espionage actors [Threat Group-3390](https://attack.mitre.org/groups/G0027) and [ZIRCONIUM](https://attack.mitre.org/groups/G0128). [SharePoint ToolShell Exploitation](https://attack.mitre.org/campaigns/C0058) targeted multiple regions and industries including finance, education, energy, and healthcare across Asia, Europe, and the United States.(Citation: Microsoft SharePoint Exploit JUL 2025)(Citation: Palo Alto SharePoint Vulnerabilities JUL 2025)(Citation: Eye Research ToolShell JUL 2025)(Citation: ESET ToolShell JUL 2025)(Citation: Trend Micro SharePoint Attacks JUL 2025) +The [SharePoint ToolShell Exploitation](https://attack.mitre.org/campaigns/C0058) campaign was conducted in July 2025 and encompassed the first waves of exploitation against incompletely patched spoofing (CVE-2025-49706) and remote code execution (CVE-2025-49704) vulnerabilities affecting on-premises Microsoft SharePoint servers. Later patched and updated as CVE-2025-53770 and CVE-2025-53771, the ToolShell vulnerabilities were widely exploited including by China-based ransomware actor Storm-2603 and espionage actors [Threat Group-3390](https://attack.mitre.org/groups/G0027) and [ZIRCONIUM](https://attack.mitre.org/groups/G0128). [SharePoint ToolShell Exploitation](https://attack.mitre.org/campaigns/C0058) targeted multiple regions and industries including finance, education, energy, and healthcare across Asia, Europe, and the United States.(Citation: Microsoft SharePoint Exploit JUL 2025)(Citation: Palo Alto SharePoint Vulnerabilities JUL 2025)(Citation: Eye Research ToolShell JUL 2025)(Citation: ESET ToolShell JUL 2025)(Citation: Trend Micro SharePoint Attacks JUL 2025) +

Data Components

enterprise-attack

Patches

[DC0084] Active Directory Credential Request

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Requests for authentication credentials via Kerberos or othet1Requests for authentication credentials via Kerberos or othe
>r methods like NTLM and LDAP queries. Examples:  - Kerberos >r methods like NTLM and LDAP queries. Examples:  - Kerberos 
>TGT and Service Tickets (Event IDs 4768, 4769) - NTLM Authen>TGT and Service Tickets (Event IDs 4768, 4769) - NTLM Authen
>tication Events - LDAP Bind Requests  *Data Collection Measu>tication Events - LDAP Bind Requests.
>res:*  - Security Event Logging:     - Enable "`Audit Kerber 
>os Authentication Service`" or "`Audit Kerberos Service Tick 
>et Operations`."     - Captured Events: IDs 4768, 4769, 4624 
>. - Windows Event Forwarding (WEF): Forward domain controlle 
>r logs to SIEM. - SIEM Integration: Use tools like Splunk or 
> Azure Sentinel for log analysis. - Kerberos Debug Logging:  
>    - Registry Key: HKLM\SYSTEM\CurrentControlSet\Control\Ls 
>a\Kerberos\Parameters.     - Set DWORD LogLevel to 1. - Azur 
>e AD Logs: Monitor Sign-In Logs for authentication and polic 
>y issues. - Enable EDR Monitoring:     - Use EDR to detect s 
>uspicious processes querying authentication mechanisms (e.g. 
>, lsass.exe memory access). 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-22 18:41:09.269000+00:002025-11-12 22:03:39.105000+00:00
external_references[0]['url']https://attack.mitre.org/data-components/DC0084https://attack.mitre.org/datacomponents/DC0084
descriptionRequests for authentication credentials via Kerberos or other methods like NTLM and LDAP queries. Examples: + +- Kerberos TGT and Service Tickets (Event IDs 4768, 4769) +- NTLM Authentication Events +- LDAP Bind Requests + +*Data Collection Measures:* + +- Security Event Logging: + - Enable "`Audit Kerberos Authentication Service`" or "`Audit Kerberos Service Ticket Operations`." + - Captured Events: IDs 4768, 4769, 4624. +- Windows Event Forwarding (WEF): Forward domain controller logs to SIEM. +- SIEM Integration: Use tools like Splunk or Azure Sentinel for log analysis. +- Kerberos Debug Logging: + - Registry Key: HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters. + - Set DWORD LogLevel to 1. +- Azure AD Logs: Monitor Sign-In Logs for authentication and policy issues. +- Enable EDR Monitoring: + - Use EDR to detect suspicious processes querying authentication mechanisms (e.g., lsass.exe memory access).Requests for authentication credentials via Kerberos or other methods like NTLM and LDAP queries. Examples: + +- Kerberos TGT and Service Tickets (Event IDs 4768, 4769) +- NTLM Authentication Events +- LDAP Bind Requests.

[DC0087] Active Directory Object Creation

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Creating new objects in AD, such as user accounts, groups, ot1Creating new objects in AD, such as user accounts, groups, o
>rganizational units (OUs), or trust relationships. Logged as>rganizational units (OUs), or trust relationships. Logged as
> Event ID 5137. Examples:  - User Account Creation: New user> Event ID 5137. Examples:  - User Account Creation: New user
> account. - Group Creation: New security/distribution group.> account. - Group Creation: New security/distribution group.
> - OU Creation: New organizational unit. - Service Account C> - OU Creation: New organizational unit. - Service Account C
>reation: New service account for automation or malicious tas>reation: New service account for automation or malicious tas
>ks. - Trust Object Creation: Trust relationship with another>ks. - Trust Object Creation: Trust relationship with another
> domain.  *Data Collection Measures:*  - Audit Policy:     -> domain.
> Enable "Audit Directory Service Changes" (Success and Failu 
>re).     - Path: `Computer Configuration > Policies > Window 
>s Settings > Security Settings > Advanced Audit Policy Confi 
>guration > Audit Policies > Directory Service Changes`.      
>- Key Event: Event ID 5137 (object creation). - Log Forwardi 
>ng: Use WEF to centralize logs for SIEM tools (e.g., Splunk) 
>. - Enable EDR Monitoring:     - Track processes that create 
> new accounts or modify AD objects.     - Correlate object c 
>reation with suspicious commands (e.g., net user /add). 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:36.803000+00:002025-11-12 22:03:39.105000+00:00
descriptionCreating new objects in AD, such as user accounts, groups, organizational units (OUs), or trust relationships. Logged as Event ID 5137. Examples: + +- User Account Creation: New user account. +- Group Creation: New security/distribution group. +- OU Creation: New organizational unit. +- Service Account Creation: New service account for automation or malicious tasks. +- Trust Object Creation: Trust relationship with another domain. + +*Data Collection Measures:* + +- Audit Policy: + - Enable "Audit Directory Service Changes" (Success and Failure). + - Path: `Computer Configuration > Policies > Windows Settings > Security Settings > Advanced Audit Policy Configuration > Audit Policies > Directory Service Changes`. + - Key Event: Event ID 5137 (object creation). +- Log Forwarding: Use WEF to centralize logs for SIEM tools (e.g., Splunk). +- Enable EDR Monitoring: + - Track processes that create new accounts or modify AD objects. + - Correlate object creation with suspicious commands (e.g., net user /add).Creating new objects in AD, such as user accounts, groups, organizational units (OUs), or trust relationships. Logged as Event ID 5137. Examples: + +- User Account Creation: New user account. +- Group Creation: New security/distribution group. +- OU Creation: New organizational unit. +- Service Account Creation: New service account for automation or malicious tasks. +- Trust Object Creation: Trust relationship with another domain.

[DC0068] Active Directory Object Deletion

Current version: 2.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:40.681000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_sources[0]['name']WinEventLog:DirectoryServiceWinEventLog:Security

[DC0066] Active Directory Object Modification

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Changes to AD objects (e.g., users, groups, OUs) are logged t1Changes to AD objects (e.g., users, groups, OUs) are logged 
>as Event ID 5136 (Object Modification) or 5163 (Attribute Ch>as Event ID 5136 (Object Modification) or 5163 (Attribute Ch
>anges). Examples:  - User Account: Modifying attributes (e.g>anges). Examples:  - User Account: Modifying attributes (e.g
>., group membership, enabling/disabling accounts). - Group M>., group membership, enabling/disabling accounts). - Group M
>embership: Adding/removing members. - OU: Changing propertie>embership: Adding/removing members. - OU: Changing propertie
>s/permissions (e.g., delegation). - Service Account: Modifyi>s/permissions (e.g., delegation). - Service Account: Modifyi
>ng SPNs or other attributes. - Object Attributes: Changes to>ng SPNs or other attributes. - Object Attributes: Changes to
> passwords, logon hours, or control flags.  *Data Collection> passwords, logon hours, or control flags.
> Measures:*  - Audit Policy:     - Enable "Audit Directory S 
>ervice Changes" (Success and Failure).     - Path: `Computer 
> Configuration > Policies > Windows Settings > Security Sett 
>ings > Advanced Audit Policy Configuration > Audit Policies  
>> Directory Service Changes`.     - Key Events: 5136 (modifi 
>cations), 5163 (attribute changes). - Log Forwarding:     -  
>Use WEF to centralize logs for SIEM.     - Parse logs to ext 
>ract: Object Name, Attribute Changed, Initiator Account Name 
>. - Enable EDR Monitoring:     - Detect changes to critical  
>attributes (e.g., memberOf, logonHours).     - Track process 
>es modifying directory service objects (e.g., Set-ADUser or  
>dsmod). - Enable EDR Monitoring:     - Detect changes to cri 
>tical attributes (e.g., memberOf, logonHours).     - Track p 
>rocesses modifying directory service objects (e.g., Set-ADUs 
>er or dsmod). 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-22 18:42:57.886000+00:002025-11-12 22:03:39.105000+00:00
external_references[0]['url']https://attack.mitre.org/data-components/DC0066https://attack.mitre.org/datacomponents/DC0066
descriptionChanges to AD objects (e.g., users, groups, OUs) are logged as Event ID 5136 (Object Modification) or 5163 (Attribute Changes). Examples: + +- User Account: Modifying attributes (e.g., group membership, enabling/disabling accounts). +- Group Membership: Adding/removing members. +- OU: Changing properties/permissions (e.g., delegation). +- Service Account: Modifying SPNs or other attributes. +- Object Attributes: Changes to passwords, logon hours, or control flags. + +*Data Collection Measures:* + +- Audit Policy: + - Enable "Audit Directory Service Changes" (Success and Failure). + - Path: `Computer Configuration > Policies > Windows Settings > Security Settings > Advanced Audit Policy Configuration > Audit Policies > Directory Service Changes`. + - Key Events: 5136 (modifications), 5163 (attribute changes). +- Log Forwarding: + - Use WEF to centralize logs for SIEM. + - Parse logs to extract: Object Name, Attribute Changed, Initiator Account Name. +- Enable EDR Monitoring: + - Detect changes to critical attributes (e.g., memberOf, logonHours). + - Track processes modifying directory service objects (e.g., Set-ADUser or dsmod). +- Enable EDR Monitoring: + - Detect changes to critical attributes (e.g., memberOf, logonHours). + - Track processes modifying directory service objects (e.g., Set-ADUser or dsmod).Changes to AD objects (e.g., users, groups, OUs) are logged as Event ID 5136 (Object Modification) or 5163 (Attribute Changes). Examples: + +- User Account: Modifying attributes (e.g., group membership, enabling/disabling accounts). +- Group Membership: Adding/removing members. +- OU: Changing properties/permissions (e.g., delegation). +- Service Account: Modifying SPNs or other attributes. +- Object Attributes: Changes to passwords, logon hours, or control flags.
x_mitre_log_sources[6]['name']WinEventLog:DirectoryServiceWinEventLog:Security
x_mitre_log_sources[6]['channel']EventCode=5136EventCode=5163
x_mitre_log_sources[4]['name']azure:SigninLogsazure:signinlogs
x_mitre_log_sources[7]['channel']EventCode=4663EventCode=4663, 4670, 4656
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4670'}

[DC0038] Application Log Content

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Application Log Content refers to logs generated by applicatt1Application Log Content refers to logs generated by applicat
>ions or services, providing a record of their activity. Thes>ions or services, providing a record of their activity. Thes
>e logs may include metrics, errors, performance data, and op>e logs may include metrics, errors, performance data, and op
>erational alerts from web, mail, or other applications. Thes>erational alerts from web, mail, or other applications. Thes
>e logs are vital for monitoring application behavior and det>e logs are vital for monitoring application behavior and det
>ecting malicious activities or anomalies. Examples:   - Web >ecting malicious activities or anomalies. Examples:   - Web 
>Application Logs: These logs include information about reque>Application Logs: These logs include information about reque
>sts, responses, errors, and security events (e.g., unauthori>sts, responses, errors, and security events (e.g., unauthori
>zed access attempts). - Email Application Logs: Logs contain>zed access attempts). - Email Application Logs: Logs contain
> metadata about emails sent, received, or blocked (e.g., sen> metadata about emails sent, received, or blocked (e.g., sen
>der/receiver addresses, message IDs). - SaaS Application Log>der/receiver addresses, message IDs). - SaaS Application Log
>s: Activity logs include user logins, configuration changes,>s: Activity logs include user logins, configuration changes,
> and access to sensitive resources. - Cloud Application Logs> and access to sensitive resources. - Cloud Application Logs
>: Logs detail control plane activities, including API calls,>: Logs detail control plane activities, including API calls,
> instance modifications, and network changes. - System/Appli> instance modifications, and network changes. - System/Appli
>cation Monitoring Logs: Logs provide insights into applicati>cation Monitoring Logs: Logs provide insights into applicati
>on performance, errors, and anomalies.  This data component >on performance, errors, and anomalies.
>can be collected through the following measures:  Configure  
>Application Logging  - Enable logging within the application 
> or service. - Examples:     - Web Servers: Enable access an 
>d error logs in NGINX or Apache.     - Email Systems: Enable 
> audit logging in Microsoft Exchange or Gmail.  Centralized  
>Log Management  - Use log management solutions like Splunk,  
>or a cloud-native logging solution. - Configure the applicat 
>ion to send logs to a centralized system for analysis.  Clou 
>d-Specific Collection  - Use services like AWS CloudWatch, A 
>zure Monitor, or Google Cloud Operations Suite for cloud-bas 
>ed applications. - Ensure logging is enabled for all critica 
>l resources (e.g., API calls, IAM changes).  SIEM Integratio 
>n  - Integrate application logs with a SIEM platform (e.g.,  
>Splunk, QRadar) for real-time correlation and analysis. - Us 
>e parsers to standardize log formats and extract key fields  
>like timestamps, user IDs, and error codes. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:36.580000+00:002025-11-12 22:03:39.105000+00:00
descriptionApplication Log Content refers to logs generated by applications or services, providing a record of their activity. These logs may include metrics, errors, performance data, and operational alerts from web, mail, or other applications. These logs are vital for monitoring application behavior and detecting malicious activities or anomalies. Examples: + +- Web Application Logs: These logs include information about requests, responses, errors, and security events (e.g., unauthorized access attempts). +- Email Application Logs: Logs contain metadata about emails sent, received, or blocked (e.g., sender/receiver addresses, message IDs). +- SaaS Application Logs: Activity logs include user logins, configuration changes, and access to sensitive resources. +- Cloud Application Logs: Logs detail control plane activities, including API calls, instance modifications, and network changes. +- System/Application Monitoring Logs: Logs provide insights into application performance, errors, and anomalies. + +This data component can be collected through the following measures: + +Configure Application Logging + +- Enable logging within the application or service. +- Examples: + - Web Servers: Enable access and error logs in NGINX or Apache. + - Email Systems: Enable audit logging in Microsoft Exchange or Gmail. + +Centralized Log Management + +- Use log management solutions like Splunk, or a cloud-native logging solution. +- Configure the application to send logs to a centralized system for analysis. + +Cloud-Specific Collection + +- Use services like AWS CloudWatch, Azure Monitor, or Google Cloud Operations Suite for cloud-based applications. +- Ensure logging is enabled for all critical resources (e.g., API calls, IAM changes). + +SIEM Integration + +- Integrate application logs with a SIEM platform (e.g., Splunk, QRadar) for real-time correlation and analysis. +- Use parsers to standardize log formats and extract key fields like timestamps, user IDs, and error codes.Application Log Content refers to logs generated by applications or services, providing a record of their activity. These logs may include metrics, errors, performance data, and operational alerts from web, mail, or other applications. These logs are vital for monitoring application behavior and detecting malicious activities or anomalies. Examples: + +- Web Application Logs: These logs include information about requests, responses, errors, and security events (e.g., unauthorized access attempts). +- Email Application Logs: Logs contain metadata about emails sent, received, or blocked (e.g., sender/receiver addresses, message IDs). +- SaaS Application Logs: Activity logs include user logins, configuration changes, and access to sensitive resources. +- Cloud Application Logs: Logs detail control plane activities, including API calls, instance modifications, and network changes. +- System/Application Monitoring Logs: Logs provide insights into application performance, errors, and anomalies.
x_mitre_log_sources[17]['name']WinEventLog:Microsoft-Windows-DriverFrameworks-UserMode/OperationalWinEventLog:System
x_mitre_log_sources[37]['name']azure:signinLogsazure:signinlogs
x_mitre_log_sources[75]['name']WinEventLog:ApplicationWinEventLog:System
x_mitre_log_sources[75]['channel']EventCode=1000-1026EventCode=1000
x_mitre_log_sources[44]['channel']EventCode=7031,7034,1000,1001EventCode=1341, 1342, 1020, 1063
x_mitre_log_sources[172]['channel']EventCode=4663EventCode=4663, 4670, 4656
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Application', 'channel': 'EventCode=1000, 1001, 1002'}
x_mitre_log_sources{'name': 'WinEventLog:System', 'channel': 'EventCode=1341,1342,1020,1063'}
x_mitre_log_sources{'name': 'WinEventLog:Application', 'channel': 'EventCode=1000,1001'}

[DC0090] Cloud Service Disable

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1This data component refers to monitoring actions that deactit1This data component refers to monitoring actions that deacti
>vate or stop a cloud service in a cloud control plane. Examp>vate or stop a cloud service in a cloud control plane. Examp
>les include disabling essential logging services like AWS Cl>les include disabling essential logging services like AWS Cl
>oudTrail (`StopLogging` API call), Microsoft Azure Monitor L>oudTrail (`StopLogging` API call), Microsoft Azure Monitor L
>ogs, or Google Cloud's Operations Suite (formerly Stackdrive>ogs, or Google Cloud's Operations Suite (formerly Stackdrive
>r). Disabling such services can hinder visibility into adver>r). Disabling such services can hinder visibility into adver
>sary activities within the cloud environment. Examples:   - >sary activities within the cloud environment. Examples:   - 
>AWS CloudTrail StopLogging: This action stops logging of API>AWS CloudTrail StopLogging: This action stops logging of API
> activity for a particular trail, effectively reducing the m> activity for a particular trail, effectively reducing the m
>onitoring and visibility of AWS resources and activities. - >onitoring and visibility of AWS resources and activities. - 
>Microsoft Azure Monitor Logs: Disabling these logs hinders t>Microsoft Azure Monitor Logs: Disabling these logs hinders t
>he organization’s ability to detect anomalous activities and>he organization’s ability to detect anomalous activities and
> trace malicious actions. - Google Cloud Logging: Disabling > trace malicious actions. - Google Cloud Logging: Disabling 
>cloud logging removes visibility into resource activity, pre>cloud logging removes visibility into resource activity, pre
>venting monitoring of service access or configuration change>venting monitoring of service access or configuration change
>s. - SaaS Applications: Stopping logging removes visibility >s. - SaaS Applications: Stopping logging removes visibility 
>into user activities, such as email access or file downloads>into user activities, such as email access or file downloads
>, enabling undetected malicious behavior.  This data compone>, enabling undetected malicious behavior.
>nt can be collected through the following measures:  Enable  
>and Monitor Cloud Service Logging  - Ensure logging is enabl 
>ed for all cloud services, including administrative actions  
>like StopLogging. - Example: Use AWS Config to verify that C 
>loudTrail is enabled and enforce logging as a compliance rul 
>e.  API Monitoring  - Use API monitoring tools to detect cal 
>ls like StopLogging or equivalent service-stopping actions i 
>n other platforms. - Example: Monitor AWS CloudWatch for spe 
>cific API events such as StopLogging and flag unauthorized u 
>sers.  SIEM Integration  - Collect logs and events from the  
>cloud control plane into a centralized SIEM for real-time an 
>alysis and correlation. - Example: Ingest AWS CloudTrail log 
>s into Splunk or Azure Monitor logs into Sentinel.  Cloud Se 
>curity Posture Management (CSPM) Tools  - Leverage CSPM tool 
>s like Prisma Cloud, Dome9, or AWS Security Hub to detect mi 
>sconfigurations or suspicious activity, such as disabled log 
>ging. - Example: Set alerts for changes to logging configura 
>tions in CSPM dashboards.  Configure Alerts in Cloud Platfor 
>ms  - Create native alerts in cloud platforms to detect serv 
>ice stoppages. - Example: Configure an AWS CloudWatch alarm  
>to trigger when StopLogging is invoked. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:39.702000+00:002025-11-12 22:03:39.105000+00:00
descriptionThis data component refers to monitoring actions that deactivate or stop a cloud service in a cloud control plane. Examples include disabling essential logging services like AWS CloudTrail (`StopLogging` API call), Microsoft Azure Monitor Logs, or Google Cloud's Operations Suite (formerly Stackdriver). Disabling such services can hinder visibility into adversary activities within the cloud environment. Examples: + +- AWS CloudTrail StopLogging: This action stops logging of API activity for a particular trail, effectively reducing the monitoring and visibility of AWS resources and activities. +- Microsoft Azure Monitor Logs: Disabling these logs hinders the organization’s ability to detect anomalous activities and trace malicious actions. +- Google Cloud Logging: Disabling cloud logging removes visibility into resource activity, preventing monitoring of service access or configuration changes. +- SaaS Applications: Stopping logging removes visibility into user activities, such as email access or file downloads, enabling undetected malicious behavior. + +This data component can be collected through the following measures: + +Enable and Monitor Cloud Service Logging + +- Ensure logging is enabled for all cloud services, including administrative actions like StopLogging. +- Example: Use AWS Config to verify that CloudTrail is enabled and enforce logging as a compliance rule. + +API Monitoring + +- Use API monitoring tools to detect calls like StopLogging or equivalent service-stopping actions in other platforms. +- Example: Monitor AWS CloudWatch for specific API events such as StopLogging and flag unauthorized users. + +SIEM Integration + +- Collect logs and events from the cloud control plane into a centralized SIEM for real-time analysis and correlation. +- Example: Ingest AWS CloudTrail logs into Splunk or Azure Monitor logs into Sentinel. + +Cloud Security Posture Management (CSPM) Tools + +- Leverage CSPM tools like Prisma Cloud, Dome9, or AWS Security Hub to detect misconfigurations or suspicious activity, such as disabled logging. +- Example: Set alerts for changes to logging configurations in CSPM dashboards. + +Configure Alerts in Cloud Platforms + +- Create native alerts in cloud platforms to detect service stoppages. +- Example: Configure an AWS CloudWatch alarm to trigger when StopLogging is invoked.This data component refers to monitoring actions that deactivate or stop a cloud service in a cloud control plane. Examples include disabling essential logging services like AWS CloudTrail (`StopLogging` API call), Microsoft Azure Monitor Logs, or Google Cloud's Operations Suite (formerly Stackdriver). Disabling such services can hinder visibility into adversary activities within the cloud environment. Examples: + +- AWS CloudTrail StopLogging: This action stops logging of API activity for a particular trail, effectively reducing the monitoring and visibility of AWS resources and activities. +- Microsoft Azure Monitor Logs: Disabling these logs hinders the organization’s ability to detect anomalous activities and trace malicious actions. +- Google Cloud Logging: Disabling cloud logging removes visibility into resource activity, preventing monitoring of service access or configuration changes. +- SaaS Applications: Stopping logging removes visibility into user activities, such as email access or file downloads, enabling undetected malicious behavior.

[DC0083] Cloud Service Enumeration

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Cloud service enumeration involves listing or querying availt1Cloud service enumeration involves listing or querying avail
>able cloud services in a cloud control plane. This activity >able cloud services in a cloud control plane. This activity 
>is often performed to identify resources such as virtual mac>is often performed to identify resources such as virtual mac
>hines, storage buckets, compute clusters, or other services >hines, storage buckets, compute clusters, or other services 
>within a cloud environment. Examples include API calls like >within a cloud environment. Examples include API calls like 
>`AWS ECS ListServices`, `Azure ListAllResources`, or `Google>`AWS ECS ListServices`, `Azure ListAllResources`, or `Google
> Cloud ListInstances`. Examples:   AWS Cloud Service Enumera> Cloud ListInstances`. Examples:   AWS Cloud Service Enumera
>tion: The adversary gathers details about existing ECS servi>tion: The adversary gathers details about existing ECS servi
>ces to identify opportunities for privilege escalation or ex>ces to identify opportunities for privilege escalation or ex
>filtration. - Azure Resource Enumeration: The adversary coll>filtration. - Azure Resource Enumeration: The adversary coll
>ects information about virtual machines, resource groups, an>ects information about virtual machines, resource groups, an
>d other Azure assets for reconnaissance purposes. - Google C>d other Azure assets for reconnaissance purposes. - Google C
>loud Resource Enumeration: The attacker seeks to map the env>loud Resource Enumeration: The attacker seeks to map the env
>ironment and find misconfigured or underutilized resources f>ironment and find misconfigured or underutilized resources f
>or exploitation. - Office 365 Service Enumeration: The attac>or exploitation. - Office 365 Service Enumeration: The attac
>ker may look for data repositories or collaboration tools to>ker may look for data repositories or collaboration tools to
> exfiltrate sensitive information.  This data component can > exfiltrate sensitive information.
>be collected through the following measures:   Enable Cloud  
>Activity Logging  - Ensure cloud service logs are enabled fo 
>r API calls and resource usage. - Example: Enable AWS CloudT 
>rail, Azure Monitor, or Google Cloud Logging to track resour 
>ce queries.  Centralize Logs in a SIEM  - Aggregate logs fro 
>m cloud control planes into a centralized SIEM (e.g., Splunk 
>, Azure Sentinel). - Example: Collect AWS CloudTrail logs an 
>d set up alerts for API calls related to service enumeration 
>.  Use Native Cloud Security Tools  - Leverage cloud-native  
>security solutions like AWS GuardDuty, Azure Defender, or Go 
>ogle Security Command Center. - Example: Use GuardDuty to de 
>tect anomalous API activity, such as ListServices being exec 
>uted by an unknown user.  Implement Network Flow Logging  -  
>Monitor and analyze VPC flow logs to identify lateral moveme 
>nt or enumeration activity. - Example: Inspect flow logs for 
> unexpected traffic between compute instances and the cloud  
>control plane.  API Access Monitoring  - Monitor API keys an 
>d tokens used for enumeration to identify misuse or compromi 
>se. - Example: Use AWS Secrets Manager or Azure Key Vault to 
> manage and rotate keys securely. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:38.498000+00:002025-11-12 22:03:39.105000+00:00
descriptionCloud service enumeration involves listing or querying available cloud services in a cloud control plane. This activity is often performed to identify resources such as virtual machines, storage buckets, compute clusters, or other services within a cloud environment. Examples include API calls like `AWS ECS ListServices`, `Azure ListAllResources`, or `Google Cloud ListInstances`. Examples: + +AWS Cloud Service Enumeration: The adversary gathers details about existing ECS services to identify opportunities for privilege escalation or exfiltration. +- Azure Resource Enumeration: The adversary collects information about virtual machines, resource groups, and other Azure assets for reconnaissance purposes. +- Google Cloud Resource Enumeration: The attacker seeks to map the environment and find misconfigured or underutilized resources for exploitation. +- Office 365 Service Enumeration: The attacker may look for data repositories or collaboration tools to exfiltrate sensitive information. + +This data component can be collected through the following measures: + +Enable Cloud Activity Logging + +- Ensure cloud service logs are enabled for API calls and resource usage. +- Example: Enable AWS CloudTrail, Azure Monitor, or Google Cloud Logging to track resource queries. + +Centralize Logs in a SIEM + +- Aggregate logs from cloud control planes into a centralized SIEM (e.g., Splunk, Azure Sentinel). +- Example: Collect AWS CloudTrail logs and set up alerts for API calls related to service enumeration. + +Use Native Cloud Security Tools + +- Leverage cloud-native security solutions like AWS GuardDuty, Azure Defender, or Google Security Command Center. +- Example: Use GuardDuty to detect anomalous API activity, such as ListServices being executed by an unknown user. + +Implement Network Flow Logging + +- Monitor and analyze VPC flow logs to identify lateral movement or enumeration activity. +- Example: Inspect flow logs for unexpected traffic between compute instances and the cloud control plane. + +API Access Monitoring + +- Monitor API keys and tokens used for enumeration to identify misuse or compromise. +- Example: Use AWS Secrets Manager or Azure Key Vault to manage and rotate keys securely.Cloud service enumeration involves listing or querying available cloud services in a cloud control plane. This activity is often performed to identify resources such as virtual machines, storage buckets, compute clusters, or other services within a cloud environment. Examples include API calls like `AWS ECS ListServices`, `Azure ListAllResources`, or `Google Cloud ListInstances`. Examples: + +AWS Cloud Service Enumeration: The adversary gathers details about existing ECS services to identify opportunities for privilege escalation or exfiltration. +- Azure Resource Enumeration: The adversary collects information about virtual machines, resource groups, and other Azure assets for reconnaissance purposes. +- Google Cloud Resource Enumeration: The attacker seeks to map the environment and find misconfigured or underutilized resources for exploitation. +- Office 365 Service Enumeration: The attacker may look for data repositories or collaboration tools to exfiltrate sensitive information.

[DC0070] Cloud Service Metadata

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Cloud service metadata refers to the contextual and descriptt1Cloud service metadata refers to the contextual and descript
>ive information about cloud services, including their name, >ive information about cloud services, including their name, 
>type, purpose, configuration, and activity around them. This>type, purpose, configuration, and activity around them. This
> metadata is essential for understanding the roles and funct> metadata is essential for understanding the roles and funct
>ions of cloud services, their operational status, and their >ions of cloud services, their operational status, and their 
>potential misuse. Examples:   - Azure Service Metadata: Meta>potential misuse. Examples:   - Azure Service Metadata: Meta
>data describing a resource in Azure, such as an Azure Storag>data describing a resource in Azure, such as an Azure Storag
>e Account or a Virtual Machine. - AWS Cloud Service Metadata>e Account or a Virtual Machine. - AWS Cloud Service Metadata
>: Metadata for an AWS EC2 instance collected using the `Desc>: Metadata for an AWS EC2 instance collected using the `Desc
>ribeInstances` API call. - Google Cloud Service Metadata: Me>ribeInstances` API call. - Google Cloud Service Metadata: Me
>tadata for a Google Compute Engine instance collected using >tadata for a Google Compute Engine instance collected using 
>`gcloud compute instances describe`. - Office 365 Metadata: >`gcloud compute instances describe`. - Office 365 Metadata: 
>Metadata about an Office 365 SharePoint site.  This data com>Metadata about an Office 365 SharePoint site.
>ponent can be collected through the following measures:  Ena 
>ble Cloud Metadata APIs  - Leverage APIs provided by cloud p 
>roviders to query metadata about services.     - AWS: Use AW 
>S CLI or SDKs for `DescribeInstances`, `DescribeBuckets`, et 
>c.     - Azure: Use `az resource list` or SDKs.     - Google 
> Cloud: Use `gcloud compute instances describe` or related c 
>ommands.     - Office 365: Use Microsoft Graph API.  Central 
>ize Metadata in a Security Platform  - Aggregate metadata fr 
>om multiple clouds into a SIEM or CSPM (Cloud Security Postu 
>re Management) tool. - Example: Integrate AWS CloudTrail wit 
>h Splunk or Azure Monitor with Sentinel.  Enable Continuous  
>Monitoring  - Set up automated jobs or workflows to regularl 
>y query and update metadata. - Example: Use AWS Config to tr 
>ack resource configurations and changes over time.  Configur 
>e Access and Logging  - Enable logging for API queries to en 
>sure access and usage of metadata are monitored. - Example:  
>Use AWS CloudTrail to log API activity for metadata queries. 
>  Use Cloud Security Tools  - Employ CSPM tools like Prisma  
>Cloud, Wiz, or Dome9 to gather metadata and identify misconf 
>igurations. - Example: Prisma Cloud provides consolidated vi 
>ews of metadata for resources across AWS, Azure, and GCP. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:34.276000+00:002025-11-12 22:03:39.105000+00:00
descriptionCloud service metadata refers to the contextual and descriptive information about cloud services, including their name, type, purpose, configuration, and activity around them. This metadata is essential for understanding the roles and functions of cloud services, their operational status, and their potential misuse. Examples: + +- Azure Service Metadata: Metadata describing a resource in Azure, such as an Azure Storage Account or a Virtual Machine. +- AWS Cloud Service Metadata: Metadata for an AWS EC2 instance collected using the `DescribeInstances` API call. +- Google Cloud Service Metadata: Metadata for a Google Compute Engine instance collected using `gcloud compute instances describe`. +- Office 365 Metadata: Metadata about an Office 365 SharePoint site. + +This data component can be collected through the following measures: + +Enable Cloud Metadata APIs + +- Leverage APIs provided by cloud providers to query metadata about services. + - AWS: Use AWS CLI or SDKs for `DescribeInstances`, `DescribeBuckets`, etc. + - Azure: Use `az resource list` or SDKs. + - Google Cloud: Use `gcloud compute instances describe` or related commands. + - Office 365: Use Microsoft Graph API. + +Centralize Metadata in a Security Platform + +- Aggregate metadata from multiple clouds into a SIEM or CSPM (Cloud Security Posture Management) tool. +- Example: Integrate AWS CloudTrail with Splunk or Azure Monitor with Sentinel. + +Enable Continuous Monitoring + +- Set up automated jobs or workflows to regularly query and update metadata. +- Example: Use AWS Config to track resource configurations and changes over time. + +Configure Access and Logging + +- Enable logging for API queries to ensure access and usage of metadata are monitored. +- Example: Use AWS CloudTrail to log API activity for metadata queries. + +Use Cloud Security Tools + +- Employ CSPM tools like Prisma Cloud, Wiz, or Dome9 to gather metadata and identify misconfigurations. +- Example: Prisma Cloud provides consolidated views of metadata for resources across AWS, Azure, and GCP.Cloud service metadata refers to the contextual and descriptive information about cloud services, including their name, type, purpose, configuration, and activity around them. This metadata is essential for understanding the roles and functions of cloud services, their operational status, and their potential misuse. Examples: + +- Azure Service Metadata: Metadata describing a resource in Azure, such as an Azure Storage Account or a Virtual Machine. +- AWS Cloud Service Metadata: Metadata for an AWS EC2 instance collected using the `DescribeInstances` API call. +- Google Cloud Service Metadata: Metadata for a Google Compute Engine instance collected using `gcloud compute instances describe`. +- Office 365 Metadata: Metadata about an Office 365 SharePoint site.
x_mitre_log_sources[0]['name']CloudTrail:GetInstanceIdentityDocumentAWS:CloudTrail
x_mitre_log_sources[4]['name']CloudTrail:GetSecretValueAWS:CloudTrail
x_mitre_log_sources[4]['channel']API call to retrieve secret or access keyGetSecretValue
x_mitre_log_sources[5]['name']CloudTrail:InvokeFunctionAWS:CloudTrail

[DC0069] Cloud Service Modification

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Cloud service modification refers to changes made to the cont1Cloud service modification refers to changes made to the con
>figuration, settings, or data of a cloud service. These modi>figuration, settings, or data of a cloud service. These modi
>fications can include administrative changes such as enablin>fications can include administrative changes such as enablin
>g or disabling features, altering permissions, or deleting c>g or disabling features, altering permissions, or deleting c
>ritical components. Monitoring these changes is critical to >ritical components. Monitoring these changes is critical to 
>detect potential misconfigurations or malicious activity. Ex>detect potential misconfigurations or malicious activity. Ex
>amples:   - AWS Cloud Service Modifications: A user disables>amples:   - AWS Cloud Service Modifications: A user disables
> AWS CloudTrail logging (StopLogging) or deletes a CloudWatc> AWS CloudTrail logging (StopLogging) or deletes a CloudWatc
>h configuration rule (DeleteConfigRule). - Azure Cloud Servi>h configuration rule (DeleteConfigRule). - Azure Cloud Servi
>ce Modifications: Changes to Azure Role-Based Access Control>ce Modifications: Changes to Azure Role-Based Access Control
> (RBAC) roles, such as adding a new Contributor role to a se> (RBAC) roles, such as adding a new Contributor role to a se
>nsitive resource. - Google Cloud Service Modifications: Dele>nsitive resource. - Google Cloud Service Modifications: Dele
>tion of a Google Cloud Storage bucket or disabling a Google >tion of a Google Cloud Storage bucket or disabling a Google 
>Cloud Function. - Office 365 Cloud Service Modifications: Al>Cloud Function. - Office 365 Cloud Service Modifications: Al
>tering mailbox permissions or disabling auditing in Microsof>tering mailbox permissions or disabling auditing in Microsof
>t 365.  This data component can be collected through the fol>t 365.
>lowing measures:  Enable Cloud Audit Logging  - AWS: Enable  
>AWS CloudTrail for logging management events such as StopLog 
>ging or DeleteTrail. - Azure: Use Azure Activity Logs to mon 
>itor resource changes and access actions. - Google Cloud: En 
>able Google Cloud Audit Logs to track API calls, resource mo 
>difications, and policy changes. - Office 365: Use Unified A 
>udit Logs in Microsoft Purview to track administrative actio 
>ns.  Centralize Log Storage  - Consolidate logs from all clo 
>ud providers into a SIEM or CSPM (Cloud Security Posture Man 
>agement) tool. - Example: Use Splunk or Elastic Stack to ing 
>est and analyze logs from AWS, Azure, and Google Cloud.  Aut 
>omate Alerts for Sensitive Changes  - Configure alerts for h 
>igh-risk actions, such as disabling logging or modifying IAM 
> roles. - AWS Example: Use AWS Config rules to detect and no 
>tify changes to critical services. - Azure Example: Set up A 
>zure Monitor alerts for write actions on sensitive resources 
>.  Enable Continuous Monitoring  - Use tools like AWS Securi 
>ty Hub, Azure Defender, or Google Chronicle to continuously  
>monitor cloud service modifications for anomalies. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:35.943000+00:002025-11-12 22:03:39.105000+00:00
descriptionCloud service modification refers to changes made to the configuration, settings, or data of a cloud service. These modifications can include administrative changes such as enabling or disabling features, altering permissions, or deleting critical components. Monitoring these changes is critical to detect potential misconfigurations or malicious activity. Examples: + +- AWS Cloud Service Modifications: A user disables AWS CloudTrail logging (StopLogging) or deletes a CloudWatch configuration rule (DeleteConfigRule). +- Azure Cloud Service Modifications: Changes to Azure Role-Based Access Control (RBAC) roles, such as adding a new Contributor role to a sensitive resource. +- Google Cloud Service Modifications: Deletion of a Google Cloud Storage bucket or disabling a Google Cloud Function. +- Office 365 Cloud Service Modifications: Altering mailbox permissions or disabling auditing in Microsoft 365. + +This data component can be collected through the following measures: + +Enable Cloud Audit Logging + +- AWS: Enable AWS CloudTrail for logging management events such as StopLogging or DeleteTrail. +- Azure: Use Azure Activity Logs to monitor resource changes and access actions. +- Google Cloud: Enable Google Cloud Audit Logs to track API calls, resource modifications, and policy changes. +- Office 365: Use Unified Audit Logs in Microsoft Purview to track administrative actions. + +Centralize Log Storage + +- Consolidate logs from all cloud providers into a SIEM or CSPM (Cloud Security Posture Management) tool. +- Example: Use Splunk or Elastic Stack to ingest and analyze logs from AWS, Azure, and Google Cloud. + +Automate Alerts for Sensitive Changes + +- Configure alerts for high-risk actions, such as disabling logging or modifying IAM roles. +- AWS Example: Use AWS Config rules to detect and notify changes to critical services. +- Azure Example: Set up Azure Monitor alerts for write actions on sensitive resources. + +Enable Continuous Monitoring + +- Use tools like AWS Security Hub, Azure Defender, or Google Chronicle to continuously monitor cloud service modifications for anomalies.Cloud service modification refers to changes made to the configuration, settings, or data of a cloud service. These modifications can include administrative changes such as enabling or disabling features, altering permissions, or deleting critical components. Monitoring these changes is critical to detect potential misconfigurations or malicious activity. Examples: + +- AWS Cloud Service Modifications: A user disables AWS CloudTrail logging (StopLogging) or deletes a CloudWatch configuration rule (DeleteConfigRule). +- Azure Cloud Service Modifications: Changes to Azure Role-Based Access Control (RBAC) roles, such as adding a new Contributor role to a sensitive resource. +- Google Cloud Service Modifications: Deletion of a Google Cloud Storage bucket or disabling a Google Cloud Function. +- Office 365 Cloud Service Modifications: Altering mailbox permissions or disabling auditing in Microsoft 365.
x_mitre_log_sources[9]['name']CloudTrail:OrganizationsAWS:CloudTrail
x_mitre_log_sources[15]['name']CloudTrail:UpdatePolicyAWS:CloudTrail

[DC0025] Cloud Storage Access

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Cloud storage access refers to the retrieval or interaction t1Cloud storage access refers to the retrieval or interaction 
>with data stored in cloud infrastructure. This data componen>with data stored in cloud infrastructure. This data componen
>t includes activities such as reading, downloading, or acces>t includes activities such as reading, downloading, or acces
>sing files and objects within cloud storage systems. Common >sing files and objects within cloud storage systems. Common 
>examples include API calls like GetObject in AWS S3, which r>examples include API calls like GetObject in AWS S3, which r
>etrieves objects from cloud buckets. Examples:   - AWS S3 Ac>etrieves objects from cloud buckets. Examples:   - AWS S3 Ac
>cess: An adversary uses the `GetObject` API to retrieve sens>cess: An adversary uses the `GetObject` API to retrieve sens
>itive data from an AWS S3 bucket. - Azure Blob Storage Acces>itive data from an AWS S3 bucket. - Azure Blob Storage Acces
>s: A user accesses a blob in Azure Storage using `Get Blob` >s: A user accesses a blob in Azure Storage using `Get Blob` 
>or `Get Blob Properties`. - Google Cloud Storage Access: An >or `Get Blob Properties`. - Google Cloud Storage Access: An 
>adversary uses `storage.objects.get` to download objects fro>adversary uses `storage.objects.get` to download objects fro
>m - OpenStack Swift Storage Access: A user retrieves an obje>m - OpenStack Swift Storage Access: A user retrieves an obje
>ct from OpenStack Swift using the `GET` method.  This data c>ct from OpenStack Swift using the `GET` method.
>omponent can be collected through the following measures:  E 
>nable Logging for Cloud Storage Services  - AWS S3: Enable S 
>erver Access Logging to capture API calls like `GetObject` a 
>nd store them in a designated S3 bucket. - Azure Storage: En 
>able Azure Storage Logging to capture operations like `GetBl 
>ob` and log metadata. - Google Cloud Storage: Enable Data Ac 
>cess audit logs for `storage.objects.get` API calls. - OpenS 
>tack Swift: Configure middleware for object logging to captu 
>re GET requests.  Centralize and Aggregate Logs  - Use a cen 
>tralized logging solution (e.g., Splunk, ELK, or a cloud-nat 
>ive SIEM) to ingest and analyze logs from different cloud pr 
>oviders.     - AWS Example: Use AWS CloudTrail to collect AP 
>I activity logs and forward them to your SIEM.     - Azure E 
>xample: Use Azure Monitor and Log Analytics to analyze stora 
>ge access logs.  Correlate with IAM Logs  - Combine storage  
>access logs with IAM activity logs to correlate user actions 
> with specific permissions and identities. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:36.111000+00:002025-11-12 22:03:39.105000+00:00
descriptionCloud storage access refers to the retrieval or interaction with data stored in cloud infrastructure. This data component includes activities such as reading, downloading, or accessing files and objects within cloud storage systems. Common examples include API calls like GetObject in AWS S3, which retrieves objects from cloud buckets. Examples: + +- AWS S3 Access: An adversary uses the `GetObject` API to retrieve sensitive data from an AWS S3 bucket. +- Azure Blob Storage Access: A user accesses a blob in Azure Storage using `Get Blob` or `Get Blob Properties`. +- Google Cloud Storage Access: An adversary uses `storage.objects.get` to download objects from - OpenStack Swift Storage Access: A user retrieves an object from OpenStack Swift using the `GET` method. + +This data component can be collected through the following measures: + +Enable Logging for Cloud Storage Services + +- AWS S3: Enable Server Access Logging to capture API calls like `GetObject` and store them in a designated S3 bucket. +- Azure Storage: Enable Azure Storage Logging to capture operations like `GetBlob` and log metadata. +- Google Cloud Storage: Enable Data Access audit logs for `storage.objects.get` API calls. +- OpenStack Swift: Configure middleware for object logging to capture GET requests. + +Centralize and Aggregate Logs + +- Use a centralized logging solution (e.g., Splunk, ELK, or a cloud-native SIEM) to ingest and analyze logs from different cloud providers. + - AWS Example: Use AWS CloudTrail to collect API activity logs and forward them to your SIEM. + - Azure Example: Use Azure Monitor and Log Analytics to analyze storage access logs. + +Correlate with IAM Logs + +- Combine storage access logs with IAM activity logs to correlate user actions with specific permissions and identities.Cloud storage access refers to the retrieval or interaction with data stored in cloud infrastructure. This data component includes activities such as reading, downloading, or accessing files and objects within cloud storage systems. Common examples include API calls like GetObject in AWS S3, which retrieves objects from cloud buckets. Examples: + +- AWS S3 Access: An adversary uses the `GetObject` API to retrieve sensitive data from an AWS S3 bucket. +- Azure Blob Storage Access: A user accesses a blob in Azure Storage using `Get Blob` or `Get Blob Properties`. +- Google Cloud Storage Access: An adversary uses `storage.objects.get` to download objects from - OpenStack Swift Storage Access: A user retrieves an object from OpenStack Swift using the `GET` method.
x_mitre_log_sources[0]['channel']PutObject, CopyObjectGetObject, CopyObject
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'AWS:CloudTrail', 'channel': 'PutObject, GetObject, CopyObject, DeleteObject'}
x_mitre_log_sources{'name': 'AWS:CloudTrail', 'channel': 'GetObject'}

[DC0024] Cloud Storage Creation

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Cloud Storage Creation refers to the initial creation of a nt1Cloud Storage Creation refers to the initial creation of a n
>ew cloud storage resource, such as buckets, containers, or d>ew cloud storage resource, such as buckets, containers, or d
>irectories, within a cloud environment. This action is criti>irectories, within a cloud environment. This action is criti
>cal to track as it might indicate the legitimate provisionin>cal to track as it might indicate the legitimate provisionin
>g of resources or unauthorized actions taken by adversaries >g of resources or unauthorized actions taken by adversaries 
>to stage, store, or exfiltrate data. Examples:   - AWS S3 Bu>to stage, store, or exfiltrate data. Examples:   - AWS S3 Bu
>cket Creation: An AWS user creates a new S3 bucket using the>cket Creation: An AWS user creates a new S3 bucket using the
> `CreateBucket` API call. - Azure Blob Storage Container Cre> `CreateBucket` API call. - Azure Blob Storage Container Cre
>ation: A user creates a new container in Azure Blob Storage >ation: A user creates a new container in Azure Blob Storage 
>using the `Create Container` operation. - Google Cloud Stora>using the `Create Container` operation. - Google Cloud Stora
>ge Bucket Creation: A Google Cloud user creates a new bucket>ge Bucket Creation: A Google Cloud user creates a new bucket
> using `storage.buckets.create`. - OpenStack Swift Container> using `storage.buckets.create`. - OpenStack Swift Container
> Creation: A user creates a new container in OpenStack Swift> Creation: A user creates a new container in OpenStack Swift
> using the `PUT` method.  This data component can be collect> using the `PUT` method.
>ed through the following measures:  Enable Logging for Cloud 
> Storage Services  - AWS S3: Enable AWS CloudTrail to log Cr 
>eateBucket API actions. - Azure Blob Storage: Enable Azure M 
>onitor and Diagnostic Logs for storage account activity. Use 
> Azure Event Grid to capture Create Container operations. -  
>Google Cloud Storage: Enable Data Access logs in Cloud Audit 
> Logs to monitor storage.buckets.create API calls. - OpenSta 
>ck Swift: Configure Swift logging to capture PUT requests to 
> new containers.  Centralized Logging and Analysis  - Forwar 
>d logs to centralized platforms like Splunk or cloud-native  
>SIEM solutions for correlation and analysis. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:39.305000+00:002025-11-12 22:03:39.105000+00:00
descriptionCloud Storage Creation refers to the initial creation of a new cloud storage resource, such as buckets, containers, or directories, within a cloud environment. This action is critical to track as it might indicate the legitimate provisioning of resources or unauthorized actions taken by adversaries to stage, store, or exfiltrate data. Examples: + +- AWS S3 Bucket Creation: An AWS user creates a new S3 bucket using the `CreateBucket` API call. +- Azure Blob Storage Container Creation: A user creates a new container in Azure Blob Storage using the `Create Container` operation. +- Google Cloud Storage Bucket Creation: A Google Cloud user creates a new bucket using `storage.buckets.create`. +- OpenStack Swift Container Creation: A user creates a new container in OpenStack Swift using the `PUT` method. + +This data component can be collected through the following measures: + +Enable Logging for Cloud Storage Services + +- AWS S3: Enable AWS CloudTrail to log CreateBucket API actions. +- Azure Blob Storage: Enable Azure Monitor and Diagnostic Logs for storage account activity. Use Azure Event Grid to capture Create Container operations. +- Google Cloud Storage: Enable Data Access logs in Cloud Audit Logs to monitor storage.buckets.create API calls. +- OpenStack Swift: Configure Swift logging to capture PUT requests to new containers. + +Centralized Logging and Analysis + +- Forward logs to centralized platforms like Splunk or cloud-native SIEM solutions for correlation and analysis.Cloud Storage Creation refers to the initial creation of a new cloud storage resource, such as buckets, containers, or directories, within a cloud environment. This action is critical to track as it might indicate the legitimate provisioning of resources or unauthorized actions taken by adversaries to stage, store, or exfiltrate data. Examples: + +- AWS S3 Bucket Creation: An AWS user creates a new S3 bucket using the `CreateBucket` API call. +- Azure Blob Storage Container Creation: A user creates a new container in Azure Blob Storage using the `Create Container` operation. +- Google Cloud Storage Bucket Creation: A Google Cloud user creates a new bucket using `storage.buckets.create`. +- OpenStack Swift Container Creation: A user creates a new container in OpenStack Swift using the `PUT` method.

[DC0022] Cloud Storage Deletion

Current version: 2.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:38.644000+00:002025-11-12 22:03:39.105000+00:00
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'AWS:CloudTrail', 'channel': 'PutBackupVaultAccessPolicy'}

[DC0017] Cloud Storage Enumeration

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Cloud Storage Enumeration involves retrieving a list of avait1Cloud Storage Enumeration involves retrieving a list of avai
>lable cloud storage infrastructure, such as buckets, contain>lable cloud storage infrastructure, such as buckets, contain
>ers, or objects, within a cloud environment. This activity m>ers, or objects, within a cloud environment. This activity m
>ay be performed for legitimate administrative purposes or ma>ay be performed for legitimate administrative purposes or ma
>licious reconnaissance by adversaries seeking to identify ac>licious reconnaissance by adversaries seeking to identify ac
>cessible storage resources.Examples:  - AWS S3 Bucket Enumer>cessible storage resources.Examples:  - AWS S3 Bucket Enumer
>ation: An AWS user lists all buckets using the `ListBuckets`>ation: An AWS user lists all buckets using the `ListBuckets`
> API call. - Azure Blob Storage Container Enumeration: A use> API call. - Azure Blob Storage Container Enumeration: A use
>r retrieves a list of all containers within a storage accoun>r retrieves a list of all containers within a storage accoun
>t using the Azure Storage SDK or API. - Google Cloud Storage>t using the Azure Storage SDK or API. - Google Cloud Storage
> Bucket Enumeration: A Google Cloud user lists all buckets w> Bucket Enumeration: A Google Cloud user lists all buckets w
>ithin a project using the `storage.buckets.list` API. - Open>ithin a project using the `storage.buckets.list` API. - Open
>Stack Swift Container Enumeration: A user retrieves a list o>Stack Swift Container Enumeration: A user retrieves a list o
>f containers in OpenStack Swift using the `GET` method on th>f containers in OpenStack Swift using the `GET` method on th
>e storage endpoint.  This data component can be collected th>e storage endpoint.
>rough the following measures:  Enable Logging for Cloud Stor 
>age Enumeration  - AWS S3: Enable AWS CloudTrail to capture  
>ListBuckets and ListObjects API calls. - Azure Blob Storage: 
> Enable Azure Monitor and Diagnostic Logs to capture enumera 
>tion operations like List Containers. Use Azure Event Grid t 
>o trigger alerts for container enumeration. - Google Cloud S 
>torage: Enable Audit Logs in Google Cloud to track storage.b 
>uckets.list API activity. - OpenStack Swift: Configure Swift 
> logging to capture GET requests for container enumeration.  
> Centralized Log Aggregation  - Use platforms like Splunk or 
> native SIEM solutions to collect and analyze enumeration lo 
>gs.  
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:38.903000+00:002025-11-12 22:03:39.105000+00:00
descriptionCloud Storage Enumeration involves retrieving a list of available cloud storage infrastructure, such as buckets, containers, or objects, within a cloud environment. This activity may be performed for legitimate administrative purposes or malicious reconnaissance by adversaries seeking to identify accessible storage resources.Examples: + +- AWS S3 Bucket Enumeration: An AWS user lists all buckets using the `ListBuckets` API call. +- Azure Blob Storage Container Enumeration: A user retrieves a list of all containers within a storage account using the Azure Storage SDK or API. +- Google Cloud Storage Bucket Enumeration: A Google Cloud user lists all buckets within a project using the `storage.buckets.list` API. +- OpenStack Swift Container Enumeration: A user retrieves a list of containers in OpenStack Swift using the `GET` method on the storage endpoint. + +This data component can be collected through the following measures: + +Enable Logging for Cloud Storage Enumeration + +- AWS S3: Enable AWS CloudTrail to capture ListBuckets and ListObjects API calls. +- Azure Blob Storage: Enable Azure Monitor and Diagnostic Logs to capture enumeration operations like List Containers. Use Azure Event Grid to trigger alerts for container enumeration. +- Google Cloud Storage: Enable Audit Logs in Google Cloud to track storage.buckets.list API activity. +- OpenStack Swift: Configure Swift logging to capture GET requests for container enumeration. + +Centralized Log Aggregation + +- Use platforms like Splunk or native SIEM solutions to collect and analyze enumeration logs. +Cloud Storage Enumeration involves retrieving a list of available cloud storage infrastructure, such as buckets, containers, or objects, within a cloud environment. This activity may be performed for legitimate administrative purposes or malicious reconnaissance by adversaries seeking to identify accessible storage resources.Examples: + +- AWS S3 Bucket Enumeration: An AWS user lists all buckets using the `ListBuckets` API call. +- Azure Blob Storage Container Enumeration: A user retrieves a list of all containers within a storage account using the Azure Storage SDK or API. +- Google Cloud Storage Bucket Enumeration: A Google Cloud user lists all buckets within a project using the `storage.buckets.list` API. +- OpenStack Swift Container Enumeration: A user retrieves a list of containers in OpenStack Swift using the `GET` method on the storage endpoint.

[DC0027] Cloud Storage Metadata

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Cloud Storage Metadata provides contextual information aboutt1Cloud Storage Metadata provides contextual information about
> cloud storage infrastructure and its associated activity. T> cloud storage infrastructure and its associated activity. T
>his data may include attributes such as storage name, size, >his data may include attributes such as storage name, size, 
>owner, permissions, creation date, region, and activity meta>owner, permissions, creation date, region, and activity meta
>data. It is essential for monitoring, auditing, and identify>data. It is essential for monitoring, auditing, and identify
>ing anomalies in cloud storage environments. Examples:   - A>ing anomalies in cloud storage environments. Examples:   - A
>WS S3 Bucket Metadata: Metadata about an S3 bucket includes >WS S3 Bucket Metadata: Metadata about an S3 bucket includes 
>the bucket name, region, creation date, owner, storage class>the bucket name, region, creation date, owner, storage class
>, and permissions. - Azure Blob Storage Metadata: Metadata f>, and permissions. - Azure Blob Storage Metadata: Metadata f
>or an Azure Blob container includes container name, access l>or an Azure Blob container includes container name, access l
>evel (e.g., private or public), size, and tags. - Google Clo>evel (e.g., private or public), size, and tags. - Google Clo
>ud Storage Metadata: Metadata includes bucket name, storage >ud Storage Metadata: Metadata includes bucket name, storage 
>class, location, labels, lifecycle policies, and versioning >class, location, labels, lifecycle policies, and versioning 
>status. - OpenStack Swift Metadata: Metadata for a Swift con>status. - OpenStack Swift Metadata: Metadata for a Swift con
>tainer includes name, access level, quota, and custom attrib>tainer includes name, access level, quota, and custom attrib
>utes.  This data component can be collected through the foll>utes.
>owing measures:  Enable Logging for Metadata Collection  - A 
>WS S3: Use AWS CloudTrail to log `GetBucketAcl`, `GetBucketP 
>olicy`, and `HeadBucket` API calls. - Azure Blob Storage: Us 
>e Azure Monitor to log container metadata retrieval and upda 
>tes. - Google Cloud Storage: Enable Google Cloud Audit Logs  
>to capture `storage.buckets.get` and `storage.buckets.update 
>`. - OpenStack Swift: Enable logging of `HEAD` or `GET` requ 
>ests to containers.  Centralized Log Aggregation  - Use a SI 
>EM solution (e.g., Splunk) to aggregate and analyze metadata 
> retrieval and modification logs. - Correlate metadata acces 
>s with user actions, IP addresses, and other contextual data 
>.  API Polling  - Use cloud SDKs or APIs to periodically que 
>ry metadata for analysis:     - AWS CLI Example: `aws s3api  
>get-bucket-acl --bucket company-sensitive-data`     - Azure  
>CLI Example: `az storage container show --name customer-reco 
>rds`     - Google Cloud CLI Example: `gcloud storage buckets 
> describe user-uploads` 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:39.767000+00:002025-11-12 22:03:39.105000+00:00
descriptionCloud Storage Metadata provides contextual information about cloud storage infrastructure and its associated activity. This data may include attributes such as storage name, size, owner, permissions, creation date, region, and activity metadata. It is essential for monitoring, auditing, and identifying anomalies in cloud storage environments. Examples: + +- AWS S3 Bucket Metadata: Metadata about an S3 bucket includes the bucket name, region, creation date, owner, storage class, and permissions. +- Azure Blob Storage Metadata: Metadata for an Azure Blob container includes container name, access level (e.g., private or public), size, and tags. +- Google Cloud Storage Metadata: Metadata includes bucket name, storage class, location, labels, lifecycle policies, and versioning status. +- OpenStack Swift Metadata: Metadata for a Swift container includes name, access level, quota, and custom attributes. + +This data component can be collected through the following measures: + +Enable Logging for Metadata Collection + +- AWS S3: Use AWS CloudTrail to log `GetBucketAcl`, `GetBucketPolicy`, and `HeadBucket` API calls. +- Azure Blob Storage: Use Azure Monitor to log container metadata retrieval and updates. +- Google Cloud Storage: Enable Google Cloud Audit Logs to capture `storage.buckets.get` and `storage.buckets.update`. +- OpenStack Swift: Enable logging of `HEAD` or `GET` requests to containers. + +Centralized Log Aggregation + +- Use a SIEM solution (e.g., Splunk) to aggregate and analyze metadata retrieval and modification logs. +- Correlate metadata access with user actions, IP addresses, and other contextual data. + +API Polling + +- Use cloud SDKs or APIs to periodically query metadata for analysis: + - AWS CLI Example: `aws s3api get-bucket-acl --bucket company-sensitive-data` + - Azure CLI Example: `az storage container show --name customer-records` + - Google Cloud CLI Example: `gcloud storage buckets describe user-uploads`Cloud Storage Metadata provides contextual information about cloud storage infrastructure and its associated activity. This data may include attributes such as storage name, size, owner, permissions, creation date, region, and activity metadata. It is essential for monitoring, auditing, and identifying anomalies in cloud storage environments. Examples: + +- AWS S3 Bucket Metadata: Metadata about an S3 bucket includes the bucket name, region, creation date, owner, storage class, and permissions. +- Azure Blob Storage Metadata: Metadata for an Azure Blob container includes container name, access level (e.g., private or public), size, and tags. +- Google Cloud Storage Metadata: Metadata includes bucket name, storage class, location, labels, lifecycle policies, and versioning status. +- OpenStack Swift Metadata: Metadata for a Swift container includes name, access level, quota, and custom attributes.

[DC0023] Cloud Storage Modification

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Cloud Storage Modification involves tracking changes made tot1Cloud Storage Modification involves tracking changes made to
> cloud storage infrastructure, including updates to settings> cloud storage infrastructure, including updates to settings
>, permissions, or stored data. Examples include modifying ob>, permissions, or stored data. Examples include modifying ob
>ject access control lists (ACLs), uploading new objects, or >ject access control lists (ACLs), uploading new objects, or 
>updating bucket policies. Examples:   AWS S3: An object is u>updating bucket policies. Examples:   AWS S3: An object is u
>ploaded or its ACL is modified. - Azure Blob Storage: A blob>ploaded or its ACL is modified. - Azure Blob Storage: A blob
>'s metadata or permissions are updated. - Google Cloud Stora>'s metadata or permissions are updated. - Google Cloud Stora
>ge: An object's lifecycle policy is updated, or a bucket pol>ge: An object's lifecycle policy is updated, or a bucket pol
>icy is changed. - OpenStack Swift: Modifications to containe>icy is changed. - OpenStack Swift: Modifications to containe
>r settings or uploading of new objects.  This data component>r settings or uploading of new objects.
> can be collected through the following measures:  Enable Lo 
>gging  - AWS S3: Enable AWS CloudTrail to log API events lik 
>e PutObject, PutObjectAcl, and PutBucketPolicy. - Azure Blob 
> Storage: Use Azure Monitor to log write and update operatio 
>ns. - Google Cloud Storage: Enable Google Cloud Audit Logs t 
>o track storage.objects.update and storage.buckets.update. - 
> OpenStack Swift: Enable logging for PUT and POST requests t 
>o track object uploads and container metadata updates.  Use  
>Cloud Monitoring Tools  - Integrate with tools like AWS Conf 
>ig, Azure Security Center, or Google Cloud Monitoring to det 
>ect configuration drift or unauthorized changes.  Centralize 
>d Log Aggregation  - Use a SIEM (e.g., Splunk) to aggregate  
>logs across multiple cloud providers for unified monitoring  
>and analysis.  Periodic API Queries  - AWS CLI Example: Quer 
>y recent modifications to bucket policies: `aws s3api get-bu 
>cket-policy --bucket sensitive-data` - Azure CLI Example: Li 
>st changes to a blob container: `az storage blob show --cont 
>ainer-name private-docs` - Google Cloud CLI Example: Check m 
>etadata updates: `gcloud storage objects describe gs://user- 
>uploads/document.txt` 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:36.930000+00:002025-11-12 22:03:39.105000+00:00
descriptionCloud Storage Modification involves tracking changes made to cloud storage infrastructure, including updates to settings, permissions, or stored data. Examples include modifying object access control lists (ACLs), uploading new objects, or updating bucket policies. Examples: + +AWS S3: An object is uploaded or its ACL is modified. +- Azure Blob Storage: A blob's metadata or permissions are updated. +- Google Cloud Storage: An object's lifecycle policy is updated, or a bucket policy is changed. +- OpenStack Swift: Modifications to container settings or uploading of new objects. + +This data component can be collected through the following measures: + +Enable Logging + +- AWS S3: Enable AWS CloudTrail to log API events like PutObject, PutObjectAcl, and PutBucketPolicy. +- Azure Blob Storage: Use Azure Monitor to log write and update operations. +- Google Cloud Storage: Enable Google Cloud Audit Logs to track storage.objects.update and storage.buckets.update. +- OpenStack Swift: Enable logging for PUT and POST requests to track object uploads and container metadata updates. + +Use Cloud Monitoring Tools + +- Integrate with tools like AWS Config, Azure Security Center, or Google Cloud Monitoring to detect configuration drift or unauthorized changes. + +Centralized Log Aggregation + +- Use a SIEM (e.g., Splunk) to aggregate logs across multiple cloud providers for unified monitoring and analysis. + +Periodic API Queries + +- AWS CLI Example: Query recent modifications to bucket policies: `aws s3api get-bucket-policy --bucket sensitive-data` +- Azure CLI Example: List changes to a blob container: `az storage blob show --container-name private-docs` +- Google Cloud CLI Example: Check metadata updates: `gcloud storage objects describe gs://user-uploads/document.txt`Cloud Storage Modification involves tracking changes made to cloud storage infrastructure, including updates to settings, permissions, or stored data. Examples include modifying object access control lists (ACLs), uploading new objects, or updating bucket policies. Examples: + +AWS S3: An object is uploaded or its ACL is modified. +- Azure Blob Storage: A blob's metadata or permissions are updated. +- Google Cloud Storage: An object's lifecycle policy is updated, or a bucket policy is changed. +- OpenStack Swift: Modifications to container settings or uploading of new objects.

[DC0064] Command Execution

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Command Execution involves monitoring and capturing the exect1Command Execution involves monitoring and capturing the exec
>ution of textual commands (including shell commands, cmdlets>ution of textual commands (including shell commands, cmdlets
>, and scripts) within an operating system or application. Th>, and scripts) within an operating system or application. Th
>ese commands may include arguments or parameters and are typ>ese commands may include arguments or parameters and are typ
>ically executed through interpreters such as `cmd.exe`, `bas>ically executed through interpreters such as `cmd.exe`, `bas
>h`, `zsh`, `PowerShell`, or programmatic execution. Examples>h`, `zsh`, `PowerShell`, or programmatic execution. Examples
>:   - Windows Command Prompt     - dir – Lists directory con>:   - Windows Command Prompt     - dir – Lists directory con
>tents.     - net user – Queries or manipulates user accounts>tents.     - net user – Queries or manipulates user accounts
>.     - tasklist – Lists running processes. - PowerShell    >.     - tasklist – Lists running processes. - PowerShell    
> - Get-Process – Retrieves processes running on a system.   > - Get-Process – Retrieves processes running on a system.   
>  - Set-ExecutionPolicy – Changes PowerShell script executio>  - Set-ExecutionPolicy – Changes PowerShell script executio
>n policies.     - Invoke-WebRequest – Downloads remote resou>n policies.     - Invoke-WebRequest – Downloads remote resou
>rces. - Linux Shell     - ls – Lists files in a directory.  >rces. - Linux Shell     - ls – Lists files in a directory.  
>   - cat /etc/passwd – Reads the user accounts file.     - c>   - cat /etc/passwd – Reads the user accounts file.     - c
>url http://malicious-site.com – Retrieves content from a mal>url http://malicious-site.com – Retrieves content from a mal
>icious URL. - Container Environments     - docker exec – Exe>icious URL. - Container Environments     - docker exec – Exe
>cutes a command inside a running container.     - kubectl ex>cutes a command inside a running container.     - kubectl ex
>ec – Runs commands in Kubernetes pods. - macOS Terminal     >ec – Runs commands in Kubernetes pods. - macOS Terminal     
>- open – Opens files or URLs.     - dscl . -list /Users – Li>- open – Opens files or URLs.     - dscl . -list /Users – Li
>sts all users on the system.     - osascript -e – Executes A>sts all users on the system.     - osascript -e – Executes A
>ppleScript commands.  This data component can be collected t>ppleScript commands.
>hrough the following measures:  Enable Command Logging  - Wi 
>ndows:     - Enable PowerShell logging: `Set-ExecutionPolicy 
> Bypass`, `Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\M 
>icrosoft\Windows\PowerShell\ScriptBlockLogging" -Name Enable 
>ScriptBlockLogging -Value 1`     - Enable Windows Event Logg 
>ing:         - Event ID 4688: Tracks process creation, inclu 
>ding command-line arguments.         - Event ID 4104: Logs P 
>owerShell script block execution. - Linux/macOS:     - Enabl 
>e shell history logging in `.bashrc` or `.zshrc`: `export HI 
>STTIMEFORMAT="%d/%m/%y %T "`, `export PROMPT_COMMAND='histor 
>y -a; history -w'`     - Use audit frameworks (e.g., `auditd 
>`) to log command executions. Example rule to log all `execv 
>e` syscalls: `-a always,exit -F arch=b64 -S execve -k cmd_ex 
>ec` - Containers:     - Use runtime-specific tools like Dock 
>er’s --log-driver or Kubernetes Audit Logs to capture exec c 
>ommands.  Integrate with Centralized Logging  - Collect logs 
> using a SIEM (e.g., Splunk) or cloud-based log aggregation  
>tools like AWS CloudWatch or Azure Monitor. Example Splunk S 
>earch for Windows Event 4688: `index=windows EventID=4688 Co 
>mmandLine=*`  Use Endpoint Detection and Response (EDR) Tool 
>s  - Monitor command executions via EDR solutions   Deploy S 
>ysmon for Advanced Logging (Windows)  - Use Sysmon's Event I 
>D 1 to log process creation with command-line arguments 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:34.849000+00:002025-11-12 22:03:39.105000+00:00
descriptionCommand Execution involves monitoring and capturing the execution of textual commands (including shell commands, cmdlets, and scripts) within an operating system or application. These commands may include arguments or parameters and are typically executed through interpreters such as `cmd.exe`, `bash`, `zsh`, `PowerShell`, or programmatic execution. Examples: + +- Windows Command Prompt + - dir – Lists directory contents. + - net user – Queries or manipulates user accounts. + - tasklist – Lists running processes. +- PowerShell + - Get-Process – Retrieves processes running on a system. + - Set-ExecutionPolicy – Changes PowerShell script execution policies. + - Invoke-WebRequest – Downloads remote resources. +- Linux Shell + - ls – Lists files in a directory. + - cat /etc/passwd – Reads the user accounts file. + - curl http://malicious-site.com – Retrieves content from a malicious URL. +- Container Environments + - docker exec – Executes a command inside a running container. + - kubectl exec – Runs commands in Kubernetes pods. +- macOS Terminal + - open – Opens files or URLs. + - dscl . -list /Users – Lists all users on the system. + - osascript -e – Executes AppleScript commands. + +This data component can be collected through the following measures: + +Enable Command Logging + +- Windows: + - Enable PowerShell logging: `Set-ExecutionPolicy Bypass`, `Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging" -Name EnableScriptBlockLogging -Value 1` + - Enable Windows Event Logging: + - Event ID 4688: Tracks process creation, including command-line arguments. + - Event ID 4104: Logs PowerShell script block execution. +- Linux/macOS: + - Enable shell history logging in `.bashrc` or `.zshrc`: `export HISTTIMEFORMAT="%d/%m/%y %T "`, `export PROMPT_COMMAND='history -a; history -w'` + - Use audit frameworks (e.g., `auditd`) to log command executions. Example rule to log all `execve` syscalls: `-a always,exit -F arch=b64 -S execve -k cmd_exec` +- Containers: + - Use runtime-specific tools like Docker’s --log-driver or Kubernetes Audit Logs to capture exec commands. + +Integrate with Centralized Logging + +- Collect logs using a SIEM (e.g., Splunk) or cloud-based log aggregation tools like AWS CloudWatch or Azure Monitor. Example Splunk Search for Windows Event 4688: +`index=windows EventID=4688 CommandLine=*` + +Use Endpoint Detection and Response (EDR) Tools + +- Monitor command executions via EDR solutions + +Deploy Sysmon for Advanced Logging (Windows) + +- Use Sysmon's Event ID 1 to log process creation with command-line argumentsCommand Execution involves monitoring and capturing the execution of textual commands (including shell commands, cmdlets, and scripts) within an operating system or application. These commands may include arguments or parameters and are typically executed through interpreters such as `cmd.exe`, `bash`, `zsh`, `PowerShell`, or programmatic execution. Examples: + +- Windows Command Prompt + - dir – Lists directory contents. + - net user – Queries or manipulates user accounts. + - tasklist – Lists running processes. +- PowerShell + - Get-Process – Retrieves processes running on a system. + - Set-ExecutionPolicy – Changes PowerShell script execution policies. + - Invoke-WebRequest – Downloads remote resources. +- Linux Shell + - ls – Lists files in a directory. + - cat /etc/passwd – Reads the user accounts file. + - curl http://malicious-site.com – Retrieves content from a malicious URL. +- Container Environments + - docker exec – Executes a command inside a running container. + - kubectl exec – Runs commands in Kubernetes pods. +- macOS Terminal + - open – Opens files or URLs. + - dscl . -list /Users – Lists all users on the system. + - osascript -e – Executes AppleScript commands.
x_mitre_log_sources[4]['channel']/var/log/syslog or journalctlcron activity
x_mitre_log_sources[10]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106
x_mitre_log_sources[35]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106
x_mitre_log_sources[226]['name']azure:signinLogsazure:signinlogs
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Powershell', 'channel': 'EventCode=4104'}
x_mitre_log_sources{'name': 'WinEventLog:PowerShell', 'channel': 'EventCode=4103,4104'}
x_mitre_log_sources{'name': 'WinEventLog:PowerShell', 'channel': 'EventCode=4103'}
x_mitre_log_sources{'name': 'WinEventLog:PowerShell', 'channel': 'EventCode=4103,4104,4105, 4106'}
x_mitre_log_sources{'name': 'WinEventLog:PowerShell', 'channel': 'EventCode=4105'}
x_mitre_log_sources{'name': 'WinEventLog:PowerShell', 'channel': 'EventCode=4106'}
x_mitre_log_sources{'name': 'WinEventLog:PowerShell', 'channel': 'EventCode=4103, 4104'}

[DC0072] Container Creation

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1"Container Creation" data component captures details about tt1"Container Creation" data component captures details about t
>he initial construction of a container in a containerized en>he initial construction of a container in a containerized en
>vironment. This includes events where a new container is ins>vironment. This includes events where a new container is ins
>tantiated, such as through Docker, Kubernetes, or other cont>tantiated, such as through Docker, Kubernetes, or other cont
>ainer orchestration platforms. Monitoring these events helps>ainer orchestration platforms. Monitoring these events helps
> detect unauthorized or potentially malicious container crea> detect unauthorized or potentially malicious container crea
>tion. Examples:  - Docker Example: `docker create my-contain>tion. Examples:  - Docker Example: `docker create my-contain
>er`, `docker run --name=my-container nginx:latest` - Kuberne>er`, `docker run --name=my-container nginx:latest` - Kuberne
>tes Example: `kubectl run my-pod --image=nginx`, `kubectl cr>tes Example: `kubectl run my-pod --image=nginx`, `kubectl cr
>eate deployment my-deployment --image=nginx` - Cloud Contain>eate deployment my-deployment --image=nginx` - Cloud Contain
>er Services Example     - AWS ECS: Task or service creation >er Services Example     - AWS ECS: Task or service creation 
>(`RunTask` or `CreateService`).     - Azure Container Instan>(`RunTask` or `CreateService`).     - Azure Container Instan
>ces: Deployment of a container group.     - Google Kubernete>ces: Deployment of a container group.     - Google Kubernete
>s Engine (GKE): Creation of new pods via GCP APIs.  This dat>s Engine (GKE): Creation of new pods via GCP APIs.
>a component can be collected through the following measures: 
>  - Docker Audit Logging: Enable Docker daemon logging to ca 
>pture `create` commands. Configure the Docker daemon to use  
>a log driver such as `syslog` or `json-file`. - Kubernetes A 
>udit Logs: Enable Kubernetes API server audit logging: - Clo 
>ud Provider Logs     - AWS CloudTrail: Enable logging for EC 
>S `RunTask` or `CreateService` events.     - Azure Monitor:  
>Enable activity logging for container group creation.     -  
>GCP Cloud Logging: Monitor API calls such as `container.proj 
>ects.zones.clusters.create`. - SIEM Integration: Use a SIEM  
>to collect logs from Docker, Kubernetes, or cloud platforms. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:37.681000+00:002025-11-12 22:03:39.105000+00:00
description"Container Creation" data component captures details about the initial construction of a container in a containerized environment. This includes events where a new container is instantiated, such as through Docker, Kubernetes, or other container orchestration platforms. Monitoring these events helps detect unauthorized or potentially malicious container creation. Examples: + +- Docker Example: `docker create my-container`, `docker run --name=my-container nginx:latest` +- Kubernetes Example: `kubectl run my-pod --image=nginx`, `kubectl create deployment my-deployment --image=nginx` +- Cloud Container Services Example + - AWS ECS: Task or service creation (`RunTask` or `CreateService`). + - Azure Container Instances: Deployment of a container group. + - Google Kubernetes Engine (GKE): Creation of new pods via GCP APIs. + +This data component can be collected through the following measures: + +- Docker Audit Logging: Enable Docker daemon logging to capture `create` commands. Configure the Docker daemon to use a log driver such as `syslog` or `json-file`. +- Kubernetes Audit Logs: Enable Kubernetes API server audit logging: +- Cloud Provider Logs + - AWS CloudTrail: Enable logging for ECS `RunTask` or `CreateService` events. + - Azure Monitor: Enable activity logging for container group creation. + - GCP Cloud Logging: Monitor API calls such as `container.projects.zones.clusters.create`. +- SIEM Integration: Use a SIEM to collect logs from Docker, Kubernetes, or cloud platforms."Container Creation" data component captures details about the initial construction of a container in a containerized environment. This includes events where a new container is instantiated, such as through Docker, Kubernetes, or other container orchestration platforms. Monitoring these events helps detect unauthorized or potentially malicious container creation. Examples: + +- Docker Example: `docker create my-container`, `docker run --name=my-container nginx:latest` +- Kubernetes Example: `kubectl run my-pod --image=nginx`, `kubectl create deployment my-deployment --image=nginx` +- Cloud Container Services Example + - AWS ECS: Task or service creation (`RunTask` or `CreateService`). + - Azure Container Instances: Deployment of a container group. + - Google Kubernetes Engine (GKE): Creation of new pods via GCP APIs.

[DC0091] Container Enumeration

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1"Container Enumeration" data component captures events and at1"Container Enumeration" data component captures events and a
>ctions related to listing and identifying active or availabl>ctions related to listing and identifying active or availabl
>e containers within a containerized environment. This includ>e containers within a containerized environment. This includ
>es information about running, stopped, or configured contain>es information about running, stopped, or configured contain
>ers, such as their names, IDs, statuses, or associated image>ers, such as their names, IDs, statuses, or associated image
>s. Monitoring this activity is crucial for detecting unautho>s. Monitoring this activity is crucial for detecting unautho
>rized discovery or reconnaissance efforts. Examples:   - Doc>rized discovery or reconnaissance efforts. Examples:   - Doc
>ker Example: `docker ps`, `docker ps -a` - Kubernetes Exampl>ker Example: `docker ps`, `docker ps -a` - Kubernetes Exampl
>e: `kubectl get pods`, `kubectl get deployments` - Cloud Con>e: `kubectl get pods`, `kubectl get deployments` - Cloud Con
>tainer Services Example     - AWS ECS: API Call: ListTasks o>tainer Services Example     - AWS ECS: API Call: ListTasks o
>r ListContainers     - Azure Kubernetes Service: API Call: L>r ListContainers     - Azure Kubernetes Service: API Call: L
>ist pod or container instances.     - Google Kubernetes Engi>ist pod or container instances.     - Google Kubernetes Engi
>ne (GKE): API Call: Retrieve deployments and their associate>ne (GKE): API Call: Retrieve deployments and their associate
>d containers.  This data component can be collected through >d containers.
>the following measures:  - Docker Audit Logging: Enable Dock 
>er daemon logging to capture enumeration commands. Use tools 
> like auditd to monitor terminal activity involving docker p 
>s or similar commands. - Kubernetes Audit Logs: Enable Kuber 
>netes API server audit logging. Capture events where users q 
>uery resources such as pods, deployments, or services. - Clo 
>ud Provider Logs     - AWS CloudTrail: Enable logging for AP 
>I calls like ListTasks or DescribeTasks.     - Azure Monitor 
>: Enable activity logging to track container-related queries 
>.     - GCP Cloud Logging: Track API events involving contai 
>ner enumerations or deployments. - SIEM Integration: Collect 
> logs from Docker, Kubernetes, and cloud services for centra 
>lized analysis. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:40.609000+00:002025-11-12 22:03:39.105000+00:00
description"Container Enumeration" data component captures events and actions related to listing and identifying active or available containers within a containerized environment. This includes information about running, stopped, or configured containers, such as their names, IDs, statuses, or associated images. Monitoring this activity is crucial for detecting unauthorized discovery or reconnaissance efforts. Examples: + +- Docker Example: `docker ps`, `docker ps -a` +- Kubernetes Example: `kubectl get pods`, `kubectl get deployments` +- Cloud Container Services Example + - AWS ECS: API Call: ListTasks or ListContainers + - Azure Kubernetes Service: API Call: List pod or container instances. + - Google Kubernetes Engine (GKE): API Call: Retrieve deployments and their associated containers. + +This data component can be collected through the following measures: + +- Docker Audit Logging: Enable Docker daemon logging to capture enumeration commands. Use tools like auditd to monitor terminal activity involving docker ps or similar commands. +- Kubernetes Audit Logs: Enable Kubernetes API server audit logging. Capture events where users query resources such as pods, deployments, or services. +- Cloud Provider Logs + - AWS CloudTrail: Enable logging for API calls like ListTasks or DescribeTasks. + - Azure Monitor: Enable activity logging to track container-related queries. + - GCP Cloud Logging: Track API events involving container enumerations or deployments. +- SIEM Integration: Collect logs from Docker, Kubernetes, and cloud services for centralized analysis."Container Enumeration" data component captures events and actions related to listing and identifying active or available containers within a containerized environment. This includes information about running, stopped, or configured containers, such as their names, IDs, statuses, or associated images. Monitoring this activity is crucial for detecting unauthorized discovery or reconnaissance efforts. Examples: + +- Docker Example: `docker ps`, `docker ps -a` +- Kubernetes Example: `kubectl get pods`, `kubectl get deployments` +- Cloud Container Services Example + - AWS ECS: API Call: ListTasks or ListContainers + - Azure Kubernetes Service: API Call: List pod or container instances. + - Google Kubernetes Engine (GKE): API Call: Retrieve deployments and their associated containers.

[DC0054] Drive Access

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Refers to the act of accessing a data storage device, such at1Refers to the act of accessing a data storage device, such a
>s a hard drive, SSD, USB, or network-mounted drive. This dat>s a hard drive, SSD, USB, or network-mounted drive. This dat
>a component logs the opening or mounting of drives, capturin>a component logs the opening or mounting of drives, capturin
>g activities such as reading, writing, or executing files wi>g activities such as reading, writing, or executing files wi
>thin an assigned drive letter (e.g., `C:\`, `/mnt/drive`) or>thin an assigned drive letter (e.g., `C:\`, `/mnt/drive`) or
> mount point. Examples:   - Removable Drive Insertion: A USB> mount point. Examples:   - Removable Drive Insertion: A USB
> drive is inserted, assigned the letter `F:\`, and files are> drive is inserted, assigned the letter `F:\`, and files are
> accessed. - Network Drive Mounting: A network share `\\serv> accessed. - Network Drive Mounting: A network share `\\serv
>er\share` is mapped to the drive `Z:\`. - External Hard Driv>er\share` is mapped to the drive `Z:\`. - External Hard Driv
>e Access: An external drive is connected, mounted at `/mnt/b>e Access: An external drive is connected, mounted at `/mnt/b
>ackup`, and accessed for copying files. - System Volume Acce>ackup`, and accessed for copying files. - System Volume Acce
>ss: The system volume `C:\` is accessed for modifications to>ss: The system volume `C:\` is accessed for modifications to
> critical files. - Cloud-Synced Drives: Cloud storage drives> critical files. - Cloud-Synced Drives: Cloud storage drives
> like OneDrive or Google Drive are accessed via local mounts> like OneDrive or Google Drive are accessed via local mounts
>.  This data component can be collected through the followin>.
>g measures:  Windows Event Logs - Relevant Events:     - Eve 
>nt ID 4663: Logs access to file or folder objects.     - Eve 
>nt ID 4656: Tracks a handle to an object like a drive or fil 
>e. - Configuration:     - Enable auditing for "Object Access 
>" in Local Security Policy.     - Use Group Policy for broad 
>er deployment: `Computer Configuration > Windows Settings >  
>Security Settings > Advanced Audit Policy Configuration > Ob 
>ject Access`  Linux System Logs  - Command-Line Monitoring:  
>Use the `dmesg` or `journalctl` command to monitor drive mou 
>nt/unmount events. - Auditd Configuration: Add an audit rule 
> for drive access: `auditctl -w /mnt/drive -p rwxa -k drive_ 
>access` - Review logs via `/var/log/audit/audit.log`.  macOS 
> System Logs  - Command-Line Monitoring: Use `diskutil list` 
> or `fs_usage` to monitor drive access and mount points. - U 
>nified Logs: Query unified logs using log show for drive-rel 
>ated activities: `log show --info | grep "mount"`  Endpoint  
>Detection and Response (EDR) Tools  - Use EDR solutions to m 
>onitor drive activities and collect detailed forensic data.  
> SIEM Tools  - Ingest logs from endpoints to detect drive ac 
>cess patterns. Configure rules to alert on unusual or unauth 
>orized drive access. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:38.086000+00:002025-11-12 22:03:39.105000+00:00
descriptionRefers to the act of accessing a data storage device, such as a hard drive, SSD, USB, or network-mounted drive. This data component logs the opening or mounting of drives, capturing activities such as reading, writing, or executing files within an assigned drive letter (e.g., `C:\`, `/mnt/drive`) or mount point. Examples: + +- Removable Drive Insertion: A USB drive is inserted, assigned the letter `F:\`, and files are accessed. +- Network Drive Mounting: A network share `\\server\share` is mapped to the drive `Z:\`. +- External Hard Drive Access: An external drive is connected, mounted at `/mnt/backup`, and accessed for copying files. +- System Volume Access: The system volume `C:\` is accessed for modifications to critical files. +- Cloud-Synced Drives: Cloud storage drives like OneDrive or Google Drive are accessed via local mounts. + +This data component can be collected through the following measures: + +Windows Event Logs +- Relevant Events: + - Event ID 4663: Logs access to file or folder objects. + - Event ID 4656: Tracks a handle to an object like a drive or file. +- Configuration: + - Enable auditing for "Object Access" in Local Security Policy. + - Use Group Policy for broader deployment: `Computer Configuration > Windows Settings > Security Settings > Advanced Audit Policy Configuration > Object Access` + +Linux System Logs + +- Command-Line Monitoring: Use the `dmesg` or `journalctl` command to monitor drive mount/unmount events. +- Auditd Configuration: Add an audit rule for drive access: `auditctl -w /mnt/drive -p rwxa -k drive_access` +- Review logs via `/var/log/audit/audit.log`. + +macOS System Logs + +- Command-Line Monitoring: Use `diskutil list` or `fs_usage` to monitor drive access and mount points. +- Unified Logs: Query unified logs using log show for drive-related activities: `log show --info | grep "mount"` + +Endpoint Detection and Response (EDR) Tools + +- Use EDR solutions to monitor drive activities and collect detailed forensic data. + +SIEM Tools + +- Ingest logs from endpoints to detect drive access patterns. Configure rules to alert on unusual or unauthorized drive access.Refers to the act of accessing a data storage device, such as a hard drive, SSD, USB, or network-mounted drive. This data component logs the opening or mounting of drives, capturing activities such as reading, writing, or executing files within an assigned drive letter (e.g., `C:\`, `/mnt/drive`) or mount point. Examples: + +- Removable Drive Insertion: A USB drive is inserted, assigned the letter `F:\`, and files are accessed. +- Network Drive Mounting: A network share `\\server\share` is mapped to the drive `Z:\`. +- External Hard Drive Access: An external drive is connected, mounted at `/mnt/backup`, and accessed for copying files. +- System Volume Access: The system volume `C:\` is accessed for modifications to critical files. +- Cloud-Synced Drives: Cloud storage drives like OneDrive or Google Drive are accessed via local mounts.

[DC0042] Drive Creation

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1The activity of assigning a new drive letter or creating a mt1The activity of assigning a new drive letter or creating a m
>ount point for a data storage device, such as a USB, network>ount point for a data storage device, such as a USB, network
> share, or external hard drive, enabling access to its conte> share, or external hard drive, enabling access to its conte
>nt on a host system. Examples:   - USB Drive Insertion: A US>nt on a host system. Examples:   - USB Drive Insertion: A US
>B drive is plugged in and automatically assigned the letter >B drive is plugged in and automatically assigned the letter 
>`E:\` on a Windows machine. - Network Drive Mapping: A netwo>`E:\` on a Windows machine. - Network Drive Mapping: A netwo
>rk share `\\server\share` is mapped to the drive `Z:\`. - Vi>rk share `\\server\share` is mapped to the drive `Z:\`. - Vi
>rtual Drive Creation: A virtual disk is mounted on `/mnt/vir>rtual Drive Creation: A virtual disk is mounted on `/mnt/vir
>tualdrive` using an ISO image or a virtual hard disk (VHD). >tualdrive` using an ISO image or a virtual hard disk (VHD). 
>- Cloud Storage Mounting: Google Drive is mounted as `G:\` o>- Cloud Storage Mounting: Google Drive is mounted as `G:\` o
>n a Windows machine using a cloud sync tool. - External Stor>n a Windows machine using a cloud sync tool. - External Stor
>age Integration: An external HDD or SSD is connected and ass>age Integration: An external HDD or SSD is connected and ass
>igned `/mnt/external` on a Linux system.  This data componen>igned `/mnt/external` on a Linux system..
>t can be collected through the following measures:  Windows  
>Event Logs  - Relevant Events:     - Event ID 98: Logs the c 
>reation of a volume (mount or new drive letter assignment).  
>    - Event ID 1006: Logs removable storage device insertion 
>s. - Configuration: Enable "Removable Storage Events" in the 
> Group Policy settings: `Computer Configuration > Administra 
>tive Templates > System > Removable Storage Access`  Linux S 
>ystem Logs  - Command-Line Monitoring: Use `dmesg` or `journ 
>alctl` to monitor mount events.  - Auditd Configuration: Add 
> audit rules to track mount points. - Logs can be reviewed i 
>n /var/log/audit/audit.log.  macOS System Logs  - Unified Lo 
>gs: Monitor system logs for mount activity: - Command-Line T 
>ools: Use `diskutil list` to verify newly created or mounted 
> drives.  Endpoint Detection and Response (EDR) Tools  - EDR 
> solutions can log removable drive usage and network-mounted 
> drives. Configure EDR policies to alert on suspicious drive 
> creation events.  SIEM Tools  - Centralize logs from multip 
>le platforms into a SIEM (e.g., Splunk) to correlate and ale 
>rt on suspicious drive creation activities. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:37.342000+00:002025-11-12 22:03:39.105000+00:00
descriptionThe activity of assigning a new drive letter or creating a mount point for a data storage device, such as a USB, network share, or external hard drive, enabling access to its content on a host system. Examples: + +- USB Drive Insertion: A USB drive is plugged in and automatically assigned the letter `E:\` on a Windows machine. +- Network Drive Mapping: A network share `\\server\share` is mapped to the drive `Z:\`. +- Virtual Drive Creation: A virtual disk is mounted on `/mnt/virtualdrive` using an ISO image or a virtual hard disk (VHD). +- Cloud Storage Mounting: Google Drive is mounted as `G:\` on a Windows machine using a cloud sync tool. +- External Storage Integration: An external HDD or SSD is connected and assigned `/mnt/external` on a Linux system. + +This data component can be collected through the following measures: + +Windows Event Logs + +- Relevant Events: + - Event ID 98: Logs the creation of a volume (mount or new drive letter assignment). + - Event ID 1006: Logs removable storage device insertions. +- Configuration: Enable "Removable Storage Events" in the Group Policy settings: +`Computer Configuration > Administrative Templates > System > Removable Storage Access` + +Linux System Logs + +- Command-Line Monitoring: Use `dmesg` or `journalctl` to monitor mount events. + +- Auditd Configuration: Add audit rules to track mount points. +- Logs can be reviewed in /var/log/audit/audit.log. + +macOS System Logs + +- Unified Logs: Monitor system logs for mount activity: +- Command-Line Tools: Use `diskutil list` to verify newly created or mounted drives. + +Endpoint Detection and Response (EDR) Tools + +- EDR solutions can log removable drive usage and network-mounted drives. Configure EDR policies to alert on suspicious drive creation events. + +SIEM Tools + +- Centralize logs from multiple platforms into a SIEM (e.g., Splunk) to correlate and alert on suspicious drive creation activities.The activity of assigning a new drive letter or creating a mount point for a data storage device, such as a USB, network share, or external hard drive, enabling access to its content on a host system. Examples: + +- USB Drive Insertion: A USB drive is plugged in and automatically assigned the letter `E:\` on a Windows machine. +- Network Drive Mapping: A network share `\\server\share` is mapped to the drive `Z:\`. +- Virtual Drive Creation: A virtual disk is mounted on `/mnt/virtualdrive` using an ISO image or a virtual hard disk (VHD). +- Cloud Storage Mounting: Google Drive is mounted as `G:\` on a Windows machine using a cloud sync tool. +- External Storage Integration: An external HDD or SSD is connected and assigned `/mnt/external` on a Linux system..
x_mitre_log_sources[4]['name']WinEventLog:Microsoft-Windows-Partition/DiagnosticWinEventLog:System
x_mitre_log_sources[7]['channel']EventCode=1006,10001EventCode=1006, 10001
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Microsoft-Windows-DriverFrameworks-UserMode/Operational', 'channel': 'EventCode=2003'}
x_mitre_log_sources{'name': 'WinEventLog:System', 'channel': 'EventCode=20001/20003'}
x_mitre_log_sources{'name': 'WinEventLog:System', 'channel': '20001-20003'}

[DC0046] Drive Modification

Current version: 2.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-22 19:03:17.198000+00:002025-11-12 22:03:39.105000+00:00
external_references[0]['url']https://attack.mitre.org/data-components/DC0046https://attack.mitre.org/datacomponents/DC0046

[DC0079] Driver Load

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1The process of attaching a driver, which is a software compot1The process of attaching a driver, which is a software compo
>nent that allows the operating system and applications to in>nent that allows the operating system and applications to in
>teract with hardware devices, to either user-mode or kernel->teract with hardware devices, to either user-mode or kernel-
>mode of a system. This can include benign actions (e.g., har>mode of a system. This can include benign actions (e.g., har
>dware drivers) or malicious behavior (e.g., rootkits or unsi>dware drivers) or malicious behavior (e.g., rootkits or unsi
>gned drivers). Examples:   - Legitimate Driver Loading: A ne>gned drivers). Examples:   - Legitimate Driver Loading: A ne
>w graphics driver from a vendor like NVIDIA or AMD is loaded>w graphics driver from a vendor like NVIDIA or AMD is loaded
> into the system. - Unsigned Driver Loading: A driver withou> into the system. - Unsigned Driver Loading: A driver withou
>t a valid digital signature is loaded into the kernel. - Roo>t a valid digital signature is loaded into the kernel. - Roo
>tkit Installation: A malicious rootkit driver is loaded to m>tkit Installation: A malicious rootkit driver is loaded to m
>anipulate kernel-mode processes. - Anti-Virus or EDR Driver >anipulate kernel-mode processes. - Anti-Virus or EDR Driver 
>Loading: An Endpoint Detection and Response (EDR) solution l>Loading: An Endpoint Detection and Response (EDR) solution l
>oads its driver to monitor system activities. - Driver Misus>oads its driver to monitor system activities. - Driver Misus
>e: A legitimate driver is loaded and exploited to execute ma>e: A legitimate driver is loaded and exploited to execute ma
>licious actions, such as using vulnerable drivers for bypass>licious actions, such as using vulnerable drivers for bypass
>ing defenses (e.g., Bring Your Own Vulnerable Driver (BYOVD)>ing defenses (e.g., Bring Your Own Vulnerable Driver (BYOVD)
> attacks).  This data component can be collected through the> attacks).
> following measures:  Windows  - Sysmon Logs:      - Event I 
>D 6: Captures driver loading activity, including file path,  
>hashes, and signature information.     - Configuration: Ensu 
>re Sysmon is configured with a ruleset that monitors driver  
>loading events - Windows Event Logs: Enable "Audit Kernel Ob 
>ject" to capture kernel-related driver loading events.  Linu 
>x  - Auditd: Configure audit rules to capture driver loading 
> events: `auditctl -w /lib/modules/ -p rwxa -k driver_load`  
>- Kernel Logs (dmesg): Use dmesg to monitor driver-related a 
>ctivities: `dmesg | grep "module"` - Syslog or journald: Rev 
>iew logs for module insertion or removal activities.  macOS  
> - Unified Logs: Use the macOS unified logging system to mon 
>itor kext (kernel extension) loads: `log show --predicate 'e 
>ventMessage contains "kext load"'` - Endpoint Security Frame 
>work: Monitor driver loading via third-party security tools  
>that leverage Apple’s Endpoint Security Framework.  SIEM Too 
>ls  - Ingest driver load logs from Sysmon, Auditd, or macOS  
>unified logs into a centralized SIEM (e.g., Splunk). - Creat 
>e rules to detect unsigned drivers, rootkit activity, or kno 
>wn vulnerable drivers.  EDR Solutions  - Use EDR tools to de 
>tect and alert on anomalous driver loading activity. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:37.274000+00:002025-11-12 22:03:39.105000+00:00
descriptionThe process of attaching a driver, which is a software component that allows the operating system and applications to interact with hardware devices, to either user-mode or kernel-mode of a system. This can include benign actions (e.g., hardware drivers) or malicious behavior (e.g., rootkits or unsigned drivers). Examples: + +- Legitimate Driver Loading: A new graphics driver from a vendor like NVIDIA or AMD is loaded into the system. +- Unsigned Driver Loading: A driver without a valid digital signature is loaded into the kernel. +- Rootkit Installation: A malicious rootkit driver is loaded to manipulate kernel-mode processes. +- Anti-Virus or EDR Driver Loading: An Endpoint Detection and Response (EDR) solution loads its driver to monitor system activities. +- Driver Misuse: A legitimate driver is loaded and exploited to execute malicious actions, such as using vulnerable drivers for bypassing defenses (e.g., Bring Your Own Vulnerable Driver (BYOVD) attacks). + +This data component can be collected through the following measures: + +Windows + +- Sysmon Logs: + - Event ID 6: Captures driver loading activity, including file path, hashes, and signature information. + - Configuration: Ensure Sysmon is configured with a ruleset that monitors driver loading events +- Windows Event Logs: Enable "Audit Kernel Object" to capture kernel-related driver loading events. + +Linux + +- Auditd: Configure audit rules to capture driver loading events: `auditctl -w /lib/modules/ -p rwxa -k driver_load` +- Kernel Logs (dmesg): Use dmesg to monitor driver-related activities: `dmesg | grep "module"` +- Syslog or journald: Review logs for module insertion or removal activities. + +macOS + +- Unified Logs: Use the macOS unified logging system to monitor kext (kernel extension) loads: +`log show --predicate 'eventMessage contains "kext load"'` +- Endpoint Security Framework: Monitor driver loading via third-party security tools that leverage Apple’s Endpoint Security Framework. + +SIEM Tools + +- Ingest driver load logs from Sysmon, Auditd, or macOS unified logs into a centralized SIEM (e.g., Splunk). +- Create rules to detect unsigned drivers, rootkit activity, or known vulnerable drivers. + +EDR Solutions + +- Use EDR tools to detect and alert on anomalous driver loading activity.The process of attaching a driver, which is a software component that allows the operating system and applications to interact with hardware devices, to either user-mode or kernel-mode of a system. This can include benign actions (e.g., hardware drivers) or malicious behavior (e.g., rootkits or unsigned drivers). Examples: + +- Legitimate Driver Loading: A new graphics driver from a vendor like NVIDIA or AMD is loaded into the system. +- Unsigned Driver Loading: A driver without a valid digital signature is loaded into the kernel. +- Rootkit Installation: A malicious rootkit driver is loaded to manipulate kernel-mode processes. +- Anti-Virus or EDR Driver Loading: An Endpoint Detection and Response (EDR) solution loads its driver to monitor system activities. +- Driver Misuse: A legitimate driver is loaded and exploited to execute malicious actions, such as using vulnerable drivers for bypassing defenses (e.g., Bring Your Own Vulnerable Driver (BYOVD) attacks).
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:System', 'channel': 'EventCode=6'}

[DC0055] File Access

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1To events where a file is opened or accessed, making its cont1To events where a file is opened or accessed, making its con
>tents available to the requester. This includes reading, exe>tents available to the requester. This includes reading, exe
>cuting, or interacting with files by authorized or unauthori>cuting, or interacting with files by authorized or unauthori
>zed entities. Examples include logging file access events (e>zed entities. Examples include logging file access events (e
>.g., Windows Event ID 4663), monitoring file reads, and dete>.g., Windows Event ID 4663), monitoring file reads, and dete
>cting unusual file access patterns. Examples:   - File Read >cting unusual file access patterns. Examples:   - File Read 
>Operations: A user opens a sensitive document (e.g., financi>Operations: A user opens a sensitive document (e.g., financi
>al_report.xlsx) on a shared drive. - File Execution: A scrip>al_report.xlsx) on a shared drive. - File Execution: A scrip
>t or executable file is accessed and executed (e.g., malware>t or executable file is accessed and executed (e.g., malware
>.exe is run from a temporary directory). - Unauthorized File>.exe is run from a temporary directory). - Unauthorized File
> Access: An unauthorized user attempts to access a protected> Access: An unauthorized user attempts to access a protected
> configuration file (e.g., `/etc/passwd` on Linux or `System> configuration file (e.g., `/etc/passwd` on Linux or `System
>32` files on Windows). - File Access Patterns: Bulk access t>32` files on Windows). - File Access Patterns: Bulk access t
>o multiple files in a short time (e.g., mass access to docum>o multiple files in a short time (e.g., mass access to docum
>ents on a file server). - File Access via Network: Files on >ents on a file server). - File Access via Network: Files on 
>a network share are accessed remotely (e.g., logs of SMB fil>a network share are accessed remotely (e.g., logs of SMB fil
>e access).  This data component can be collected through the>e access).
> following measures:  Windows  - Windows Event Logs: Event I 
>D 4663: Captures file system auditing details, including who 
> accessed the file, access type, and file name. - Sysmon:    
>  - Event ID 11: Logs file creation time changes.     - Even 
>t ID 1 (process creation): Can provide insight into files ex 
>ecuted. - PowerShell: Commands to monitor file access in rea 
>l-time: `Get-WinEvent -FilterHashtable @{LogName='Security'; 
> ID=4663}`  Linux  - Auditd: Monitor file access events usin 
>g audit rules: `auditctl -w /path/to/file -p rwxa -k file_ac 
>cess` - View logs: `ausearch -k file_access` - Inotify: Use  
>inotify to track file access on Linux: `inotifywait -m /path 
>/to/watch -e access`  macOS  - Unified Logs: Monitor file ac 
>cess using the macOS Unified Logging System. - FSEvents: Fil 
>e System Events can track file accesses: `fs_usage | grep op 
>en`  Network Devices  - SMB/CIFS Logs: Monitor file access o 
>ver network shares using logs from SMB or CIFS protocol. - N 
>AS Logs: Collect logs from network-attached storage systems  
>for file access events.  SIEM Integration  - Collect file ac 
>cess logs from all platforms (Windows, Linux, macOS) and cen 
>tralize in a SIEM for correlation and analysis. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:35.674000+00:002025-11-12 22:03:39.105000+00:00
descriptionTo events where a file is opened or accessed, making its contents available to the requester. This includes reading, executing, or interacting with files by authorized or unauthorized entities. Examples include logging file access events (e.g., Windows Event ID 4663), monitoring file reads, and detecting unusual file access patterns. Examples: + +- File Read Operations: A user opens a sensitive document (e.g., financial_report.xlsx) on a shared drive. +- File Execution: A script or executable file is accessed and executed (e.g., malware.exe is run from a temporary directory). +- Unauthorized File Access: An unauthorized user attempts to access a protected configuration file (e.g., `/etc/passwd` on Linux or `System32` files on Windows). +- File Access Patterns: Bulk access to multiple files in a short time (e.g., mass access to documents on a file server). +- File Access via Network: Files on a network share are accessed remotely (e.g., logs of SMB file access). + +This data component can be collected through the following measures: + +Windows + +- Windows Event Logs: Event ID 4663: Captures file system auditing details, including who accessed the file, access type, and file name. +- Sysmon: + - Event ID 11: Logs file creation time changes. + - Event ID 1 (process creation): Can provide insight into files executed. +- PowerShell: Commands to monitor file access in real-time: `Get-WinEvent -FilterHashtable @{LogName='Security'; ID=4663}` + +Linux + +- Auditd: Monitor file access events using audit rules: `auditctl -w /path/to/file -p rwxa -k file_access` +- View logs: `ausearch -k file_access` +- Inotify: Use inotify to track file access on Linux: `inotifywait -m /path/to/watch -e access` + +macOS + +- Unified Logs: Monitor file access using the macOS Unified Logging System. +- FSEvents: File System Events can track file accesses: `fs_usage | grep open` + +Network Devices + +- SMB/CIFS Logs: Monitor file access over network shares using logs from SMB or CIFS protocol. +- NAS Logs: Collect logs from network-attached storage systems for file access events. + +SIEM Integration + +- Collect file access logs from all platforms (Windows, Linux, macOS) and centralize in a SIEM for correlation and analysis.To events where a file is opened or accessed, making its contents available to the requester. This includes reading, executing, or interacting with files by authorized or unauthorized entities. Examples include logging file access events (e.g., Windows Event ID 4663), monitoring file reads, and detecting unusual file access patterns. Examples: + +- File Read Operations: A user opens a sensitive document (e.g., financial_report.xlsx) on a shared drive. +- File Execution: A script or executable file is accessed and executed (e.g., malware.exe is run from a temporary directory). +- Unauthorized File Access: An unauthorized user attempts to access a protected configuration file (e.g., `/etc/passwd` on Linux or `System32` files on Windows). +- File Access Patterns: Bulk access to multiple files in a short time (e.g., mass access to documents on a file server). +- File Access via Network: Files on a network share are accessed remotely (e.g., logs of SMB file access).
x_mitre_log_sources[4]['channel']EventCode=4663EventCode=4663, 4670, 4656
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4656, 4663'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4656,4663'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4670, 4663'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4656'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=5145, 4663'}
x_mitre_log_sources{'name': 'auditd:PATH', 'channel': 'path'}

[DC0039] File Creation

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1A new file is created on a system or network storage. This at1A new file is created on a system or network storage. This a
>ction often signifies an operation such as saving a document>ction often signifies an operation such as saving a document
>, writing data, or deploying a file. Logging these events he>, writing data, or deploying a file. Logging these events he
>lps identify legitimate or potentially malicious file creati>lps identify legitimate or potentially malicious file creati
>on activities. Examples include logging file creation events>on activities. Examples include logging file creation events
> (e.g., Sysmon Event ID 11 or Linux auditd logs).   This dat> (e.g., Sysmon Event ID 11 or Linux auditd logs). 
>a component can be collected through the following measures: 
>  Windows  - Sysmon: Event ID 11: Logs file creation events, 
> capturing details like the file path, hash, and creation ti 
>me. - Windows Event Log: Enable "Object Access" auditing in  
>Group Policy to track file creation under Event ID 4663. - P 
>owerShell: Real-time monitoring of file creation:`Get-WinEve 
>nt -FilterHashtable @{LogName='Security'; ID=4663}`  Linux   
>- Auditd: Use audit rules to monitor file creation: `auditct 
>l -w /path/to/directory -p w -k file_creation` - View logs:  
>`ausearch -k file_creation` - Inotify: Monitor file creation 
> with inotifywait: `inotifywait -m /path/to/watch -e create` 
>  macOS  - Unified Logs: Use the macOS Unified Logging Syste 
>m to capture file creation events. - FSEvents: Use File Syst 
>em Events to monitor file creation: `fs_usage | grep create` 
>  Network Devices  - NAS Logs: Monitor file creation events  
>on network-attached storage devices. - SMB Logs: Collect log 
>s of file creation activities over SMB/CIFS protocols.  SIEM 
> Integration  - Forward logs from all platforms (Windows, Li 
>nux, macOS) to a SIEM for central analysis and alerting. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 19:32:14.744000+00:002025-11-12 22:03:39.105000+00:00
external_references[0]['url']https://attack.mitre.org/data-components/DC0039https://attack.mitre.org/datacomponents/DC0039
descriptionA new file is created on a system or network storage. This action often signifies an operation such as saving a document, writing data, or deploying a file. Logging these events helps identify legitimate or potentially malicious file creation activities. Examples include logging file creation events (e.g., Sysmon Event ID 11 or Linux auditd logs). + +This data component can be collected through the following measures: + +Windows + +- Sysmon: Event ID 11: Logs file creation events, capturing details like the file path, hash, and creation time. +- Windows Event Log: Enable "Object Access" auditing in Group Policy to track file creation under Event ID 4663. +- PowerShell: Real-time monitoring of file creation:`Get-WinEvent -FilterHashtable @{LogName='Security'; ID=4663}` + +Linux + +- Auditd: Use audit rules to monitor file creation: `auditctl -w /path/to/directory -p w -k file_creation` +- View logs: `ausearch -k file_creation` +- Inotify: Monitor file creation with inotifywait: `inotifywait -m /path/to/watch -e create` + +macOS + +- Unified Logs: Use the macOS Unified Logging System to capture file creation events. +- FSEvents: Use File System Events to monitor file creation: `fs_usage | grep create` + +Network Devices + +- NAS Logs: Monitor file creation events on network-attached storage devices. +- SMB Logs: Collect logs of file creation activities over SMB/CIFS protocols. + +SIEM Integration + +- Forward logs from all platforms (Windows, Linux, macOS) to a SIEM for central analysis and alerting.A new file is created on a system or network storage. This action often signifies an operation such as saving a document, writing data, or deploying a file. Logging these events helps identify legitimate or potentially malicious file creation activities. Examples include logging file creation events (e.g., Sysmon Event ID 11 or Linux auditd logs).
x_mitre_log_sources[37]['name']macos:unifiedmacos:unifiedlog
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Sysmon', 'channel': 'Modification of .asar in /opt or ~/.config directories'}

[DC0040] File Deletion

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Refers to events where files are removed from a system or stt1Refers to events where files are removed from a system or st
>orage device. These events can indicate legitimate housekeep>orage device. These events can indicate legitimate housekeep
>ing activities or malicious actions such as attackers attemp>ing activities or malicious actions such as attackers attemp
>ting to cover their tracks. Monitoring file deletions helps >ting to cover their tracks. Monitoring file deletions helps 
>organizations identify unauthorized or suspicious activities>organizations identify unauthorized or suspicious activities
>.  This data component can be collected through the followin>.
>g measures:  Windows  - Sysmon: Event ID 23: Logs file delet 
>ion events, including details such as file paths and respons 
>ible processes. - Windows Event Log: Enable "Object Access"  
>auditing to monitor file deletions. - PowerShell: `Get-WinEv 
>ent -FilterHashtable @{LogName='Security'; ID=4663} | Where- 
>Object {$_.Message -like '*DELETE*'}`  Linux  - Auditd: Use  
>audit rules to capture file deletion events: `auditctl -a al 
>ways,exit -F arch=b64 -S unlink -S rename -S rmdir -k file_d 
>eletion` - Query logs: `ausearch -k file_deletion` - Inotify 
>: Use inotifywait to monitor file deletions: `inotifywait -m 
> /path/to/watch -e delete`  macOS  - Endpoint Security Frame 
>work (ESF): Monitor events like ES_EVENT_TYPE_AUTH_UNLINK to 
> capture file deletion activities. - FSEvents: Track file de 
>letion activities in real-time: `fs_usage | grep unlink`  SI 
>EM Integration  - Forward file deletion logs to a SIEM for c 
>entralized monitoring and correlation with other events.  
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:36.450000+00:002025-11-12 22:03:39.105000+00:00
descriptionRefers to events where files are removed from a system or storage device. These events can indicate legitimate housekeeping activities or malicious actions such as attackers attempting to cover their tracks. Monitoring file deletions helps organizations identify unauthorized or suspicious activities. + +This data component can be collected through the following measures: + +Windows + +- Sysmon: Event ID 23: Logs file deletion events, including details such as file paths and responsible processes. +- Windows Event Log: Enable "Object Access" auditing to monitor file deletions. +- PowerShell: `Get-WinEvent -FilterHashtable @{LogName='Security'; ID=4663} | Where-Object {$_.Message -like '*DELETE*'}` + +Linux + +- Auditd: Use audit rules to capture file deletion events: `auditctl -a always,exit -F arch=b64 -S unlink -S rename -S rmdir -k file_deletion` +- Query logs: `ausearch -k file_deletion` +- Inotify: Use inotifywait to monitor file deletions: `inotifywait -m /path/to/watch -e delete` + +macOS + +- Endpoint Security Framework (ESF): Monitor events like ES_EVENT_TYPE_AUTH_UNLINK to capture file deletion activities. +- FSEvents: Track file deletion activities in real-time: `fs_usage | grep unlink` + +SIEM Integration + +- Forward file deletion logs to a SIEM for centralized monitoring and correlation with other events. +Refers to events where files are removed from a system or storage device. These events can indicate legitimate housekeeping activities or malicious actions such as attackers attempting to cover their tracks. Monitoring file deletions helps organizations identify unauthorized or suspicious activities.

[DC0059] File Metadata

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1contextual information about a file, including attributes sut1contextual information about a file, including attributes su
>ch as the file's name, size, type, content (e.g., signatures>ch as the file's name, size, type, content (e.g., signatures
>, headers, media), user/owner, permissions, timestamps, and >, headers, media), user/owner, permissions, timestamps, and 
>other related properties. File metadata provides insights in>other related properties. File metadata provides insights in
>to a file's characteristics and can be used to detect malici>to a file's characteristics and can be used to detect malici
>ous activity, unauthorized modifications, or other anomalies>ous activity, unauthorized modifications, or other anomalies
>. Examples:   - File Ownership and Permissions: Checking the>. Examples:   - File Ownership and Permissions: Checking the
> owner and permissions of a critical configuration file like> owner and permissions of a critical configuration file like
> /etc/passwd on Linux or C:\Windows\System32\config\SAM on W> /etc/passwd on Linux or C:\Windows\System32\config\SAM on W
>indows. - Timestamps: Analyzing the creation, modification, >indows. - Timestamps: Analyzing the creation, modification, 
>and access timestamps of a file. - File Content and Signatur>and access timestamps of a file. - File Content and Signatur
>es: Extracting the headers of an executable file to verify i>es: Extracting the headers of an executable file to verify i
>ts signature or detect packing/obfuscation. - File Attribute>ts signature or detect packing/obfuscation. - File Attribute
>s: Analyzing attributes like hidden, system, or read-only fl>s: Analyzing attributes like hidden, system, or read-only fl
>ags in Windows. - File Hashes: Generating MD5, SHA-1, or SHA>ags in Windows. - File Hashes: Generating MD5, SHA-1, or SHA
>-256 hashes of files to compare against threat intelligence >-256 hashes of files to compare against threat intelligence 
>feeds. - File Location: Monitoring files located in unusual >feeds. - File Location: Monitoring files located in unusual 
>directories or paths, such as temporary or user folders.  Th>directories or paths, such as temporary or user folders.
>is data component can be collected through the following mea 
>sures:  Windows  - Sysinternals Tools: Use `AccessEnum` or ` 
>PSFile` to retrieve metadata about file access and permissio 
>ns. - Windows Event Logs: Enable object access auditing and  
>monitor events like 4663 (Object Access) and 5140 (A network 
> share object was accessed). - PowerShell: Use Get-Item or G 
>et-ChildItem cmdlets: `Get-ChildItem -Path "C:\Path\To\Direc 
>tory" -Recurse | Select-Object Name, Length, LastWriteTime,  
>Attributes`  Linux  - File System Commands: Use `ls -l` or s 
>tat to retrieve file metadata: `stat /path/to/file` - Auditd 
>: Configure audit rules to log metadata access: `auditctl -w 
> /path/to/file -p wa -k file_metadata` - Filesystem Integrit 
>y Tools: Tools like tripwire or AIDE (Advanced Intrusion Det 
>ection Environment) can monitor file metadata changes.  macO 
>S  - FSEvents: Use FSEvents to track file metadata changes.  
>- Endpoint Security Framework (ESF): Capture metadata-relate 
>d events via ESF APIs. - Command-Line Tools: Use ls -l or xa 
>ttr for file attributes: `ls -l@ /path/to/file`  SIEM Integr 
>ation  - Forward file metadata logs from endpoint or network 
> devices to a SIEM for centralized analysis. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:35.397000+00:002025-11-12 22:03:39.105000+00:00
descriptioncontextual information about a file, including attributes such as the file's name, size, type, content (e.g., signatures, headers, media), user/owner, permissions, timestamps, and other related properties. File metadata provides insights into a file's characteristics and can be used to detect malicious activity, unauthorized modifications, or other anomalies. Examples: + +- File Ownership and Permissions: Checking the owner and permissions of a critical configuration file like /etc/passwd on Linux or C:\Windows\System32\config\SAM on Windows. +- Timestamps: Analyzing the creation, modification, and access timestamps of a file. +- File Content and Signatures: Extracting the headers of an executable file to verify its signature or detect packing/obfuscation. +- File Attributes: Analyzing attributes like hidden, system, or read-only flags in Windows. +- File Hashes: Generating MD5, SHA-1, or SHA-256 hashes of files to compare against threat intelligence feeds. +- File Location: Monitoring files located in unusual directories or paths, such as temporary or user folders. + +This data component can be collected through the following measures: + +Windows + +- Sysinternals Tools: Use `AccessEnum` or `PSFile` to retrieve metadata about file access and permissions. +- Windows Event Logs: Enable object access auditing and monitor events like 4663 (Object Access) and 5140 (A network share object was accessed). +- PowerShell: Use Get-Item or Get-ChildItem cmdlets: `Get-ChildItem -Path "C:\Path\To\Directory" -Recurse | Select-Object Name, Length, LastWriteTime, Attributes` + +Linux + +- File System Commands: Use `ls -l` or stat to retrieve file metadata: `stat /path/to/file` +- Auditd: Configure audit rules to log metadata access: `auditctl -w /path/to/file -p wa -k file_metadata` +- Filesystem Integrity Tools: Tools like tripwire or AIDE (Advanced Intrusion Detection Environment) can monitor file metadata changes. + +macOS + +- FSEvents: Use FSEvents to track file metadata changes. +- Endpoint Security Framework (ESF): Capture metadata-related events via ESF APIs. +- Command-Line Tools: Use ls -l or xattr for file attributes: `ls -l@ /path/to/file` + +SIEM Integration + +- Forward file metadata logs from endpoint or network devices to a SIEM for centralized analysis.contextual information about a file, including attributes such as the file's name, size, type, content (e.g., signatures, headers, media), user/owner, permissions, timestamps, and other related properties. File metadata provides insights into a file's characteristics and can be used to detect malicious activity, unauthorized modifications, or other anomalies. Examples: + +- File Ownership and Permissions: Checking the owner and permissions of a critical configuration file like /etc/passwd on Linux or C:\Windows\System32\config\SAM on Windows. +- Timestamps: Analyzing the creation, modification, and access timestamps of a file. +- File Content and Signatures: Extracting the headers of an executable file to verify its signature or detect packing/obfuscation. +- File Attributes: Analyzing attributes like hidden, system, or read-only flags in Windows. +- File Hashes: Generating MD5, SHA-1, or SHA-256 hashes of files to compare against threat intelligence feeds. +- File Location: Monitoring files located in unusual directories or paths, such as temporary or user folders.
x_mitre_log_sources[18]['channel']pathPATH
x_mitre_log_sources[42]['channel']EventCode=4670EventCode=4663, 4670, 4656
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4663'}
x_mitre_log_sources{'name': 'WinEventLog:Sysmon', 'channel': 'EventCode=15 '}

[DC0061] File Modification

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Changes made to a file, including updates to its contents, mt1Changes made to a file, including updates to its contents, m
>etadata, access permissions, or attributes. These modificati>etadata, access permissions, or attributes. These modificati
>ons may indicate legitimate activity (e.g., software updates>ons may indicate legitimate activity (e.g., software updates
>) or unauthorized changes (e.g., tampering, ransomware, or a>) or unauthorized changes (e.g., tampering, ransomware, or a
>dversarial modifications). Examples:   - Content Modificatio>dversarial modifications). Examples:   - Content Modificatio
>ns: Changes to the content of a configuration file, such as >ns: Changes to the content of a configuration file, such as 
>modifying `/etc/ssh/sshd_config` on Linux or `C:\Windows\Sys>modifying `/etc/ssh/sshd_config` on Linux or `C:\Windows\Sys
>tem32\drivers\etc\hosts` on Windows. - Permission Changes: A>tem32\drivers\etc\hosts` on Windows. - Permission Changes: A
>ltering file permissions to allow broader access, such as ch>ltering file permissions to allow broader access, such as ch
>anging a file from `644` to `777` on Linux or modifying NTFS>anging a file from `644` to `777` on Linux or modifying NTFS
> permissions on Windows. - Attribute Modifications: Changing> permissions on Windows. - Attribute Modifications: Changing
> a file's attributes to hidden, read-only, or system on Wind> a file's attributes to hidden, read-only, or system on Wind
>ows. - Timestamp Manipulation: Adjusting a file's creation o>ows. - Timestamp Manipulation: Adjusting a file's creation o
>r modification timestamp using tools like `touch` in Linux o>r modification timestamp using tools like `touch` in Linux o
>r timestomping tools on Windows. - Software or System File C>r timestomping tools on Windows. - Software or System File C
>hanges: Modifying system files such as `boot.ini`, kernel mo>hanges: Modifying system files such as `boot.ini`, kernel mo
>dules, or application binaries.  This data component can be >dules, or application binaries.
>collected through the following measures:  Windows  - Event  
>Logs: Enable file system auditing to monitor file modificati 
>ons using Security Event ID 4670 (File System Audit) or Sysm 
>on Event ID 2 (File creation time changed). - PowerShell: Us 
>e Get-ItemProperty or Get-Acl cmdlets to monitor file proper 
>ties: `Get-Item -Path "C:\path\to\file" | Select-Object Name 
>, Attributes, LastWriteTime`  Linux  - File System Monitorin 
>g: Use tools like auditd with rules to monitor file modifica 
>tions: `auditctl -w /path/to/file -p wa -k file_modification 
>` - Inotify: Use inotifywait to watch for real-time changes  
>to files or directories: `inotifywait -m /path/to/file`  mac 
>OS  - Endpoint Security Framework (ESF): Monitor file modifi 
>cation events using ESF APIs. - Audit Framework: Configure a 
>udit rules to track file changes. - Command-Line Tools: Use  
>fs_usage to monitor file activities: `fs_usage -w /path/to/f 
>ile`  SIEM Tools  - Collect logs from endpoint agents (e.g., 
> Sysmon, Auditd) and file servers to centralize file modific 
>ation event data. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:35.239000+00:002025-11-12 22:03:39.105000+00:00
descriptionChanges made to a file, including updates to its contents, metadata, access permissions, or attributes. These modifications may indicate legitimate activity (e.g., software updates) or unauthorized changes (e.g., tampering, ransomware, or adversarial modifications). Examples: + +- Content Modifications: Changes to the content of a configuration file, such as modifying `/etc/ssh/sshd_config` on Linux or `C:\Windows\System32\drivers\etc\hosts` on Windows. +- Permission Changes: Altering file permissions to allow broader access, such as changing a file from `644` to `777` on Linux or modifying NTFS permissions on Windows. +- Attribute Modifications: Changing a file's attributes to hidden, read-only, or system on Windows. +- Timestamp Manipulation: Adjusting a file's creation or modification timestamp using tools like `touch` in Linux or timestomping tools on Windows. +- Software or System File Changes: Modifying system files such as `boot.ini`, kernel modules, or application binaries. + +This data component can be collected through the following measures: + +Windows + +- Event Logs: Enable file system auditing to monitor file modifications using Security Event ID 4670 (File System Audit) or Sysmon Event ID 2 (File creation time changed). +- PowerShell: Use Get-ItemProperty or Get-Acl cmdlets to monitor file properties: `Get-Item -Path "C:\path\to\file" | Select-Object Name, Attributes, LastWriteTime` + +Linux + +- File System Monitoring: Use tools like auditd with rules to monitor file modifications: `auditctl -w /path/to/file -p wa -k file_modification` +- Inotify: Use inotifywait to watch for real-time changes to files or directories: `inotifywait -m /path/to/file` + +macOS + +- Endpoint Security Framework (ESF): Monitor file modification events using ESF APIs. +- Audit Framework: Configure audit rules to track file changes. +- Command-Line Tools: Use fs_usage to monitor file activities: `fs_usage -w /path/to/file` + +SIEM Tools + +- Collect logs from endpoint agents (e.g., Sysmon, Auditd) and file servers to centralize file modification event data.Changes made to a file, including updates to its contents, metadata, access permissions, or attributes. These modifications may indicate legitimate activity (e.g., software updates) or unauthorized changes (e.g., tampering, ransomware, or adversarial modifications). Examples: + +- Content Modifications: Changes to the content of a configuration file, such as modifying `/etc/ssh/sshd_config` on Linux or `C:\Windows\System32\drivers\etc\hosts` on Windows. +- Permission Changes: Altering file permissions to allow broader access, such as changing a file from `644` to `777` on Linux or modifying NTFS permissions on Windows. +- Attribute Modifications: Changing a file's attributes to hidden, read-only, or system on Windows. +- Timestamp Manipulation: Adjusting a file's creation or modification timestamp using tools like `touch` in Linux or timestomping tools on Windows. +- Software or System File Changes: Modifying system files such as `boot.ini`, kernel modules, or application binaries.
x_mitre_log_sources[8]['channel']EventCode=4663EventCode=4663, 4670, 4656
x_mitre_log_sources[59]['name']WinEventLog:SysmonWinEventLog:CodeIntegrity
x_mitre_log_sources[59]['channel']EvenCode=2EventCode=3033
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4656,4663'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4670'}
x_mitre_log_sources{'name': 'WinEventLog:Application', 'channel': '81,3033'}

[DC0044] Firewall Enumeration

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Querying and extracting a list of available firewalls or thet1Querying and extracting a list of available firewalls or the
>ir associated configurations and rules. This activity can oc>ir associated configurations and rules. This activity can oc
>cur across host systems and cloud control planes, providing >cur across host systems and cloud control planes, providing 
>insight into the state and configuration of firewalls that p>insight into the state and configuration of firewalls that p
>rotect the environment. Examples:   - Querying Host-Based Fi>rotect the environment. Examples:   - Querying Host-Based Fi
>rewalls: Using Windows PowerShell commands like `Get-NetFire>rewalls: Using Windows PowerShell commands like `Get-NetFire
>wallRule` or Linux commands such as `iptables -L` or `firewa>wallRule` or Linux commands such as `iptables -L` or `firewa
>lld --list-all`. - Cloud Firewall Rule Listing: Running comm>lld --list-all`. - Cloud Firewall Rule Listing: Running comm
>ands like `az network firewall list` for Azure or `aws ec2 d>ands like `az network firewall list` for Azure or `aws ec2 d
>escribe-security-groups` for AWS. - Using Management APIs: L>escribe-security-groups` for AWS. - Using Management APIs: L
>everaging APIs like Google Cloud Firewall's `list` API metho>everaging APIs like Google Cloud Firewall's `list` API metho
>d or AWS's DescribeSecurityGroups API. Identifying Misconfig>d or AWS's DescribeSecurityGroups API. Identifying Misconfig
>urations: Extracting firewall rules to identify “allow all” >urations: Extracting firewall rules to identify “allow all” 
>policies or rules that lack logging. - Enumerating with CLI >policies or rules that lack logging. - Enumerating with CLI 
>Tools: Using CLI commands like `gcloud compute firewall-rule>Tools: Using CLI commands like `gcloud compute firewall-rule
>s list` to extract firewall settings in Google Cloud.  This >s list` to extract firewall settings in Google Cloud.
>data component can be collected through the following measur 
>es:  Cloud Control Plane  - Azure Activity Logs:Collect logs 
> from Azure Firewall to monitor rule listing commands. Enabl 
>e logging for `az network firewall` commands. - AWS CloudTra 
>il: Monitor calls to `DescribeSecurityGroups` or `DescribeNe 
>tworkAcls` APIs. Google Cloud Operations Suite: Collect logs 
> for `gcloud compute firewall-rules list` or API calls to `f 
>irewalls.list`.  Host-Based Firewalls  - Windows Event Logs: 
> Use PowerShell transcription logs to capture commands like  
>`Get-NetFirewallRule`. - Linux Auditd: Track executions of c 
>ommands like `iptables -L` or `ufw status` using auditd: `au 
>ditctl -a always,exit -F arch=b64 -S execve -k firewall_enum 
>` - macOS: Monitor logs for firewall-related queries via the 
> Console app or log monitoring tools.  SIEM Integration  - C 
>ollect logs from endpoints and cloud platforms to centralize 
> data and detect enumeration activity.  Endpoint Detection a 
>nd Response (EDR)  - Use EDR tools to track enumeration comm 
>ands or API calls performed on managed devices.  CSPM Tools  
> - Deploy Cloud Security Posture Management tools to monitor 
> for unauthorized enumeration of firewall rules or configura 
>tions. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
descriptionQuerying and extracting a list of available firewalls or their associated configurations and rules. This activity can occur across host systems and cloud control planes, providing insight into the state and configuration of firewalls that protect the environment. Examples: + +- Querying Host-Based Firewalls: Using Windows PowerShell commands like `Get-NetFirewallRule` or Linux commands such as `iptables -L` or `firewalld --list-all`. +- Cloud Firewall Rule Listing: Running commands like `az network firewall list` for Azure or `aws ec2 describe-security-groups` for AWS. +- Using Management APIs: Leveraging APIs like Google Cloud Firewall's `list` API method or AWS's DescribeSecurityGroups API. +Identifying Misconfigurations: Extracting firewall rules to identify “allow all” policies or rules that lack logging. +- Enumerating with CLI Tools: Using CLI commands like `gcloud compute firewall-rules list` to extract firewall settings in Google Cloud. + +This data component can be collected through the following measures: + +Cloud Control Plane + +- Azure Activity Logs:Collect logs from Azure Firewall to monitor rule listing commands. Enable logging for `az network firewall` commands. +- AWS CloudTrail: Monitor calls to `DescribeSecurityGroups` or `DescribeNetworkAcls` APIs. +Google Cloud Operations Suite: Collect logs for `gcloud compute firewall-rules list` or API calls to `firewalls.list`. + +Host-Based Firewalls + +- Windows Event Logs: Use PowerShell transcription logs to capture commands like `Get-NetFirewallRule`. +- Linux Auditd: Track executions of commands like `iptables -L` or `ufw status` using auditd: `auditctl -a always,exit -F arch=b64 -S execve -k firewall_enum` +- macOS: Monitor logs for firewall-related queries via the Console app or log monitoring tools. + +SIEM Integration + +- Collect logs from endpoints and cloud platforms to centralize data and detect enumeration activity. + +Endpoint Detection and Response (EDR) + +- Use EDR tools to track enumeration commands or API calls performed on managed devices. + +CSPM Tools + +- Deploy Cloud Security Posture Management tools to monitor for unauthorized enumeration of firewall rules or configurations.Querying and extracting a list of available firewalls or their associated configurations and rules. This activity can occur across host systems and cloud control planes, providing insight into the state and configuration of firewalls that protect the environment. Examples: + +- Querying Host-Based Firewalls: Using Windows PowerShell commands like `Get-NetFirewallRule` or Linux commands such as `iptables -L` or `firewalld --list-all`. +- Cloud Firewall Rule Listing: Running commands like `az network firewall list` for Azure or `aws ec2 describe-security-groups` for AWS. +- Using Management APIs: Leveraging APIs like Google Cloud Firewall's `list` API method or AWS's DescribeSecurityGroups API. +Identifying Misconfigurations: Extracting firewall rules to identify “allow all” policies or rules that lack logging. +- Enumerating with CLI Tools: Using CLI commands like `gcloud compute firewall-rules list` to extract firewall settings in Google Cloud.

[DC0018] Host Status

Current version: 2.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:37.544000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_sources[13]['name']CloudWatch:MetricsAWS:CloudWatch
x_mitre_log_sources[17]['name']CloudWatch:InstanceMetricsAWS:CloudWatch
x_mitre_log_sources[30]['name']CloudMetrics:InstanceHealthAWS:CloudMetrics

[DC0015] Image Creation

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Initial construction of a virtual machine image within a clot1Initial construction of a virtual machine image within a clo
>ud environment. Virtual machine images are templates contain>ud environment. Virtual machine images are templates contain
>ing an operating system and installed applications, which ca>ing an operating system and installed applications, which ca
>n be deployed to create new virtual machines. Monitoring the>n be deployed to create new virtual machines. Monitoring the
> creation of these images is important because adversaries m> creation of these images is important because adversaries m
>ay create custom images to include malicious software or mis>ay create custom images to include malicious software or mis
>configurations for later exploitation. Examples:   - Azure C>configurations for later exploitation. Examples:   - Azure C
>ompute Service Image Creation     - Example: Creating a virt>ompute Service Image Creation     - Example: Creating a virt
>ual machine image in Azure using Azure CLI: `az image create>ual machine image in Azure using Azure CLI: `az image create
> --resource-group MyResourceGroup --name MyImage --source My> --resource-group MyResourceGroup --name MyImage --source My
>VM` - AWS EC2 AMI (Amazon Machine Image) Creation     - Exam>VM` - AWS EC2 AMI (Amazon Machine Image) Creation     - Exam
>ple: Creating an AMI from an EC2 instance: `aws ec2 create-i>ple: Creating an AMI from an EC2 instance: `aws ec2 create-i
>mage --instance-id i-1234567890abcdef0 --name "MyAMI" --desc>mage --instance-id i-1234567890abcdef0 --name "MyAMI" --desc
>ription "An AMI for my app"` - Google Cloud Compute Engine I>ription "An AMI for my app"` - Google Cloud Compute Engine I
>mage Creation     - Example: Creating a custom image using g>mage Creation     - Example: Creating a custom image using g
>cloud: `gcloud compute images create my-custom-image --sourc>cloud: `gcloud compute images create my-custom-image --sourc
>e-disk my-disk --source-disk-zone us-central1-a` - VMware vS>e-disk my-disk --source-disk-zone us-central1-a` - VMware vS
>phere     - Example: Exporting a VM to create an OVF (Open V>phere     - Example: Exporting a VM to create an OVF (Open V
>irtualization Format) template: This could later be imported>irtualization Format) template: This could later be imported
> into other environments with potential tampering.  This dat> into other environments with potential tampering.
>a component can be collected through the following measures: 
>  Enable Cloud Platform Logging  - Azure: Enable "Activity L 
>ogs" to capture image-related events such as PUT requests to 
> `Microsoft.Compute/images`. - AWS: Use AWS CloudTrail to mo 
>nitor `CreateImage` API calls. - Google Cloud: Enable "Cloud 
> Audit Logs" to track custom image creation events under `co 
>mpute.googleapis.com/images`.  API Monitoring  - Monitor API 
> activity to track the creation of new images using:     - A 
>WS SDK/CLI `CreateImage`.     - Azure REST API for image cre 
>ation.     - Google Cloud Compute Engine APIs.  Cloud SIEM I 
>ntegration  - Ingest cloud platform logs into a centralized  
>SIEM for real-time monitoring and alerting.  
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:39.369000+00:002025-11-12 22:03:39.105000+00:00
descriptionInitial construction of a virtual machine image within a cloud environment. Virtual machine images are templates containing an operating system and installed applications, which can be deployed to create new virtual machines. Monitoring the creation of these images is important because adversaries may create custom images to include malicious software or misconfigurations for later exploitation. Examples: + +- Azure Compute Service Image Creation + - Example: Creating a virtual machine image in Azure using Azure CLI: `az image create --resource-group MyResourceGroup --name MyImage --source MyVM` +- AWS EC2 AMI (Amazon Machine Image) Creation + - Example: Creating an AMI from an EC2 instance: `aws ec2 create-image --instance-id i-1234567890abcdef0 --name "MyAMI" --description "An AMI for my app"` +- Google Cloud Compute Engine Image Creation + - Example: Creating a custom image using gcloud: `gcloud compute images create my-custom-image --source-disk my-disk --source-disk-zone us-central1-a` +- VMware vSphere + - Example: Exporting a VM to create an OVF (Open Virtualization Format) template: This could later be imported into other environments with potential tampering. + +This data component can be collected through the following measures: + +Enable Cloud Platform Logging + +- Azure: Enable "Activity Logs" to capture image-related events such as PUT requests to `Microsoft.Compute/images`. +- AWS: Use AWS CloudTrail to monitor `CreateImage` API calls. +- Google Cloud: Enable "Cloud Audit Logs" to track custom image creation events under `compute.googleapis.com/images`. + +API Monitoring + +- Monitor API activity to track the creation of new images using: + - AWS SDK/CLI `CreateImage`. + - Azure REST API for image creation. + - Google Cloud Compute Engine APIs. + +Cloud SIEM Integration + +- Ingest cloud platform logs into a centralized SIEM for real-time monitoring and alerting. +Initial construction of a virtual machine image within a cloud environment. Virtual machine images are templates containing an operating system and installed applications, which can be deployed to create new virtual machines. Monitoring the creation of these images is important because adversaries may create custom images to include malicious software or misconfigurations for later exploitation. Examples: + +- Azure Compute Service Image Creation + - Example: Creating a virtual machine image in Azure using Azure CLI: `az image create --resource-group MyResourceGroup --name MyImage --source MyVM` +- AWS EC2 AMI (Amazon Machine Image) Creation + - Example: Creating an AMI from an EC2 instance: `aws ec2 create-image --instance-id i-1234567890abcdef0 --name "MyAMI" --description "An AMI for my app"` +- Google Cloud Compute Engine Image Creation + - Example: Creating a custom image using gcloud: `gcloud compute images create my-custom-image --source-disk my-disk --source-disk-zone us-central1-a` +- VMware vSphere + - Example: Exporting a VM to create an OVF (Open Virtualization Format) template: This could later be imported into other environments with potential tampering.

[DC0028] Image Metadata

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1contextual information associated with a virtual machine imat1contextual information associated with a virtual machine ima
>ge, such as its name, resource group, status (active or inac>ge, such as its name, resource group, status (active or inac
>tive), type (custom or prebuilt), size, creation date, and p>tive), type (custom or prebuilt), size, creation date, and p
>ermissions. This metadata is critical for understanding the >ermissions. This metadata is critical for understanding the 
>state and configuration of virtual machine images in cloud e>state and configuration of virtual machine images in cloud e
>nvironments. Examples:   - Azure Compute Service Image Metad>nvironments. Examples:   - Azure Compute Service Image Metad
>ata Example:     - Name: MyCustomImage     - Resource Group:>ata Example:     - Name: MyCustomImage     - Resource Group:
> MyResourceGroup     - State: Available     - Type: Managed > MyResourceGroup     - State: Available     - Type: Managed 
>Image - AWS EC2 AMI Metadata Example:     - Image ID: ami-12>Image - AWS EC2 AMI Metadata Example:     - Image ID: ami-12
>34567890abcdef0     - Name: ProdImage     - State: Available>34567890abcdef0     - Name: ProdImage     - State: Available
>     - Platform: Windows - Google Cloud Compute Engine Image>     - Platform: Windows - Google Cloud Compute Engine Image
> Metadata Example:     - Image Name: webserver-image     - P> Metadata Example:     - Image Name: webserver-image     - P
>roject: my-project-id     - Family: webserver     - Source D>roject: my-project-id     - Family: webserver     - Source D
>isk: my-disk-id - VMware vSphere Template Metadata Example: >isk: my-disk-id - VMware vSphere Template Metadata Example: 
>    - Name: LinuxTemplate     - Disk Size: 40GB     - Networ>    - Name: LinuxTemplate     - Disk Size: 40GB     - Networ
>k Adapter: VM Network  This data component can be collected >k Adapter: VM Network
>through the following measures:  Cloud Platform-Specific Too 
>ls  - Azure:     - Use Azure CLI to query metadata: `az imag 
>e show --name MyCustomImage --resource-group MyResourceGroup 
>` - AWS:     - Use AWS CLI to describe AMI metadata: `aws ec 
>2 describe-images --image-ids ami-1234567890abcdef0` - Googl 
>e Cloud:     - Use Google Cloud SDK to retrieve image metada 
>ta: `gcloud compute images describe webserver-image`   APIs  
> - Azure: `GET /subscriptions/{subscriptionId}/resourceGroup 
>s/{resourceGroupName}/providers/Microsoft.Compute/images/{im 
>ageName}` - AWS: `DescribeImages` API. - Google Cloud: `GET  
>https://compute.googleapis.com/compute/v1/projects/{project} 
>/global/images/{image}.`  Cloud Management Portals  - View m 
>etadata directly from the cloud provider's management consol 
>e or dashboard.  SIEM Integration  - Aggregate metadata into 
> SIEM platforms for centralized monitoring:  
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:38.423000+00:002025-11-12 22:03:39.105000+00:00
descriptioncontextual information associated with a virtual machine image, such as its name, resource group, status (active or inactive), type (custom or prebuilt), size, creation date, and permissions. This metadata is critical for understanding the state and configuration of virtual machine images in cloud environments. Examples: + +- Azure Compute Service Image Metadata Example: + - Name: MyCustomImage + - Resource Group: MyResourceGroup + - State: Available + - Type: Managed Image +- AWS EC2 AMI Metadata Example: + - Image ID: ami-1234567890abcdef0 + - Name: ProdImage + - State: Available + - Platform: Windows +- Google Cloud Compute Engine Image Metadata Example: + - Image Name: webserver-image + - Project: my-project-id + - Family: webserver + - Source Disk: my-disk-id +- VMware vSphere Template Metadata Example: + - Name: LinuxTemplate + - Disk Size: 40GB + - Network Adapter: VM Network + +This data component can be collected through the following measures: + +Cloud Platform-Specific Tools + +- Azure: + - Use Azure CLI to query metadata: `az image show --name MyCustomImage --resource-group MyResourceGroup` +- AWS: + - Use AWS CLI to describe AMI metadata: `aws ec2 describe-images --image-ids ami-1234567890abcdef0` +- Google Cloud: + - Use Google Cloud SDK to retrieve image metadata: `gcloud compute images describe webserver-image` + +APIs + +- Azure: `GET /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/images/{imageName}` +- AWS: `DescribeImages` API. +- Google Cloud: `GET https://compute.googleapis.com/compute/v1/projects/{project}/global/images/{image}.` + +Cloud Management Portals + +- View metadata directly from the cloud provider's management console or dashboard. + +SIEM Integration + +- Aggregate metadata into SIEM platforms for centralized monitoring: +contextual information associated with a virtual machine image, such as its name, resource group, status (active or inactive), type (custom or prebuilt), size, creation date, and permissions. This metadata is critical for understanding the state and configuration of virtual machine images in cloud environments. Examples: + +- Azure Compute Service Image Metadata Example: + - Name: MyCustomImage + - Resource Group: MyResourceGroup + - State: Available + - Type: Managed Image +- AWS EC2 AMI Metadata Example: + - Image ID: ami-1234567890abcdef0 + - Name: ProdImage + - State: Available + - Platform: Windows +- Google Cloud Compute Engine Image Metadata Example: + - Image Name: webserver-image + - Project: my-project-id + - Family: webserver + - Source Disk: my-disk-id +- VMware vSphere Template Metadata Example: + - Name: LinuxTemplate + - Disk Size: 40GB + - Network Adapter: VM Network

[DC0076] Instance Creation

Current version: 2.0

+ + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1The initial provisioning and construction of a virtual machit1The initial provisioning and construction of a virtual machi
>ne (VM) or compute instance within a cloud infrastructure en>ne (VM) or compute instance within a cloud infrastructure en
>vironment. This activity involves defining and allocating re>vironment. This activity involves defining and allocating re
>sources such as CPU, memory, storage, and networking to spin>sources such as CPU, memory, storage, and networking to spin
> up a new compute instance. Examples:  - AWS: creating an EC> up a new compute instance. Examples:  - AWS: creating an EC
>2 instance using RunInstances API calls. - Azure, creating a>2 instance using RunInstances API calls. - Azure, creating a
> VM through the Azure Resource Manager (ARM). - GCP, an `ins> VM through the Azure Resource Manager (ARM). - GCP, an `ins
>tance.insert` action recorded.  *Data Collection Measures:* >tance.insert` action recorded.
> - AWS CloudTrail: CloudTrail logs stored in S3 or accessibl 
>e via CloudWatch. - Azure Activity Logs: Accessible in Azure 
> Monitor or exported to a storage account. - GCP Audit Logs: 
> Logs Explorer or BigQuery. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:39.434000+00:002025-11-12 22:03:39.105000+00:00
descriptionThe initial provisioning and construction of a virtual machine (VM) or compute instance within a cloud infrastructure environment. This activity involves defining and allocating resources such as CPU, memory, storage, and networking to spin up a new compute instance. Examples: + +- AWS: creating an EC2 instance using RunInstances API calls. +- Azure, creating a VM through the Azure Resource Manager (ARM). +- GCP, an `instance.insert` action recorded. + +*Data Collection Measures:* + +- AWS CloudTrail: CloudTrail logs stored in S3 or accessible via CloudWatch. +- Azure Activity Logs: Accessible in Azure Monitor or exported to a storage account. +- GCP Audit Logs: Logs Explorer or BigQuery.The initial provisioning and construction of a virtual machine (VM) or compute instance within a cloud infrastructure environment. This activity involves defining and allocating resources such as CPU, memory, storage, and networking to spin up a new compute instance. Examples: + +- AWS: creating an EC2 instance using RunInstances API calls. +- Azure, creating a VM through the Azure Resource Manager (ARM). +- GCP, an `instance.insert` action recorded.

[DC0081] Instance Deletion

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Removal of a virtual machine (VM) or compute instance withint1Removal of a virtual machine (VM) or compute instance within
> a cloud infrastructure. This activity results in the termin> a cloud infrastructure. This activity results in the termin
>ation and deletion of the allocated resources (e.g., CPU, me>ation and deletion of the allocated resources (e.g., CPU, me
>mory, storage), making the instance unavailable for future u>mory, storage), making the instance unavailable for future u
>se. Examples:  - AWS: instance deletion involves the `Termin>se. Examples:  - AWS: instance deletion involves the `Termin
>ateInstances` API call, which is recorded in CloudTrail logs>ateInstances` API call, which is recorded in CloudTrail logs
>. - Azure: VM deletion can be monitored via Azure Activity L>. - Azure: VM deletion can be monitored via Azure Activity L
>ogs, showing the `Microsoft.Compute/virtualMachines/delete` >ogs, showing the `Microsoft.Compute/virtualMachines/delete` 
>operation. - GCP: instance deletion is logged as an instance>operation. - GCP: instance deletion is logged as an instance
>.delete operation within GCP Audit Logs.  *Data Collection M>.delete operation within GCP Audit Logs.
>easures:   - AWS CloudTrail: CloudTrail logs stored in S3 or 
> forwarded to CloudWatch. - Azure Activity Logs: Accessible  
>via Azure Monitor or exported to a storage account. - GCP Au 
>dit Logs: Logs Explorer or BigQuery. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:37.952000+00:002025-11-12 22:03:39.105000+00:00
descriptionRemoval of a virtual machine (VM) or compute instance within a cloud infrastructure. This activity results in the termination and deletion of the allocated resources (e.g., CPU, memory, storage), making the instance unavailable for future use. Examples: + +- AWS: instance deletion involves the `TerminateInstances` API call, which is recorded in CloudTrail logs. +- Azure: VM deletion can be monitored via Azure Activity Logs, showing the `Microsoft.Compute/virtualMachines/delete` operation. +- GCP: instance deletion is logged as an instance.delete operation within GCP Audit Logs. + +*Data Collection Measures: + +- AWS CloudTrail: CloudTrail logs stored in S3 or forwarded to CloudWatch. +- Azure Activity Logs: Accessible via Azure Monitor or exported to a storage account. +- GCP Audit Logs: Logs Explorer or BigQuery.Removal of a virtual machine (VM) or compute instance within a cloud infrastructure. This activity results in the termination and deletion of the allocated resources (e.g., CPU, memory, storage), making the instance unavailable for future use. Examples: + +- AWS: instance deletion involves the `TerminateInstances` API call, which is recorded in CloudTrail logs. +- Azure: VM deletion can be monitored via Azure Activity Logs, showing the `Microsoft.Compute/virtualMachines/delete` operation. +- GCP: instance deletion is logged as an instance.delete operation within GCP Audit Logs.

[DC0086] Instance Metadata

Current version: 2.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:37.885000+00:002025-11-12 22:03:39.105000+00:00
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'CloudTrail:EC2', 'channel': 'DescribeInstances'}

[DC0080] Instance Start

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1The initiation or activation of a virtual machine instance wt1The initiation or activation of a virtual machine instance w
>ithin a cloud infrastructure. This action typically involves>ithin a cloud infrastructure. This action typically involves
> starting an existing instance that had been stopped or paus> starting an existing instance that had been stopped or paus
>ed, allowing it to resume operation. Examples:   - Google Cl>ed, allowing it to resume operation. Examples:   - Google Cl
>oud Platform (GCP): Starting an instance through `instance.s>oud Platform (GCP): Starting an instance through `instance.s
>tart` API activity. - AWS: Logging of `StartInstances` in AW>tart` API activity. - AWS: Logging of `StartInstances` in AW
>S CloudTrail for EC2 instances. - Azure: `Microsoft.Compute/>S CloudTrail for EC2 instances. - Azure: `Microsoft.Compute/
>virtualMachines/start` entries indicate a VM instance being >virtualMachines/start` entries indicate a VM instance being 
>started.  *Data Collection Measures:*  - Google Cloud Platfo>started.
>rm: Enable GCP Audit Logs for Compute Engine.     - Log Even 
>t: Look for instance.start entries in Cloud Logging. - Amazo 
>n Web Services (AWS): AWS CloudTrail.     - Log Event: Searc 
>h for StartInstances events associated with EC2. - Microsoft 
> Azure: Azure Activity Logs.     - Log Event: Filter for Mic 
>rosoft.Compute/virtualMachines/start operations. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:36.515000+00:002025-11-12 22:03:39.105000+00:00
descriptionThe initiation or activation of a virtual machine instance within a cloud infrastructure. This action typically involves starting an existing instance that had been stopped or paused, allowing it to resume operation. Examples: + +- Google Cloud Platform (GCP): Starting an instance through `instance.start` API activity. +- AWS: Logging of `StartInstances` in AWS CloudTrail for EC2 instances. +- Azure: `Microsoft.Compute/virtualMachines/start` entries indicate a VM instance being started. + +*Data Collection Measures:* + +- Google Cloud Platform: Enable GCP Audit Logs for Compute Engine. + - Log Event: Look for instance.start entries in Cloud Logging. +- Amazon Web Services (AWS): AWS CloudTrail. + - Log Event: Search for StartInstances events associated with EC2. +- Microsoft Azure: Azure Activity Logs. + - Log Event: Filter for Microsoft.Compute/virtualMachines/start operations.The initiation or activation of a virtual machine instance within a cloud infrastructure. This action typically involves starting an existing instance that had been stopped or paused, allowing it to resume operation. Examples: + +- Google Cloud Platform (GCP): Starting an instance through `instance.start` API activity. +- AWS: Logging of `StartInstances` in AWS CloudTrail for EC2 instances. +- Azure: `Microsoft.Compute/virtualMachines/start` entries indicate a VM instance being started.
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'CloudTrail:RunInstances', 'channel': 'RunInstances'}
x_mitre_log_sources{'name': 'CloudTrail:RunInstances', 'channel': 'RunInstances: AMI not in allowlist OR AMI owner != enterprise owner/account'}
x_mitre_log_sources{'name': 'AWS:CloudTrail', 'channel': 'StartInstances: Instance starts from suspicious AMI or with userData present'}
x_mitre_log_sources{'name': 'CloudTrail:EC2', 'channel': 'RunInstances'}

[DC0067] Logon Session Creation

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1The successful establishment of a new user session followingt1The successful establishment of a new user session following
> a successful authentication attempt. This typically signifi> a successful authentication attempt. This typically signifi
>es that a user has provided valid credentials or authenticat>es that a user has provided valid credentials or authenticat
>ion tokens, and the system has initiated a session associate>ion tokens, and the system has initiated a session associate
>d with that user account. This data is crucial for tracking >d with that user account. This data is crucial for tracking 
>authentication events and identifying potential unauthorized>authentication events and identifying potential unauthorized
> access. Examples:   - Windows Systems     - Event ID: 4624 > access. Examples:   - Windows Systems     - Event ID: 4624 
>        - Logon Type: 2 (Interactive) or 10 (Remote Interact>        - Logon Type: 2 (Interactive) or 10 (Remote Interact
>ive via RDP).         - Account Name: JohnDoe         - Sour>ive via RDP).         - Account Name: JohnDoe         - Sour
>ce Network Address: 192.168.1.100         - Authentication P>ce Network Address: 192.168.1.100         - Authentication P
>ackage: NTLM - Linux Systems     - /var/log/utmp or /var/log>ackage: NTLM - Linux Systems     - /var/log/utmp or /var/log
>/wtmp:         - Log format: login user [tty] from [source_i>/wtmp:         - Log format: login user [tty] from [source_i
>p]         - User: jane         - IP: 10.0.0.5         - Tim>p]         - User: jane         - IP: 10.0.0.5         - Tim
>estamp: 2024-12-28 08:30:00 - macOS Systems     - /var/log/a>estamp: 2024-12-28 08:30:00 - macOS Systems     - /var/log/a
>sl.log or unified logging framework:         - Log: com.appl>sl.log or unified logging framework:         - Log: com.appl
>e.securityd: Authentication succeeded for user 'admin' - Clo>e.securityd: Authentication succeeded for user 'admin' - Clo
>ud Environments     - Azure Sign-In Logs:         - Activity>ud Environments     - Azure Sign-In Logs:         - Activity
>: Sign-in successful         - Client App: Browser         ->: Sign-in successful         - Client App: Browser         -
> Location: Unknown (Country: X) - Google Workspace     - Act> Location: Unknown (Country: X) - Google Workspace     - Act
>ivity: Login         - Event Type: successful_login         >ivity: Login         - Event Type: successful_login         
>- Source IP: 203.0.113.55  This data component can be collec>- Source IP: 203.0.113.55
>ted through the following measures:  - Windows Systems     - 
> Event Logs: Monitor Security Event Logs using Event ID 4624 
> for successful logons.     - PowerShell Example: `Get-Event 
>Log -LogName Security -InstanceId 4624` - Linux Systems      
>- Log Files: Monitor `/var/log/utmp`, `/var/log/wtmp`, or `/ 
>var/log/auth.log` for logon events.     - Tools: Use `last`  
>or `who` commands to parse login records. - macOS Systems    
>  - Log Sources: Monitor `/var/log/asl.log` or Apple Unified 
> Logs using the `log show` command.     - Command Example: ` 
>log show --predicate 'eventMessage contains "Authentication  
>succeeded"' --info` - Cloud Environments     - Azure AD: Use 
> Azure Monitor to analyze sign-in logs. Example CLI Query: ` 
>az monitor log-analytics query -w <workspace_id> --analytics 
>-query "AzureActivity | where ActivityStatus == 'Success' an 
>d OperationName == 'Sign-in'"`     - Google Workspace: Enabl 
>e and monitor Login Audit logs from the Admin Console.     - 
> Office 365: Use Audit Log Search in Microsoft 365 Security  
>& Compliance Center for login-related events. - Network Logs 
>     - Sources: Network authentication mechanisms (e.g., RAD 
>IUS or TACACS logs). - Enable EDR Monitoring:      - EDR too 
>ls monitor logon session activity, including the creation of 
> new sessions.     - Configure alerts for: Suspicious logon  
>types (e.g., Logon Type 10 for RDP or Type 5 for Service). L 
>ogons from unusual locations, accounts, or devices.     - Le 
>verage EDR telemetry for session attributes like source IP,  
>session duration, and originating process. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:35.022000+00:002025-11-12 22:03:39.105000+00:00
descriptionThe successful establishment of a new user session following a successful authentication attempt. This typically signifies that a user has provided valid credentials or authentication tokens, and the system has initiated a session associated with that user account. This data is crucial for tracking authentication events and identifying potential unauthorized access. Examples: + +- Windows Systems + - Event ID: 4624 + - Logon Type: 2 (Interactive) or 10 (Remote Interactive via RDP). + - Account Name: JohnDoe + - Source Network Address: 192.168.1.100 + - Authentication Package: NTLM +- Linux Systems + - /var/log/utmp or /var/log/wtmp: + - Log format: login user [tty] from [source_ip] + - User: jane + - IP: 10.0.0.5 + - Timestamp: 2024-12-28 08:30:00 +- macOS Systems + - /var/log/asl.log or unified logging framework: + - Log: com.apple.securityd: Authentication succeeded for user 'admin' +- Cloud Environments + - Azure Sign-In Logs: + - Activity: Sign-in successful + - Client App: Browser + - Location: Unknown (Country: X) +- Google Workspace + - Activity: Login + - Event Type: successful_login + - Source IP: 203.0.113.55 + +This data component can be collected through the following measures: + +- Windows Systems + - Event Logs: Monitor Security Event Logs using Event ID 4624 for successful logons. + - PowerShell Example: `Get-EventLog -LogName Security -InstanceId 4624` +- Linux Systems + - Log Files: Monitor `/var/log/utmp`, `/var/log/wtmp`, or `/var/log/auth.log` for logon events. + - Tools: Use `last` or `who` commands to parse login records. +- macOS Systems + - Log Sources: Monitor `/var/log/asl.log` or Apple Unified Logs using the `log show` command. + - Command Example: `log show --predicate 'eventMessage contains "Authentication succeeded"' --info` +- Cloud Environments + - Azure AD: Use Azure Monitor to analyze sign-in logs. Example CLI Query: `az monitor log-analytics query -w --analytics-query "AzureActivity | where ActivityStatus == 'Success' and OperationName == 'Sign-in'"` + - Google Workspace: Enable and monitor Login Audit logs from the Admin Console. + - Office 365: Use Audit Log Search in Microsoft 365 Security & Compliance Center for login-related events. +- Network Logs + - Sources: Network authentication mechanisms (e.g., RADIUS or TACACS logs). +- Enable EDR Monitoring: + - EDR tools monitor logon session activity, including the creation of new sessions. + - Configure alerts for: Suspicious logon types (e.g., Logon Type 10 for RDP or Type 5 for Service). Logons from unusual locations, accounts, or devices. + - Leverage EDR telemetry for session attributes like source IP, session duration, and originating process.The successful establishment of a new user session following a successful authentication attempt. This typically signifies that a user has provided valid credentials or authentication tokens, and the system has initiated a session associated with that user account. This data is crucial for tracking authentication events and identifying potential unauthorized access. Examples: + +- Windows Systems + - Event ID: 4624 + - Logon Type: 2 (Interactive) or 10 (Remote Interactive via RDP). + - Account Name: JohnDoe + - Source Network Address: 192.168.1.100 + - Authentication Package: NTLM +- Linux Systems + - /var/log/utmp or /var/log/wtmp: + - Log format: login user [tty] from [source_ip] + - User: jane + - IP: 10.0.0.5 + - Timestamp: 2024-12-28 08:30:00 +- macOS Systems + - /var/log/asl.log or unified logging framework: + - Log: com.apple.securityd: Authentication succeeded for user 'admin' +- Cloud Environments + - Azure Sign-In Logs: + - Activity: Sign-in successful + - Client App: Browser + - Location: Unknown (Country: X) +- Google Workspace + - Activity: Login + - Event Type: successful_login + - Source IP: 203.0.113.55
x_mitre_log_sources[5]['name']m365:signinm365:signinlogs
x_mitre_log_sources[31]['name']m365:signinm365:signinlogs
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4624 with LogonType=9 or smartcard logon'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4624 (LogonType=10 or 3), EventCode=4648'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4624 (LogonType=3)'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4624 (LogonType=10), EventCode=4648'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4624, 4672, 4648'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': '4624'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4624,4648, 4672'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4624,4648,4672,4769'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventID=4624'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4624, 4634'}

[DC0088] Logon Session Metadata

Current version: 2.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:36.246000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_sources[4]['name']azure:signinLogsazure:signinlogs
x_mitre_log_sources[3]['channel']EventCode=4624, 4634, 4672, 4768, 4769EventCode=4776, 4771, 4770
x_mitre_log_sources[32]['name']m365:signinm365:signinlogs
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4672, 4634'}
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4624, 4634, 4672, 4769'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4624, 4672'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4776,4771,4770'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4624,4672'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4624, 4672, 4634, 4768, 4769'}

[DC0016] Module Load

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1When a process or program dynamically attaches a shared librt1When a process or program dynamically attaches a shared libr
>ary, module, or plugin into its memory space. This action is>ary, module, or plugin into its memory space. This action is
> typically performed to extend the functionality of an appli> typically performed to extend the functionality of an appli
>cation, access shared system resources, or interact with ker>cation, access shared system resources, or interact with ker
>nel-mode components.  *Data Collection Measures:*  - Event L>nel-mode components.
>ogging (Windows):     - Sysmon Event ID 7: Logs when a DLL i 
>s loaded into a process.     - Windows Security Event ID 468 
>8: Captures process creation events, often useful for correl 
>ating module loads.     - Windows Defender ATP: Can provide  
>visibility into suspicious module loads. - Event Logging (Li 
>nux/macOS):     - AuditD (`execve` and `open` syscalls): Cap 
>tures when shared libraries (`.so` files) are loaded.     -  
>Ltrace/Strace: Monitors process behavior, including library  
>calls (`dlopen`, `execve`).     - MacOS Endpoint Security Fr 
>amework (ESF): Monitors library loads (`ES_EVENT_TYPE_NOTIFY 
>_DYLD_INSERT_LIBRARIES`). - Endpoint Detection & Response (E 
>DR):      - Provide real-time telemetry on module loads and  
>process injections.     - Sysinternals Process Monitor (`pro 
>cmon`): Captures loaded modules and their execution context. 
> - Memory Forensics:     - Volatility Framework (`malfind`,  
>`ldrmodules`): Detects injected DLLs and anomalous module lo 
>ads.     - Rekall Framework: Useful for kernel-mode module d 
>etection. - SIEM and Log Analysis:     - Centralized log agg 
>regation to correlate suspicious module loads across the env 
>ironment.     - Detection rules using correlation searches a 
>nd behavioral analytics. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:35.471000+00:002025-11-12 22:03:39.105000+00:00
descriptionWhen a process or program dynamically attaches a shared library, module, or plugin into its memory space. This action is typically performed to extend the functionality of an application, access shared system resources, or interact with kernel-mode components. + +*Data Collection Measures:* + +- Event Logging (Windows): + - Sysmon Event ID 7: Logs when a DLL is loaded into a process. + - Windows Security Event ID 4688: Captures process creation events, often useful for correlating module loads. + - Windows Defender ATP: Can provide visibility into suspicious module loads. +- Event Logging (Linux/macOS): + - AuditD (`execve` and `open` syscalls): Captures when shared libraries (`.so` files) are loaded. + - Ltrace/Strace: Monitors process behavior, including library calls (`dlopen`, `execve`). + - MacOS Endpoint Security Framework (ESF): Monitors library loads (`ES_EVENT_TYPE_NOTIFY_DYLD_INSERT_LIBRARIES`). +- Endpoint Detection & Response (EDR): + - Provide real-time telemetry on module loads and process injections. + - Sysinternals Process Monitor (`procmon`): Captures loaded modules and their execution context. +- Memory Forensics: + - Volatility Framework (`malfind`, `ldrmodules`): Detects injected DLLs and anomalous module loads. + - Rekall Framework: Useful for kernel-mode module detection. +- SIEM and Log Analysis: + - Centralized log aggregation to correlate suspicious module loads across the environment. + - Detection rules using correlation searches and behavioral analytics.When a process or program dynamically attaches a shared library, module, or plugin into its memory space. This action is typically performed to extend the functionality of an application, access shared system resources, or interact with kernel-mode components.

[DC0082] Network Connection Creation

Current version: 2.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:34.190000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_sources[19]['channel']EventCode=22EventCode=3, 22
x_mitre_log_sources[27]['channel']EventCode=5156EventCode=5156, 5157
x_mitre_log_sources[90]['channel']8001, 8002, 8003EventCode=8001, 8002, 8003
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Sysmon', 'channel': 'EventCode=3'}
x_mitre_log_sources{'name': 'WinEventLog:Sysmon', 'channel': 'EventCode=22'}
x_mitre_log_sources{'name': 'auditd:SYSCALL', 'channel': 'netconnect'}
x_mitre_log_sources{'name': 'auditd:SYSCALL', 'channel': 'open or connect'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=5156,5157'}
x_mitre_log_sources{'name': 'linux:Sysmon', 'channel': 'EventCode=3'}

[DC0102] Network Share Access

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Opening a network share, which makes the contents available t1Opening a network share, which makes the contents available 
>to the requestor (ex: Windows EID 5140 or 5145)  *Data Colle>to the requestor (ex: Windows EID 5140 or 5145)
>ction Measures:*  - Windows:     - Event ID 5140 – Network S 
>hare Object Access Logs every access attempt to a network sh 
>are.     - Event ID 5145 – Detailed Network Share Object Acc 
>ess Captures granular access control information, including  
>the requesting user, source IP, and access permissions.      
>- Sysmon Event ID 3 – Network Connection Initiated Helps tra 
>ck SMB connections to suspicious or unauthorized network sha 
>res.     - Enable Audit Policy for Network Share Access: `au 
>ditpol /set /subcategory:"File Share" /success:enable /failu 
>re:enable`     - Enable PowerShell Logging to Detect Unautho 
>rized SMB Access: `Set-ExecutionPolicy RemoteSigned`     - R 
>estrict Network Share Access with Group Policy (GPO): `Compu 
>ter Configuration → Windows Settings → Security Settings → L 
>ocal Policies → User Rights Assignment` Set "Access this com 
>puter from the network" to restrict unauthorized accounts. - 
> Linux/macOS:     - AuditD (`open`, `read`, `write`, `connec 
>t` syscalls) Detects access to NFS, CIFS, and SMB network sh 
>ares.     - Lsof (`lsof | grep nfs` or `lsof | grep smb`) Id 
>entifies active network share connections.     - Mount (`mou 
>nt | grep nfs` or `mount | grep cifs`) Lists currently mount 
>ed network shares.     - Enable AuditD for SMB/NFS Access: ` 
>auditctl -a always,exit -F arch=b64 -S open -F path=/mnt/sha 
>re -k network_share_access`     - Monitor Active Network Sha 
>res Using Netstat: `netstat -an | grep :445` - Endpoint Dete 
>ction & Response (EDR):     - Detects abnormal network share 
> access behavior, such as unusual account usage, large file  
>transfers, or encrypted file activity. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:37.412000+00:002025-11-12 22:03:39.105000+00:00
descriptionOpening a network share, which makes the contents available to the requestor (ex: Windows EID 5140 or 5145) + +*Data Collection Measures:* + +- Windows: + - Event ID 5140 – Network Share Object Access Logs every access attempt to a network share. + - Event ID 5145 – Detailed Network Share Object Access Captures granular access control information, including the requesting user, source IP, and access permissions. + - Sysmon Event ID 3 – Network Connection Initiated Helps track SMB connections to suspicious or unauthorized network shares. + - Enable Audit Policy for Network Share Access: `auditpol /set /subcategory:"File Share" /success:enable /failure:enable` + - Enable PowerShell Logging to Detect Unauthorized SMB Access: `Set-ExecutionPolicy RemoteSigned` + - Restrict Network Share Access with Group Policy (GPO): `Computer Configuration → Windows Settings → Security Settings → Local Policies → User Rights Assignment` Set "Access this computer from the network" to restrict unauthorized accounts. +- Linux/macOS: + - AuditD (`open`, `read`, `write`, `connect` syscalls) Detects access to NFS, CIFS, and SMB network shares. + - Lsof (`lsof | grep nfs` or `lsof | grep smb`) Identifies active network share connections. + - Mount (`mount | grep nfs` or `mount | grep cifs`) Lists currently mounted network shares. + - Enable AuditD for SMB/NFS Access: `auditctl -a always,exit -F arch=b64 -S open -F path=/mnt/share -k network_share_access` + - Monitor Active Network Shares Using Netstat: `netstat -an | grep :445` +- Endpoint Detection & Response (EDR): + - Detects abnormal network share access behavior, such as unusual account usage, large file transfers, or encrypted file activity.Opening a network share, which makes the contents available to the requestor (ex: Windows EID 5140 or 5145)
x_mitre_log_sources[1]['channel']EventID=31001EventCode=31001

[DC0078] Network Traffic Flow

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Summarized network packet data that captures session-level dt1Summarized network packet data that captures session-level d
>etails such as source/destination IPs, ports, protocol types>etails such as source/destination IPs, ports, protocol types
>, timestamps, and data volume, without storing full packet p>, timestamps, and data volume, without storing full packet p
>ayloads. This is commonly used for traffic analysis, anomaly>ayloads. This is commonly used for traffic analysis, anomaly
> detection, and network performance monitoring.  *Data Colle> detection, and network performance monitoring.
>ction Measures:*  - Network Flow Logs (Metadata Collection)  
>    - NetFlow          - Summarized metadata for network con 
>versations (no packet payloads).     - sFlow (Sampled Flow L 
>ogging)         - Captures sampled packets from switches and 
> routers.         - Used for real-time traffic monitoring an 
>d anomaly detection.     - Zeek (Bro) Flow Logs         - Ze 
>ek logs session-level details in logs like conn.log, http.lo 
>g, dns.log, etc. - Host-Based Collection     - Sysmon Event  
>ID 3 – Network Connection Initiated         - Logs process-l 
>evel network activity, useful for detecting malicious outbou 
>nd connections.     - AuditD (Linux) – syscall=connect       
>   - Monitors system calls for network connections. `auditct 
>l -a always,exit -F arch=b64 -S connect -k network_activity` 
> - Cloud & SaaS Flow Monitoring     - AWS VPC Flow Logs      
>    - Captures metadata for traffic between EC2 instances, s 
>ecurity groups, and internet gateways.     - Azure NSG Flow  
>Logs / Google VPC Flow Logs         - Logs ingress/egress tr 
>affic for cloud-based resources. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:34.703000+00:002025-11-12 22:03:39.105000+00:00
descriptionSummarized network packet data that captures session-level details such as source/destination IPs, ports, protocol types, timestamps, and data volume, without storing full packet payloads. This is commonly used for traffic analysis, anomaly detection, and network performance monitoring. + +*Data Collection Measures:* + +- Network Flow Logs (Metadata Collection) + - NetFlow + - Summarized metadata for network conversations (no packet payloads). + - sFlow (Sampled Flow Logging) + - Captures sampled packets from switches and routers. + - Used for real-time traffic monitoring and anomaly detection. + - Zeek (Bro) Flow Logs + - Zeek logs session-level details in logs like conn.log, http.log, dns.log, etc. +- Host-Based Collection + - Sysmon Event ID 3 – Network Connection Initiated + - Logs process-level network activity, useful for detecting malicious outbound connections. + - AuditD (Linux) – syscall=connect + - Monitors system calls for network connections. `auditctl -a always,exit -F arch=b64 -S connect -k network_activity` +- Cloud & SaaS Flow Monitoring + - AWS VPC Flow Logs + - Captures metadata for traffic between EC2 instances, security groups, and internet gateways. + - Azure NSG Flow Logs / Google VPC Flow Logs + - Logs ingress/egress traffic for cloud-based resources.Summarized network packet data that captures session-level details such as source/destination IPs, ports, protocol types, timestamps, and data volume, without storing full packet payloads. This is commonly used for traffic analysis, anomaly detection, and network performance monitoring.
x_mitre_log_sources[72]['channel']EventCode=2004,2005,2006EventCode=2004, 2005, 2006

[DC0021] OS API Execution

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Calls made by a process to operating system-provided Applicat1Calls made by a process to operating system-provided Applica
>tion Programming Interfaces (APIs). These calls are essentia>tion Programming Interfaces (APIs). These calls are essentia
>l for interacting with system resources such as memory, file>l for interacting with system resources such as memory, file
>s, and hardware, or for performing system-level tasks. Monit>s, and hardware, or for performing system-level tasks. Monit
>oring these calls can provide insight into a process's inten>oring these calls can provide insight into a process's inten
>t, especially if the process is malicious.  *Data Collection>t, especially if the process is malicious.
> Measures:*  - Endpoint Detection and Response (EDR) Tools:  
>    - Leverage tools to monitor API execution behaviors at t 
>he process level.     - Example: Sysmon Event ID 10 captures 
> API call traces for process access and memory allocation. - 
> Process Monitor (ProcMon):     - Use ProcMon to collect det 
>ailed logs of process and API activity. ProcMon can provide  
>granular details on API usage and identify malicious behavio 
>r during analysis. - Windows Event Logs:     - Use Event IDs 
> from Windows logs for specific API-related activities:      
>    - Event ID 4688: A new process has been created (can ind 
>irectly infer API use).         - Event ID 4657: A registry  
>value has been modified (to monitor registry-altering APIs). 
> - Dynamic Analysis Tools:     - Tools like Cuckoo Sandbox,  
>Flare VM, or Hybrid Analysis monitor API execution during ma 
>lware detonation. - Host-Based Logs:     - On Linux/macOS sy 
>stems, leverage audit frameworks (e.g., `auditd`, `strace`)  
>to capture and analyze system call usage that APIs map to. - 
> Runtime Monitors:     - Runtime security tools like Falco c 
>an monitor system-level calls for API execution. - Debugging 
> and Tracing:     - Use debugging tools like gdb (Linux) or  
>WinDbg (Windows) for deep tracing of API executions in real  
>time. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:36.999000+00:002025-11-12 22:03:39.105000+00:00
descriptionCalls made by a process to operating system-provided Application Programming Interfaces (APIs). These calls are essential for interacting with system resources such as memory, files, and hardware, or for performing system-level tasks. Monitoring these calls can provide insight into a process's intent, especially if the process is malicious. + +*Data Collection Measures:* + +- Endpoint Detection and Response (EDR) Tools: + - Leverage tools to monitor API execution behaviors at the process level. + - Example: Sysmon Event ID 10 captures API call traces for process access and memory allocation. +- Process Monitor (ProcMon): + - Use ProcMon to collect detailed logs of process and API activity. ProcMon can provide granular details on API usage and identify malicious behavior during analysis. +- Windows Event Logs: + - Use Event IDs from Windows logs for specific API-related activities: + - Event ID 4688: A new process has been created (can indirectly infer API use). + - Event ID 4657: A registry value has been modified (to monitor registry-altering APIs). +- Dynamic Analysis Tools: + - Tools like Cuckoo Sandbox, Flare VM, or Hybrid Analysis monitor API execution during malware detonation. +- Host-Based Logs: + - On Linux/macOS systems, leverage audit frameworks (e.g., `auditd`, `strace`) to capture and analyze system call usage that APIs map to. +- Runtime Monitors: + - Runtime security tools like Falco can monitor system-level calls for API execution. +- Debugging and Tracing: + - Use debugging tools like gdb (Linux) or WinDbg (Windows) for deep tracing of API executions in real time.Calls made by a process to operating system-provided Application Programming Interfaces (APIs). These calls are essential for interacting with system resources such as memory, files, and hardware, or for performing system-level tasks. Monitoring these calls can provide insight into a process's intent, especially if the process is malicious.
x_mitre_log_sources[19]['channel']EventCode=4656EventCode=4663, 4670, 4656

[DC0035] Process Access

Current version: 2.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:35.539000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_sources[13]['channel']EventCode=4656EventCode=4663, 4670, 4656
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Sysmon', 'channel': 'EventCode=10, 7'}

[DC0032] Process Creation

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Refers to the event in which a new process (executable) is it1Refers to the event in which a new process (executable) is i
>nitialized by an operating system. This can involve parent-c>nitialized by an operating system. This can involve parent-c
>hild process relationships, process arguments, and environme>hild process relationships, process arguments, and environme
>ntal variables. Monitoring process creation is crucial for d>ntal variables. Monitoring process creation is crucial for d
>etecting malicious behaviors, such as execution of unauthori>etecting malicious behaviors, such as execution of unauthori
>zed binaries, scripting abuse, or privilege escalation attem>zed binaries, scripting abuse, or privilege escalation attem
>pts.  *Data Collection Measures:*  - Endpoint Detection and >pts.. 
>Response (EDR) Tools:     - EDRs provide process telemetry,  
>tracking execution flows and arguments. - Windows Event Logs 
>:     - Event ID 4688 (Audit Process Creation): Captures pro 
>cess creation with associated parent process. - Sysmon (Wind 
>ows):     - Event ID 1 (Process Creation): Provides detailed 
> logging - Linux/macOS Monitoring:     - AuditD (execve sysc 
>all): Logs process creation.     - eBPF/XDP: Used for low-le 
>vel monitoring of system calls related to process execution. 
>     - OSQuery: Allows SQL-like queries to track process eve 
>nts (process_events table).     - Apple Endpoint Security Fr 
>amework (ESF): Monitors process creation on macOS. - Network 
>-Based Monitoring:     - Zeek (Bro) Logs: Captures network-b 
>ased process execution related to remote shells.     - Syslo 
>g/OSSEC: Tracks execution of processes on distributed system 
>s. - Behavioral SIEM Rules:     - Monitor process creation f 
>or uncommon binaries in user directories.     - Detect proce 
>sses with suspicious command-line arguments.  
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 19:28:39.339000+00:002025-11-12 22:03:39.105000+00:00
external_references[0]['url']https://attack.mitre.org/data-components/DC0032https://attack.mitre.org/datacomponents/DC0032
descriptionRefers to the event in which a new process (executable) is initialized by an operating system. This can involve parent-child process relationships, process arguments, and environmental variables. Monitoring process creation is crucial for detecting malicious behaviors, such as execution of unauthorized binaries, scripting abuse, or privilege escalation attempts. + +*Data Collection Measures:* + +- Endpoint Detection and Response (EDR) Tools: + - EDRs provide process telemetry, tracking execution flows and arguments. +- Windows Event Logs: + - Event ID 4688 (Audit Process Creation): Captures process creation with associated parent process. +- Sysmon (Windows): + - Event ID 1 (Process Creation): Provides detailed logging +- Linux/macOS Monitoring: + - AuditD (execve syscall): Logs process creation. + - eBPF/XDP: Used for low-level monitoring of system calls related to process execution. + - OSQuery: Allows SQL-like queries to track process events (process_events table). + - Apple Endpoint Security Framework (ESF): Monitors process creation on macOS. +- Network-Based Monitoring: + - Zeek (Bro) Logs: Captures network-based process execution related to remote shells. + - Syslog/OSSEC: Tracks execution of processes on distributed systems. +- Behavioral SIEM Rules: + - Monitor process creation for uncommon binaries in user directories. + - Detect processes with suspicious command-line arguments. Refers to the event in which a new process (executable) is initialized by an operating system. This can involve parent-child process relationships, process arguments, and environmental variables. Monitoring process creation is crucial for detecting malicious behaviors, such as execution of unauthorized binaries, scripting abuse, or privilege escalation attempts..
x_mitre_log_sources[293]['channel']EventCode=8003,8004EventCode=8003, 8004
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventlog:Security', 'channel': 'EventCode=4688'}
x_mitre_log_sources{'name': 'WinEventLog:Microsoft-Windows-Security-Auditing', 'channel': 'EventCode=4688'}
x_mitre_log_sources{'name': 'WinEventLog:security', 'channel': 'EventCode=4688'}

[DC0034] Process Metadata

Current version: 2.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:35.331000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_sources[36]['channel']EventCode=400,403EventCode=400, 403

[DC0020] Process Modification

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Changes made to a running process, such as writing data intot1Changes made to a running process, such as writing data into
> memory, modifying execution behavior, or injecting code int> memory, modifying execution behavior, or injecting code int
>o an existing process. Adversaries frequently modify process>o an existing process. Adversaries frequently modify process
>es to execute malicious payloads, evade detection, or gain e>es to execute malicious payloads, evade detection, or gain e
>scalated privileges.  *Data Collection Measures:*   - Endpoi>scalated privileges.
>nt Detection and Response (EDR) Tools:     - EDRs can monito 
>r memory modifications and API-level calls. - Sysmon (Window 
>s):     - Event ID 8 (CreateRemoteThread) – Detects cross-pr 
>ocess thread injection, commonly used in process hollowing.  
>    - Event ID 10 (Process Access) – Detects access attempts 
> to another process, often preceding injection attempts. - L 
>inux/macOS Monitoring:     - AuditD (ptrace, mmap, mprotect  
>syscalls): Detects memory modifications and debugging attemp 
>ts.     - eBPF/XDP: Monitors low-level system calls related  
>to process modifications.     - OSQuery: The processes table 
> can be queried for unusual modifications. - Network-Based M 
>onitoring:     - Zeek (Bro) Logs: Captures lateral movement  
>attempts where adversaries remotely modify a process.     -  
>Syslog/OSSEC: Monitors logs for suspicious modifications. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:35.747000+00:002025-11-12 22:03:39.105000+00:00
descriptionChanges made to a running process, such as writing data into memory, modifying execution behavior, or injecting code into an existing process. Adversaries frequently modify processes to execute malicious payloads, evade detection, or gain escalated privileges. + +*Data Collection Measures:* + +- Endpoint Detection and Response (EDR) Tools: + - EDRs can monitor memory modifications and API-level calls. +- Sysmon (Windows): + - Event ID 8 (CreateRemoteThread) – Detects cross-process thread injection, commonly used in process hollowing. + - Event ID 10 (Process Access) – Detects access attempts to another process, often preceding injection attempts. +- Linux/macOS Monitoring: + - AuditD (ptrace, mmap, mprotect syscalls): Detects memory modifications and debugging attempts. + - eBPF/XDP: Monitors low-level system calls related to process modifications. + - OSQuery: The processes table can be queried for unusual modifications. +- Network-Based Monitoring: + - Zeek (Bro) Logs: Captures lateral movement attempts where adversaries remotely modify a process. + - Syslog/OSSEC: Monitors logs for suspicious modifications.Changes made to a running process, such as writing data into memory, modifying execution behavior, or injecting code into an existing process. Adversaries frequently modify processes to execute malicious payloads, evade detection, or gain escalated privileges.

[DC0033] Process Termination

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1The exit or termination of a running process on a system. Tht1The exit or termination of a running process on a system. Th
>is can occur due to normal operations, user-initiated comman>is can occur due to normal operations, user-initiated comman
>ds, or malicious actions such as process termination by malw>ds, or malicious actions such as process termination by malw
>are to disable security controls.  *Data Collection Measures>are to disable security controls.
>:*  - Endpoint Detection and Response (EDR) Tools:     - Mon 
>itor process termination events. - Windows Event Logs:     - 
> Event ID 4689 (Process Termination) – Captures when a proce 
>ss exits, including process ID and parent process.     - Eve 
>nt ID 7036 (Service Control Manager) – Monitors system servi 
>ce stops. - Sysmon (Windows):     - Event ID 5 (Process Term 
>ination) – Detects when a process exits, including parent-ch 
>ild relationships. - Linux/macOS Monitoring:     - AuditD (` 
>execve`, `exit_group`, `kill` syscalls) – Captures process t 
>ermination via command-line interactions.     - eBPF/XDP: Mo 
>nitors low-level system calls related to process termination 
>.     - OSQuery: The processes table can be queried for abno 
>rmal exits. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:36.181000+00:002025-11-12 22:03:39.105000+00:00
descriptionThe exit or termination of a running process on a system. This can occur due to normal operations, user-initiated commands, or malicious actions such as process termination by malware to disable security controls. + +*Data Collection Measures:* + +- Endpoint Detection and Response (EDR) Tools: + - Monitor process termination events. +- Windows Event Logs: + - Event ID 4689 (Process Termination) – Captures when a process exits, including process ID and parent process. + - Event ID 7036 (Service Control Manager) – Monitors system service stops. +- Sysmon (Windows): + - Event ID 5 (Process Termination) – Detects when a process exits, including parent-child relationships. +- Linux/macOS Monitoring: + - AuditD (`execve`, `exit_group`, `kill` syscalls) – Captures process termination via command-line interactions. + - eBPF/XDP: Monitors low-level system calls related to process termination. + - OSQuery: The processes table can be queried for abnormal exits.The exit or termination of a running process on a system. This can occur due to normal operations, user-initiated commands, or malicious actions such as process termination by malware to disable security controls.

[DC0104] Response Content

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Captured network traffic that provides details about responst1Captured network traffic that provides details about respons
>es received during an internet scan. This data includes both>es received during an internet scan. This data includes both
> protocol header values (e.g., HTTP status codes, IP headers> protocol header values (e.g., HTTP status codes, IP headers
>, or DNS response codes) and response body content (e.g., HT>, or DNS response codes) and response body content (e.g., HT
>ML, JSON, or raw data). Examples:  - HTTP Scan: A web server>ML, JSON, or raw data). Examples:  - HTTP Scan: A web server
> responds to a probe with an HTTP 200 status code and an HTM> responds to a probe with an HTTP 200 status code and an HTM
>L body indicating the default page is accessible. - DNS Scan>L body indicating the default page is accessible. - DNS Scan
>: A DNS server replies to a query with a resolved IP address>: A DNS server replies to a query with a resolved IP address
> for a domain, along with details like Time-To-Live (TTL) an> for a domain, along with details like Time-To-Live (TTL) an
>d authoritative information. - TCP Banner Grab: A service li>d authoritative information. - TCP Banner Grab: A service li
>stening on a port (e.g., SSH or FTP) responds with a banner >stening on a port (e.g., SSH or FTP) responds with a banner 
>containing service name, version, or other metadata.  *Data >containing service name, version, or other metadata.
>Collection Measures:*  - Network Traffic Monitoring:     - D 
>eploy packet capture tools like Wireshark, tcpdump, or Suric 
>ata to log both headers and body content of response traffic 
>.     - Use network appliances like firewalls, intrusion det 
>ection systems (IDS), or intrusion prevention systems (IPS)  
>with logging enabled to capture scan responses. - Cloud Logg 
>ing Services:     - AWS VPC Flow Logs: Capture metadata abou 
>t network flows, including source and destination, protocol, 
> and response codes.     - GCP Packet Mirroring: Use mirrore 
>d packets to analyze responses.     - Azure NSG Flow Logs: R 
>ecord network traffic flow information for analysis. - Speci 
>fic Tools:     - Zmap or Masscan: Can perform internet-wide  
>scans and collect response content for analysis.     - Nmap: 
> Use custom scripts to capture and log detailed response dat 
>a during scans. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:40.412000+00:002025-11-12 22:03:39.105000+00:00
descriptionCaptured network traffic that provides details about responses received during an internet scan. This data includes both protocol header values (e.g., HTTP status codes, IP headers, or DNS response codes) and response body content (e.g., HTML, JSON, or raw data). Examples: + +- HTTP Scan: A web server responds to a probe with an HTTP 200 status code and an HTML body indicating the default page is accessible. +- DNS Scan: A DNS server replies to a query with a resolved IP address for a domain, along with details like Time-To-Live (TTL) and authoritative information. +- TCP Banner Grab: A service listening on a port (e.g., SSH or FTP) responds with a banner containing service name, version, or other metadata. + +*Data Collection Measures:* + +- Network Traffic Monitoring: + - Deploy packet capture tools like Wireshark, tcpdump, or Suricata to log both headers and body content of response traffic. + - Use network appliances like firewalls, intrusion detection systems (IDS), or intrusion prevention systems (IPS) with logging enabled to capture scan responses. +- Cloud Logging Services: + - AWS VPC Flow Logs: Capture metadata about network flows, including source and destination, protocol, and response codes. + - GCP Packet Mirroring: Use mirrored packets to analyze responses. + - Azure NSG Flow Logs: Record network traffic flow information for analysis. +- Specific Tools: + - Zmap or Masscan: Can perform internet-wide scans and collect response content for analysis. + - Nmap: Use custom scripts to capture and log detailed response data during scans.Captured network traffic that provides details about responses received during an internet scan. This data includes both protocol header values (e.g., HTTP status codes, IP headers, or DNS response codes) and response body content (e.g., HTML, JSON, or raw data). Examples: + +- HTTP Scan: A web server responds to a probe with an HTTP 200 status code and an HTML body indicating the default page is accessible. +- DNS Scan: A DNS server replies to a query with a resolved IP address for a domain, along with details like Time-To-Live (TTL) and authoritative information. +- TCP Banner Grab: A service listening on a port (e.g., SSH or FTP) responds with a banner containing service name, version, or other metadata.

[DC0001] Scheduled Job Creation

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1The establishment of a task or job that will execute at a prt1The establishment of a task or job that will execute at a pr
>edefined time or based on specific triggers.  *Data Collecti>edefined time or based on specific triggers.
>on Measures: *  - Windows Event Logs:     - Event ID 4698 (S 
>cheduled Task Created) – Detects the creation of new schedul 
>ed tasks.     - Event ID 4702 (Scheduled Task Updated) – Ide 
>ntifies modifications to existing scheduled jobs.     - Even 
>t ID 106 (TaskScheduler Operational Log) – Provides details  
>about scheduled task execution. - Sysmon (Windows):     - Ev 
>ent ID 1 (Process Creation) – Detects the execution of suspi 
>cious tasks started by `schtasks.exe`, `at.exe`, or `taskeng 
>.exe`. - Linux/macOS Monitoring:     - AuditD: Monitor modif 
>ications to `/etc/cron*`, `/var/spool/cron/`, and `crontab`  
>files.     - Syslog: Capture cron job execution logs from `/ 
>var/log/cron`.     - OSQuery: Query the `crontab` and `launc 
>hd` tables for scheduled job configurations. - Endpoint Dete 
>ction and Response (EDR) Tools:     - Track scheduled task c 
>reation and modification events. - SIEM & XDR Detection Rule 
>s:     - Monitor for scheduled jobs created by unusual users 
>.     - Detect tasks executing scripts from non-standard dir 
>ectories. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:35.814000+00:002025-11-12 22:03:39.105000+00:00
descriptionThe establishment of a task or job that will execute at a predefined time or based on specific triggers. + +*Data Collection Measures: * + +- Windows Event Logs: + - Event ID 4698 (Scheduled Task Created) – Detects the creation of new scheduled tasks. + - Event ID 4702 (Scheduled Task Updated) – Identifies modifications to existing scheduled jobs. + - Event ID 106 (TaskScheduler Operational Log) – Provides details about scheduled task execution. +- Sysmon (Windows): + - Event ID 1 (Process Creation) – Detects the execution of suspicious tasks started by `schtasks.exe`, `at.exe`, or `taskeng.exe`. +- Linux/macOS Monitoring: + - AuditD: Monitor modifications to `/etc/cron*`, `/var/spool/cron/`, and `crontab` files. + - Syslog: Capture cron job execution logs from `/var/log/cron`. + - OSQuery: Query the `crontab` and `launchd` tables for scheduled job configurations. +- Endpoint Detection and Response (EDR) Tools: + - Track scheduled task creation and modification events. +- SIEM & XDR Detection Rules: + - Monitor for scheduled jobs created by unusual users. + - Detect tasks executing scripts from non-standard directories.The establishment of a task or job that will execute at a predefined time or based on specific triggers.

[DC0005] Scheduled Job Metadata

Current version: 2.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-22 19:03:38.549000+00:002025-11-12 22:03:39.105000+00:00
external_references[0]['url']https://attack.mitre.org/data-components/DC0005https://attack.mitre.org/datacomponents/DC0005
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'linux:cron', 'channel': '/var/log/syslog or journalctl'}
x_mitre_log_sources{'name': 'linux::cron', 'channel': 'crontab or at job created within TimeWindow post time discovery'}

[DC0029] Script Execution

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1The execution of a text file that contains code via the intet1The execution of a text file that contains code via the inte
>rpreter.  *Data Collection Measures:*  - Windows Event Logs:>rpreter.
>     - Event ID 4104 (PowerShell Script Block Logging) – Cap 
>tures full command-line execution of PowerShell scripts.     
> - Event ID 4688 (Process Creation) – Detects script executi 
>on by tracking process launches (`powershell.exe`, `wscript. 
>exe`, `cscript.exe`).     - Event ID 5861 (Script Execution) 
> – Captures script execution via Windows Defender AMSI loggi 
>ng. - Sysmon (Windows):     - Event ID 1 (Process Creation)  
>– Monitors script execution initiated by scripting engines.  
>    - Event ID 11 (File Creation) – Detects new script files 
> written to disk before execution. - Endpoint Detection and  
>Response (EDR) Tools:     - Track script execution behavior, 
> detect obfuscated commands, and prevent malicious scripts.  
>- PowerShell Logging:     - Enable Module Logging: Logs all  
>loaded modules and cmdlets.     - Enable Script Block Loggin 
>g: Captures complete PowerShell script execution history. -  
>SIEM Detection Rules:     - Detect script execution with obf 
>uscated, encoded, or remote URLs.     - Alert on script exec 
>utions using `-EncodedCommand` or `iex(iwr)`. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:36.018000+00:002025-11-12 22:03:39.105000+00:00
descriptionThe execution of a text file that contains code via the interpreter. + +*Data Collection Measures:* + +- Windows Event Logs: + - Event ID 4104 (PowerShell Script Block Logging) – Captures full command-line execution of PowerShell scripts. + - Event ID 4688 (Process Creation) – Detects script execution by tracking process launches (`powershell.exe`, `wscript.exe`, `cscript.exe`). + - Event ID 5861 (Script Execution) – Captures script execution via Windows Defender AMSI logging. +- Sysmon (Windows): + - Event ID 1 (Process Creation) – Monitors script execution initiated by scripting engines. + - Event ID 11 (File Creation) – Detects new script files written to disk before execution. +- Endpoint Detection and Response (EDR) Tools: + - Track script execution behavior, detect obfuscated commands, and prevent malicious scripts. +- PowerShell Logging: + - Enable Module Logging: Logs all loaded modules and cmdlets. + - Enable Script Block Logging: Captures complete PowerShell script execution history. +- SIEM Detection Rules: + - Detect script execution with obfuscated, encoded, or remote URLs. + - Alert on script executions using `-EncodedCommand` or `iex(iwr)`.The execution of a text file that contains code via the interpreter.
x_mitre_log_sources[11]['channel']EventCode=4103, 4104EventCode=4103, 4104, 4105, 4106
x_mitre_log_sources[22]['channel']EventCode=4016,5312EventCode=4016, 5312

[DC0060] Service Creation

Current version: 2.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:36.315000+00:002025-11-12 22:03:39.105000+00:00
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=7045'}

[DC0041] Service Metadata

Current version: 2.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:36.382000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_sources[1]['name']WinEventLog:sysmonWinEventLog:Sysmon

[DC0065] Service Modification

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Changes made to an existing service or daemon, such as modift1Changes made to an existing service or daemon, such as modif
>ying the service name, start type, execution parameters, or >ying the service name, start type, execution parameters, or 
>security configurations.  *Data Collection Measures: *  - Wi>security configurations.
>ndows Event Logs     - Event ID 7040 - Detects modifications 
> to the startup behavior of a service.     - Event ID 7045 - 
> Can capture changes made to existing services.     - Event  
>ID 7036 - Tracks when services start or stop, potentially in 
>dicating malicious tampering.     - Event ID 4697 - Can dete 
>ct when an adversary reinstalls a service with different par 
>ameters. - Sysmon Logs     - Sysmon Event ID 13 - Detects ch 
>anges to service configurations in the Windows Registry (e.g 
>., `HKLM\SYSTEM\CurrentControlSet\Services\`).     - Sysmon  
>Event ID 1 - Can track execution of `sc.exe` or `PowerShell  
>Set-Service`. - PowerShell Logging     - Event ID 4104 (Scri 
>pt Block Logging) - Captures execution of commands like `Set 
>-Service`, `New-Service`, or `sc config`.     - Command-Line 
> Logging (Event ID 4688) - Tracks usage of service modificat 
>ion commands:         - `sc config <service_name> start= aut 
>o`           - `sc qc <service_name>`   - Linux/macOS Collec 
>tion Methods     - Systemd Journals (`journalctl -u <service 
>_name>`) Tracks modifications to systemd service configurati 
>ons.     - Daemon Logs (`/var/log/syslog`, `/var/log/message 
>s`, `/var/log/daemon.log`) Captures changes to service state 
> and execution parameters.     - AuditD Rules for Service Mo 
>dification          - Monitor modifications to `/etc/systemd 
>/system/` for new or altered service unit files: `auditctl - 
>w /etc/systemd/system/ -p wa -k service_modification`        
>  - Track execution of `systemctl` or `service` commands: `a 
>uditctl -a always,exit -F arch=b64 -S execve -F a0=systemctl 
> -F key=service_mod`     - OSQuery for Linux/macOS Monitorin 
>g         - Query modified services using OSQuery’s `process 
>es` or `system_info` tables: `SELECT * FROM systemd_units WH 
>ERE state != 'running';`     - macOS Launch Daemon/Agent Mod 
>ification         - Monitor for changes in:             - `/ 
>Library/LaunchDaemons/`             - `/Library/LaunchAgents 
>/`         - Track modifications to `.plist` files indicatin 
>g persistence attempts. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:37.211000+00:002025-11-12 22:03:39.105000+00:00
descriptionChanges made to an existing service or daemon, such as modifying the service name, start type, execution parameters, or security configurations. + +*Data Collection Measures: * + +- Windows Event Logs + - Event ID 7040 - Detects modifications to the startup behavior of a service. + - Event ID 7045 - Can capture changes made to existing services. + - Event ID 7036 - Tracks when services start or stop, potentially indicating malicious tampering. + - Event ID 4697 - Can detect when an adversary reinstalls a service with different parameters. +- Sysmon Logs + - Sysmon Event ID 13 - Detects changes to service configurations in the Windows Registry (e.g., `HKLM\SYSTEM\CurrentControlSet\Services\`). + - Sysmon Event ID 1 - Can track execution of `sc.exe` or `PowerShell Set-Service`. +- PowerShell Logging + - Event ID 4104 (Script Block Logging) - Captures execution of commands like `Set-Service`, `New-Service`, or `sc config`. + - Command-Line Logging (Event ID 4688) - Tracks usage of service modification commands: + - `sc config start= auto` + - `sc qc ` +- Linux/macOS Collection Methods + - Systemd Journals (`journalctl -u `) Tracks modifications to systemd service configurations. + - Daemon Logs (`/var/log/syslog`, `/var/log/messages`, `/var/log/daemon.log`) Captures changes to service state and execution parameters. + - AuditD Rules for Service Modification + - Monitor modifications to `/etc/systemd/system/` for new or altered service unit files: `auditctl -w /etc/systemd/system/ -p wa -k service_modification` + - Track execution of `systemctl` or `service` commands: `auditctl -a always,exit -F arch=b64 -S execve -F a0=systemctl -F key=service_mod` + - OSQuery for Linux/macOS Monitoring + - Query modified services using OSQuery’s `processes` or `system_info` tables: `SELECT * FROM systemd_units WHERE state != 'running';` + - macOS Launch Daemon/Agent Modification + - Monitor for changes in: + - `/Library/LaunchDaemons/` + - `/Library/LaunchAgents/` + - Track modifications to `.plist` files indicating persistence attempts.Changes made to an existing service or daemon, such as modifying the service name, start type, execution parameters, or security configurations.

[DC0057] Snapshot Creation

Current version: 2.0

+ + + + + + + + + + + + + + + +

Old Description
New Description
t1The process of taking a point-in-time copy of a cloud storagt1The process of taking a point-in-time copy of a cloud storag
>e volume (files, settings, configurations, etc.), virtual ma>e volume (files, settings, configurations, etc.), virtual ma
>chine (VM), or database that can be created and deployed in >chine (VM), or database that can be created and deployed in 
>cloud environments.  *Data Collection Measures:*  - Cloud Pl>cloud environments.
>atform Logs (IaaS)     - AWS CloudTrail Logs: Monitor API ca 
>lls related to snapshot creation (`CreateSnapshot`).     - A 
>zure Monitor Logs: Track snapshot creation (`Microsoft.Compu 
>te/snapshots/write`).     - Google Cloud Logging: Detect `co 
>mpute.disks.createSnapshot`. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:39.640000+00:002025-11-12 22:03:39.105000+00:00
descriptionThe process of taking a point-in-time copy of a cloud storage volume (files, settings, configurations, etc.), virtual machine (VM), or database that can be created and deployed in cloud environments. + +*Data Collection Measures:* + +- Cloud Platform Logs (IaaS) + - AWS CloudTrail Logs: Monitor API calls related to snapshot creation (`CreateSnapshot`). + - Azure Monitor Logs: Track snapshot creation (`Microsoft.Compute/snapshots/write`). + - Google Cloud Logging: Detect `compute.disks.createSnapshot`.The process of taking a point-in-time copy of a cloud storage volume (files, settings, configurations, etc.), virtual machine (VM), or database that can be created and deployed in cloud environments.

[DC0002] User Account Authentication

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1An attempt (successful and failed login attempts) by a user,t1An attempt (successful and failed login attempts) by a user,
> service, or application to gain access to a network, system> service, or application to gain access to a network, system
>, or cloud-based resource. This typically involves credentia>, or cloud-based resource. This typically involves credentia
>ls such as passwords, tokens, multi-factor authentication (M>ls such as passwords, tokens, multi-factor authentication (M
>FA), or biometric validation.  *Data Collection Measures:*  >FA), or biometric validation.
>- Host-Based Authentication Logs     - Windows Event Logs    
>      - Event ID 4776 – NTLM authentication attempt.         
> - Event ID 4624 – Successful user logon.         - Event ID 
> 4625 – Failed authentication attempt.         - Event ID 46 
>48 – Explicit logon with alternate credentials.     - Linux/ 
>macOS Authentication Logs         - `/var/log/auth.log`, `/v 
>ar/log/secure` – Logs SSH, sudo, and other authentication at 
>tempts.         - AuditD – Tracks authentication events via  
>PAM modules.         - macOS Unified Logs – `/var/db/diagnos 
>tics` captures authentication failures. - Cloud Authenticati 
>on Logs     - Azure AD Logs         - Sign-in Logs – Tracks  
>authentication attempts, MFA challenges, and conditional acc 
>ess failures.         - Audit Logs – Captures authentication 
>-related configuration changes.         - Microsoft Graph AP 
>I – Provides real-time sign-in analytics.     - Google Works 
>pace & Office 365         - Google Admin Console – `User Log 
>in Report` tracks login attempts and failures.         - Off 
>ice 365 Unified Audit Logs – Captures logins across Exchange 
>, SharePoint, and Teams.     - AWS CloudTrail & IAM          
>- Tracks authentication via `AWS IAM AuthenticateUser` and ` 
>sts:GetSessionToken`.         - Logs failed authentications  
>to AWS Management Console and API requests. - Container Auth 
>entication Monitoring     - Kubernetes Authentication Logs   
>       - kubectl audit logs – Captures authentication attemp 
>ts for service accounts and admin users.         - Azure Kub 
>ernetes Service (AKS) and Google Kubernetes Engine (GKE) – L 
>ogs IAM authentication events. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:34.948000+00:002025-11-12 22:03:39.105000+00:00
descriptionAn attempt (successful and failed login attempts) by a user, service, or application to gain access to a network, system, or cloud-based resource. This typically involves credentials such as passwords, tokens, multi-factor authentication (MFA), or biometric validation. + +*Data Collection Measures:* + +- Host-Based Authentication Logs + - Windows Event Logs + - Event ID 4776 – NTLM authentication attempt. + - Event ID 4624 – Successful user logon. + - Event ID 4625 – Failed authentication attempt. + - Event ID 4648 – Explicit logon with alternate credentials. + - Linux/macOS Authentication Logs + - `/var/log/auth.log`, `/var/log/secure` – Logs SSH, sudo, and other authentication attempts. + - AuditD – Tracks authentication events via PAM modules. + - macOS Unified Logs – `/var/db/diagnostics` captures authentication failures. +- Cloud Authentication Logs + - Azure AD Logs + - Sign-in Logs – Tracks authentication attempts, MFA challenges, and conditional access failures. + - Audit Logs – Captures authentication-related configuration changes. + - Microsoft Graph API – Provides real-time sign-in analytics. + - Google Workspace & Office 365 + - Google Admin Console – `User Login Report` tracks login attempts and failures. + - Office 365 Unified Audit Logs – Captures logins across Exchange, SharePoint, and Teams. + - AWS CloudTrail & IAM + - Tracks authentication via `AWS IAM AuthenticateUser` and `sts:GetSessionToken`. + - Logs failed authentications to AWS Management Console and API requests. +- Container Authentication Monitoring + - Kubernetes Authentication Logs + - kubectl audit logs – Captures authentication attempts for service accounts and admin users. + - Azure Kubernetes Service (AKS) and Google Kubernetes Engine (GKE) – Logs IAM authentication events.An attempt (successful and failed login attempts) by a user, service, or application to gain access to a network, system, or cloud-based resource. This typically involves credentials such as passwords, tokens, multi-factor authentication (MFA), or biometric validation.
x_mitre_log_sources[12]['name']m365:signinm365:signinlogs
x_mitre_log_sources[15]['channel']EventCode=4769,1200,1202EventCode=4776, 4625
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4769, 1200, 1202'}
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4624, 4625'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4625, 4624'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': '4624, 4625'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventID=4625'}

[DC0014] User Account Creation

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1The initial establishment of a new user, service, or machinet1The initial establishment of a new user, service, or machine
> account within an operating system, cloud environment, or i> account within an operating system, cloud environment, or i
>dentity management system.  *Data Collection Measures:*  - H>dentity management system.
>ost-Based Logging     - Windows Event Logs         - Event I 
>D 4720 – A new user account was created.         - Event ID  
>4732/4735 – A user was added to a privileged group.          
>- Event ID 4798 – Enumeration of user accounts.     - Linux/ 
>macOS Authentication Logs         - `/var/log/auth.log`, `/v 
>ar/log/secure` – Logs `useradd`, `adduser`, `passwd`, and `g 
>roupmod` activities.         - AuditD – Detects new account  
>creation via PAM (`useradd`, `usermod`).         - OSQuery – 
> The `users` table tracks newly created accounts. - Cloud-Ba 
>sed Logging     - Azure AD Logs         - Azure AD Audit Log 
>s – Tracks new user and service account creation.         -  
>Azure Graph API – Provides logs on new account provisioning. 
>     - AWS IAM & CloudTrail Logs         - CreateUser, Creat 
>eRole – Tracks new IAM user creation.         - AttachRolePo 
>licy – Identifies privilege escalation via account creation. 
>     - Google Workspace & Office 365 Logs         - Google A 
>dmin Console – Logs user creation in User Accounts API.      
>    - Microsoft 365 Unified Audit Log – Tracks new account p 
>rovisioning. - Container & Network Account Creation Logs     
> - Kubernetes Account Creation Logs         - kubectl audit  
>logs – Detects new service account provisioning.         - G 
>KE/Azure AKS Logs – Track new container service accounts. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:34.784000+00:002025-11-12 22:03:39.105000+00:00
descriptionThe initial establishment of a new user, service, or machine account within an operating system, cloud environment, or identity management system. + +*Data Collection Measures:* + +- Host-Based Logging + - Windows Event Logs + - Event ID 4720 – A new user account was created. + - Event ID 4732/4735 – A user was added to a privileged group. + - Event ID 4798 – Enumeration of user accounts. + - Linux/macOS Authentication Logs + - `/var/log/auth.log`, `/var/log/secure` – Logs `useradd`, `adduser`, `passwd`, and `groupmod` activities. + - AuditD – Detects new account creation via PAM (`useradd`, `usermod`). + - OSQuery – The `users` table tracks newly created accounts. +- Cloud-Based Logging + - Azure AD Logs + - Azure AD Audit Logs – Tracks new user and service account creation. + - Azure Graph API – Provides logs on new account provisioning. + - AWS IAM & CloudTrail Logs + - CreateUser, CreateRole – Tracks new IAM user creation. + - AttachRolePolicy – Identifies privilege escalation via account creation. + - Google Workspace & Office 365 Logs + - Google Admin Console – Logs user creation in User Accounts API. + - Microsoft 365 Unified Audit Log – Tracks new account provisioning. +- Container & Network Account Creation Logs + - Kubernetes Account Creation Logs + - kubectl audit logs – Detects new service account provisioning. + - GKE/Azure AKS Logs – Track new container service accounts.The initial establishment of a new user, service, or machine account within an operating system, cloud environment, or identity management system.
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4720, EventCode=4781'}

[DC0009] User Account Deletion

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1The removal of a user, service, or machine account from an ot1The removal of a user, service, or machine account from an o
>perating system, cloud identity management system, or direct>perating system, cloud identity management system, or direct
>ory service.  *Data Collection Measures:*  - Host-Based Logg>ory service.
>ing     - Windows Event Logs         - Event ID 4726 – A use 
>r account was deleted.         - Event ID 4733/4735 – A user 
> was removed from a privileged group.         - Event ID 110 
>2 – Security log was cleared (potential cover-up).     - Lin 
>ux/macOS Authentication Logs         - `/var/log/auth.log`,  
>`/var/log/secure` – Logs `userdel`, `deluser`, `passwd -l`.  
>        - AuditD – Tracks account deletions via PAM events ( 
>`userdel`).         - OSQuery – The `users` table can detect 
> account removal. - Cloud-Based Logging     - Azure AD Logs  
>        - Azure AD Audit Logs – Tracks user and service acco 
>unt deletions.         - Azure Graph API – Monitors identity 
> changes.     - AWS IAM & CloudTrail Logs         - `DeleteU 
>ser`, `DeleteRole` – Tracks IAM user deletion.         - Det 
>achRolePolicy – Identifies privilege revocation before delet 
>ion.     - Google Workspace & Office 365 Logs         - Goog 
>le Admin Console – Logs user removal activities.         - M 
>icrosoft 365 Unified Audit Log – Captures deleted accounts i 
>n Active Directory. - Container & Network Account Deletion L 
>ogs     - Kubernetes Service Account Deletion         - kube 
>ctl audit logs – Detects when service accounts are removed f 
>rom pods.         - GKE/Azure AKS Logs – Track containerized 
> identity removals. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:36.864000+00:002025-11-12 22:03:39.105000+00:00
descriptionThe removal of a user, service, or machine account from an operating system, cloud identity management system, or directory service. + +*Data Collection Measures:* + +- Host-Based Logging + - Windows Event Logs + - Event ID 4726 – A user account was deleted. + - Event ID 4733/4735 – A user was removed from a privileged group. + - Event ID 1102 – Security log was cleared (potential cover-up). + - Linux/macOS Authentication Logs + - `/var/log/auth.log`, `/var/log/secure` – Logs `userdel`, `deluser`, `passwd -l`. + - AuditD – Tracks account deletions via PAM events (`userdel`). + - OSQuery – The `users` table can detect account removal. +- Cloud-Based Logging + - Azure AD Logs + - Azure AD Audit Logs – Tracks user and service account deletions. + - Azure Graph API – Monitors identity changes. + - AWS IAM & CloudTrail Logs + - `DeleteUser`, `DeleteRole` – Tracks IAM user deletion. + - DetachRolePolicy – Identifies privilege revocation before deletion. + - Google Workspace & Office 365 Logs + - Google Admin Console – Logs user removal activities. + - Microsoft 365 Unified Audit Log – Captures deleted accounts in Active Directory. +- Container & Network Account Deletion Logs + - Kubernetes Service Account Deletion + - kubectl audit logs – Detects when service accounts are removed from pods. + - GKE/Azure AKS Logs – Track containerized identity removals.The removal of a user, service, or machine account from an operating system, cloud identity management system, or directory service.

[DC0010] User Account Modification

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Changes made to an existing user, service, or machine account1Changes made to an existing user, service, or machine accoun
>t, including alterations to attributes, permissions, roles, >t, including alterations to attributes, permissions, roles, 
>authentication methods, or group memberships.  *Data Collect>authentication methods, or group memberships.
>ion Measures:*  - Host-Based Logging     - Windows Event Log 
>s         - Event ID 4738 – A user account was changed.      
>    - Event ID 4725 – A user account was disabled.         - 
> Event ID 4724 – An attempt was made to reset an account's p 
>assword.         - Event ID 4767 – A user account was unlock 
>ed.     - Linux/macOS Authentication Logs         - `/var/lo 
>g/auth.log`, `/var/log/secure` – Tracks account modification 
>s (`usermod`, `chage`, `passwd`).         - AuditD – Monitor 
>s account changes (`useradd`, `usermod`, `gpasswd`).         
> - OSQuery – Queries the `users` table for recent modificati 
>ons. - Cloud-Based Logging     - Azure AD Logs         - Azu 
>re AD Audit Logs – Tracks modifications to users and securit 
>y groups.         - Azure Graph API – Captures changes to au 
>thentication policies and MFA settings.     - AWS IAM & Clou 
>dTrail Logs         - `ModifyUser`, `UpdateLoginProfile` – C 
>aptures changes to IAM user attributes.         - `AttachUse 
>rPolicy`, `AddUserToGroup` – Detects policy and group modifi 
>cations.     - Google Workspace & Office 365 Logs         -  
>Google Admin Console – Logs account changes, role modificati 
>ons, and group membership updates.         - Microsoft 365 U 
>nified Audit Log – Captures modifications to security settin 
>gs and privileged account changes. - Container & Network Acc 
>ount Modification Logs     - Kubernetes Service Account Chan 
>ges         - kubectl audit logs – Detects service account m 
>odifications in Kubernetes clusters.         - GKE/Azure AKS 
> Logs – Monitors role and permission changes. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:36.735000+00:002025-11-12 22:03:39.105000+00:00
descriptionChanges made to an existing user, service, or machine account, including alterations to attributes, permissions, roles, authentication methods, or group memberships. + +*Data Collection Measures:* + +- Host-Based Logging + - Windows Event Logs + - Event ID 4738 – A user account was changed. + - Event ID 4725 – A user account was disabled. + - Event ID 4724 – An attempt was made to reset an account's password. + - Event ID 4767 – A user account was unlocked. + - Linux/macOS Authentication Logs + - `/var/log/auth.log`, `/var/log/secure` – Tracks account modifications (`usermod`, `chage`, `passwd`). + - AuditD – Monitors account changes (`useradd`, `usermod`, `gpasswd`). + - OSQuery – Queries the `users` table for recent modifications. +- Cloud-Based Logging + - Azure AD Logs + - Azure AD Audit Logs – Tracks modifications to users and security groups. + - Azure Graph API – Captures changes to authentication policies and MFA settings. + - AWS IAM & CloudTrail Logs + - `ModifyUser`, `UpdateLoginProfile` – Captures changes to IAM user attributes. + - `AttachUserPolicy`, `AddUserToGroup` – Detects policy and group modifications. + - Google Workspace & Office 365 Logs + - Google Admin Console – Logs account changes, role modifications, and group membership updates. + - Microsoft 365 Unified Audit Log – Captures modifications to security settings and privileged account changes. +- Container & Network Account Modification Logs + - Kubernetes Service Account Changes + - kubectl audit logs – Detects service account modifications in Kubernetes clusters. + - GKE/Azure AKS Logs – Monitors role and permission changes.Changes made to an existing user, service, or machine account, including alterations to attributes, permissions, roles, authentication methods, or group memberships.
x_mitre_log_sources[11]['channel']EventCode=4723, 4724, 4726, 4740EventCode=4723, 4724, 4740
x_mitre_log_sources[30]['name']azure:signinLogsazure:signinlogs
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:DirectoryService', 'channel': 'EventID 5136'}

[DC0097] Volume Creation

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1The initial provisioning of block storage volumes in cloud ot1The initial provisioning of block storage volumes in cloud o
>r on-prem environments, typically used for data storage, bac>r on-prem environments, typically used for data storage, bac
>kup, or workload scaling.  *Data Collection Measures:*  - Cl>kup, or workload scaling.
>oud-Based Logging & Monitoring     - AWS CloudTrail          
>- `CreateVolume` – Logs the creation of new Amazon Elastic B 
>lock Store (EBS) volumes.         - `RunInstances` – Can be  
>correlated to detect automatic volume provisioning.     - Az 
>ure Monitor & Log Analytics         - `Microsoft.Compute/dis 
>ks/write` – Captures creation of new managed/unmanaged disks 
>.         - `Microsoft.Storage/storageAccounts/write` – Dete 
>cts creation of new Azure Blob Storage volumes.     - Google 
> Cloud Logging (GCP)         - `compute.disks.insert` – Trac 
>ks new persistent disk creation.         - `compute.instance 
>s.attachDisk` – Logs attachment of a volume to a running VM. 
>     - OpenStack Logs         - `volume.create` – Captures n 
>ew storage volume provisioning.         - `cinder.volume.cre 
>ate` – Logs OpenStack Cinder block storage creation. - Host- 
>Based & SIEM Detection     - Linux/macOS System Logs         
> - `/var/log/syslog` & `/var/log/messages` – Detects new mou 
>nt points or attached storage.         - `dmesg | grep "new  
>disk"` – Identifies kernel messages for volume attachment.   
>       - AuditD: Tracks `mkfs` (filesystem creation) for new 
> volume provisioning.     - Windows Event Logs         - Eve 
>nt ID 1006 (Storage Management Events) – Captures disk volum 
>e creation.         - Event ID 5145 (Object Access: File Sha 
>re) – Detects access to newly created storage shares. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:39.832000+00:002025-11-12 22:03:39.105000+00:00
descriptionThe initial provisioning of block storage volumes in cloud or on-prem environments, typically used for data storage, backup, or workload scaling. + +*Data Collection Measures:* + +- Cloud-Based Logging & Monitoring + - AWS CloudTrail + - `CreateVolume` – Logs the creation of new Amazon Elastic Block Store (EBS) volumes. + - `RunInstances` – Can be correlated to detect automatic volume provisioning. + - Azure Monitor & Log Analytics + - `Microsoft.Compute/disks/write` – Captures creation of new managed/unmanaged disks. + - `Microsoft.Storage/storageAccounts/write` – Detects creation of new Azure Blob Storage volumes. + - Google Cloud Logging (GCP) + - `compute.disks.insert` – Tracks new persistent disk creation. + - `compute.instances.attachDisk` – Logs attachment of a volume to a running VM. + - OpenStack Logs + - `volume.create` – Captures new storage volume provisioning. + - `cinder.volume.create` – Logs OpenStack Cinder block storage creation. +- Host-Based & SIEM Detection + - Linux/macOS System Logs + - `/var/log/syslog` & `/var/log/messages` – Detects new mount points or attached storage. + - `dmesg | grep "new disk"` – Identifies kernel messages for volume attachment. + - AuditD: Tracks `mkfs` (filesystem creation) for new volume provisioning. + - Windows Event Logs + - Event ID 1006 (Storage Management Events) – Captures disk volume creation. + - Event ID 5145 (Object Access: File Share) – Detects access to newly created storage shares.The initial provisioning of block storage volumes in cloud or on-prem environments, typically used for data storage, backup, or workload scaling.

[DC0098] Volume Deletion

Current version: 2.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:38.711000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_sources[1]['channel']DeleteVolume, ModifyVolumeDeleteVolume

[DC0100] Volume Metadata

Current version: 2.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:38.841000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_sources[0]['name']WinEventLog:SecurityMetadata
x_mitre_log_sources[0]['channel']4673, 4674None

[DC0008] WMI Creation

Current version: 2.0

+ + + + + + + + + + + + + + + + +

Old Description
New Description
t1Initial construction of a WMI object, such as a filter, const1Initial construction of a WMI object, such as a filter, cons
>umer, subscription, binding, or providers.   *Data Collectio>umer, subscription, binding, or providers.
>n Measures:*  - Windows Security Event Logs:     - Event ID  
>5861 (WMI Permanent Event Subscription)     - Event ID 5860  
>(WMI Event Filter Activity)     - Event ID 5857 (WMI Event C 
>onsumer Activity) - Sysmon Logs:     - Sysmon Event ID 19 –  
>WMI Event Filter Created     - Sysmon Event ID 20 – WMI Even 
>t Consumer Created     - Sysmon Event ID 21 – WMI Event Bind 
>ing Created - Endpoint Detection & Response (EDR)     - Dete 
>cts WMI-based persistence techniques. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:35.880000+00:002025-11-12 22:03:39.105000+00:00
descriptionInitial construction of a WMI object, such as a filter, consumer, subscription, binding, or providers. + +*Data Collection Measures:* + +- Windows Security Event Logs: + - Event ID 5861 (WMI Permanent Event Subscription) + - Event ID 5860 (WMI Event Filter Activity) + - Event ID 5857 (WMI Event Consumer Activity) +- Sysmon Logs: + - Sysmon Event ID 19 – WMI Event Filter Created + - Sysmon Event ID 20 – WMI Event Consumer Created + - Sysmon Event ID 21 – WMI Event Binding Created +- Endpoint Detection & Response (EDR) + - Detects WMI-based persistence techniques.Initial construction of a WMI object, such as a filter, consumer, subscription, binding, or providers.
x_mitre_log_sources[3]['channel']EventCode=5857, 5858EventCode=5857, 5858, 5860, 5861
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Microsoft-Windows-WMI-Activity/Operational', 'channel': 'EventCode=5861'}
x_mitre_log_sources{'name': 'WinEventLog:Microsoft-Windows-WMI-Activity/Operational', 'channel': 'EventCode=5857, 5860, 5861'}
x_mitre_log_sources{'name': 'WinEventLog:WMI', 'channel': 'EventCode=5857, 5860, 5861'}

[DC0006] Web Credential Creation

Current version: 2.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:38.777000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_sources[2]['name']azure:signinLogsazure:signinlogs

[DC0007] Web Credential Usage

Current version: 2.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:37.480000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_sources[16]['name']azure:signinLogsazure:signinlogs

[DC0050] Windows Registry Key Access

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1The action of opening a specific Windows Registry key, typict1The action of opening a specific Windows Registry key, typic
>ally to read its associated value. This activity can be used>ally to read its associated value. This activity can be used
> for system configuration, application settings retrieval, a> for system configuration, application settings retrieval, a
>nd security policies.  *Data Collection Measures:*  - Window>nd security policies.
>s Event Logs     - Event ID 4656 - Handle to an Object was R 
>equested: Logs attempts to open registry keys.     - Event I 
>D 4663 - An Object was Accessed: Captures read/write operati 
>ons on registry keys.     - Event ID 4657 - Registry Value M 
>odification: Useful for detecting changes to registry keys a 
>fter being accessed. - Sysmon     - Sysmon Event ID 13 - Reg 
>istry Value Set: Captures modifications to existing registry 
> keys. - Endpoint Detection and Response (EDR) Solutions     
> - Provide telemetry on registry key access activities, espe 
>cially when linked to suspicious processes. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:39.242000+00:002025-11-12 22:03:39.105000+00:00
descriptionThe action of opening a specific Windows Registry key, typically to read its associated value. This activity can be used for system configuration, application settings retrieval, and security policies. + +*Data Collection Measures:* + +- Windows Event Logs + - Event ID 4656 - Handle to an Object was Requested: Logs attempts to open registry keys. + - Event ID 4663 - An Object was Accessed: Captures read/write operations on registry keys. + - Event ID 4657 - Registry Value Modification: Useful for detecting changes to registry keys after being accessed. +- Sysmon + - Sysmon Event ID 13 - Registry Value Set: Captures modifications to existing registry keys. +- Endpoint Detection and Response (EDR) Solutions + - Provide telemetry on registry key access activities, especially when linked to suspicious processes.The action of opening a specific Windows Registry key, typically to read its associated value. This activity can be used for system configuration, application settings retrieval, and security policies.
x_mitre_log_sources[0]['channel']EventCode=4656EventCode=4663, 4670, 4656

[DC0056] Windows Registry Key Creation

Current version: 2.0

+ + + + + + + + + + + + + + + +

Old Description
New Description
t1Initial construction of a new registry key within the Windowt1Initial construction of a new registry key within the Window
>s operating system.   *Data Collection Measures:*   - Window>s operating system. 
>s Event Logs     - Event ID 4656 - Registry Object Handle Re 
>quested: Tracks registry key access, including newly created 
> keys.     - Event ID 4657 - Registry Value Modification: De 
>tects modifications to an existing registry key after creati 
>on. - Sysmon (System Monitor) for Windows     - Sysmon Event 
> ID 12 - Registry Key Created: Logs when a new registry key  
>is created.  
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:37.143000+00:002025-11-12 22:03:39.105000+00:00
descriptionInitial construction of a new registry key within the Windows operating system. + +*Data Collection Measures:* + +- Windows Event Logs + - Event ID 4656 - Registry Object Handle Requested: Tracks registry key access, including newly created keys. + - Event ID 4657 - Registry Value Modification: Detects modifications to an existing registry key after creation. +- Sysmon (System Monitor) for Windows + - Sysmon Event ID 12 - Registry Key Created: Logs when a new registry key is created. +Initial construction of a new registry key within the Windows operating system.

[DC0063] Windows Registry Key Modification

Current version: 2.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-22 18:34:46.572000+00:002025-11-12 22:03:39.105000+00:00
external_references[0]['url']https://attack.mitre.org/data-components/DC0063https://attack.mitre.org/datacomponents/DC0063
x_mitre_log_sources[3]['channel']EventCode=4663EventCode=4663, 4670, 4656
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Sysmon', 'channel': 'EventCode=13'}
x_mitre_log_sources{'name': 'WinEventLog:Sysmon', 'channel': 'EventCode=14'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4670'}

mobile-attack

Patches

[DC0064] Command Execution

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Command Execution involves monitoring and capturing the exect1Command Execution involves monitoring and capturing the exec
>ution of textual commands (including shell commands, cmdlets>ution of textual commands (including shell commands, cmdlets
>, and scripts) within an operating system or application. Th>, and scripts) within an operating system or application. Th
>ese commands may include arguments or parameters and are typ>ese commands may include arguments or parameters and are typ
>ically executed through interpreters such as `cmd.exe`, `bas>ically executed through interpreters such as `cmd.exe`, `bas
>h`, `zsh`, `PowerShell`, or programmatic execution. Examples>h`, `zsh`, `PowerShell`, or programmatic execution. Examples
>:   - Windows Command Prompt     - dir – Lists directory con>:   - Windows Command Prompt     - dir – Lists directory con
>tents.     - net user – Queries or manipulates user accounts>tents.     - net user – Queries or manipulates user accounts
>.     - tasklist – Lists running processes. - PowerShell    >.     - tasklist – Lists running processes. - PowerShell    
> - Get-Process – Retrieves processes running on a system.   > - Get-Process – Retrieves processes running on a system.   
>  - Set-ExecutionPolicy – Changes PowerShell script executio>  - Set-ExecutionPolicy – Changes PowerShell script executio
>n policies.     - Invoke-WebRequest – Downloads remote resou>n policies.     - Invoke-WebRequest – Downloads remote resou
>rces. - Linux Shell     - ls – Lists files in a directory.  >rces. - Linux Shell     - ls – Lists files in a directory.  
>   - cat /etc/passwd – Reads the user accounts file.     - c>   - cat /etc/passwd – Reads the user accounts file.     - c
>url http://malicious-site.com – Retrieves content from a mal>url http://malicious-site.com – Retrieves content from a mal
>icious URL. - Container Environments     - docker exec – Exe>icious URL. - Container Environments     - docker exec – Exe
>cutes a command inside a running container.     - kubectl ex>cutes a command inside a running container.     - kubectl ex
>ec – Runs commands in Kubernetes pods. - macOS Terminal     >ec – Runs commands in Kubernetes pods. - macOS Terminal     
>- open – Opens files or URLs.     - dscl . -list /Users – Li>- open – Opens files or URLs.     - dscl . -list /Users – Li
>sts all users on the system.     - osascript -e – Executes A>sts all users on the system.     - osascript -e – Executes A
>ppleScript commands.  This data component can be collected t>ppleScript commands.
>hrough the following measures:  Enable Command Logging  - Wi 
>ndows:     - Enable PowerShell logging: `Set-ExecutionPolicy 
> Bypass`, `Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\M 
>icrosoft\Windows\PowerShell\ScriptBlockLogging" -Name Enable 
>ScriptBlockLogging -Value 1`     - Enable Windows Event Logg 
>ing:         - Event ID 4688: Tracks process creation, inclu 
>ding command-line arguments.         - Event ID 4104: Logs P 
>owerShell script block execution. - Linux/macOS:     - Enabl 
>e shell history logging in `.bashrc` or `.zshrc`: `export HI 
>STTIMEFORMAT="%d/%m/%y %T "`, `export PROMPT_COMMAND='histor 
>y -a; history -w'`     - Use audit frameworks (e.g., `auditd 
>`) to log command executions. Example rule to log all `execv 
>e` syscalls: `-a always,exit -F arch=b64 -S execve -k cmd_ex 
>ec` - Containers:     - Use runtime-specific tools like Dock 
>er’s --log-driver or Kubernetes Audit Logs to capture exec c 
>ommands.  Integrate with Centralized Logging  - Collect logs 
> using a SIEM (e.g., Splunk) or cloud-based log aggregation  
>tools like AWS CloudWatch or Azure Monitor. Example Splunk S 
>earch for Windows Event 4688: `index=windows EventID=4688 Co 
>mmandLine=*`  Use Endpoint Detection and Response (EDR) Tool 
>s  - Monitor command executions via EDR solutions   Deploy S 
>ysmon for Advanced Logging (Windows)  - Use Sysmon's Event I 
>D 1 to log process creation with command-line arguments 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:34.849000+00:002025-11-12 22:03:39.105000+00:00
descriptionCommand Execution involves monitoring and capturing the execution of textual commands (including shell commands, cmdlets, and scripts) within an operating system or application. These commands may include arguments or parameters and are typically executed through interpreters such as `cmd.exe`, `bash`, `zsh`, `PowerShell`, or programmatic execution. Examples: + +- Windows Command Prompt + - dir – Lists directory contents. + - net user – Queries or manipulates user accounts. + - tasklist – Lists running processes. +- PowerShell + - Get-Process – Retrieves processes running on a system. + - Set-ExecutionPolicy – Changes PowerShell script execution policies. + - Invoke-WebRequest – Downloads remote resources. +- Linux Shell + - ls – Lists files in a directory. + - cat /etc/passwd – Reads the user accounts file. + - curl http://malicious-site.com – Retrieves content from a malicious URL. +- Container Environments + - docker exec – Executes a command inside a running container. + - kubectl exec – Runs commands in Kubernetes pods. +- macOS Terminal + - open – Opens files or URLs. + - dscl . -list /Users – Lists all users on the system. + - osascript -e – Executes AppleScript commands. + +This data component can be collected through the following measures: + +Enable Command Logging + +- Windows: + - Enable PowerShell logging: `Set-ExecutionPolicy Bypass`, `Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging" -Name EnableScriptBlockLogging -Value 1` + - Enable Windows Event Logging: + - Event ID 4688: Tracks process creation, including command-line arguments. + - Event ID 4104: Logs PowerShell script block execution. +- Linux/macOS: + - Enable shell history logging in `.bashrc` or `.zshrc`: `export HISTTIMEFORMAT="%d/%m/%y %T "`, `export PROMPT_COMMAND='history -a; history -w'` + - Use audit frameworks (e.g., `auditd`) to log command executions. Example rule to log all `execve` syscalls: `-a always,exit -F arch=b64 -S execve -k cmd_exec` +- Containers: + - Use runtime-specific tools like Docker’s --log-driver or Kubernetes Audit Logs to capture exec commands. + +Integrate with Centralized Logging + +- Collect logs using a SIEM (e.g., Splunk) or cloud-based log aggregation tools like AWS CloudWatch or Azure Monitor. Example Splunk Search for Windows Event 4688: +`index=windows EventID=4688 CommandLine=*` + +Use Endpoint Detection and Response (EDR) Tools + +- Monitor command executions via EDR solutions + +Deploy Sysmon for Advanced Logging (Windows) + +- Use Sysmon's Event ID 1 to log process creation with command-line argumentsCommand Execution involves monitoring and capturing the execution of textual commands (including shell commands, cmdlets, and scripts) within an operating system or application. These commands may include arguments or parameters and are typically executed through interpreters such as `cmd.exe`, `bash`, `zsh`, `PowerShell`, or programmatic execution. Examples: + +- Windows Command Prompt + - dir – Lists directory contents. + - net user – Queries or manipulates user accounts. + - tasklist – Lists running processes. +- PowerShell + - Get-Process – Retrieves processes running on a system. + - Set-ExecutionPolicy – Changes PowerShell script execution policies. + - Invoke-WebRequest – Downloads remote resources. +- Linux Shell + - ls – Lists files in a directory. + - cat /etc/passwd – Reads the user accounts file. + - curl http://malicious-site.com – Retrieves content from a malicious URL. +- Container Environments + - docker exec – Executes a command inside a running container. + - kubectl exec – Runs commands in Kubernetes pods. +- macOS Terminal + - open – Opens files or URLs. + - dscl . -list /Users – Lists all users on the system. + - osascript -e – Executes AppleScript commands.
x_mitre_log_sources[4]['channel']/var/log/syslog or journalctlcron activity
x_mitre_log_sources[10]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106
x_mitre_log_sources[35]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106
x_mitre_log_sources[226]['name']azure:signinLogsazure:signinlogs
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Powershell', 'channel': 'EventCode=4104'}
x_mitre_log_sources{'name': 'WinEventLog:PowerShell', 'channel': 'EventCode=4103,4104'}
x_mitre_log_sources{'name': 'WinEventLog:PowerShell', 'channel': 'EventCode=4103'}
x_mitre_log_sources{'name': 'WinEventLog:PowerShell', 'channel': 'EventCode=4103,4104,4105, 4106'}
x_mitre_log_sources{'name': 'WinEventLog:PowerShell', 'channel': 'EventCode=4105'}
x_mitre_log_sources{'name': 'WinEventLog:PowerShell', 'channel': 'EventCode=4106'}
x_mitre_log_sources{'name': 'WinEventLog:PowerShell', 'channel': 'EventCode=4103, 4104'}

[DC0018] Host Status

Current version: 2.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:37.544000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_sources[13]['name']CloudWatch:MetricsAWS:CloudWatch
x_mitre_log_sources[17]['name']CloudWatch:InstanceMetricsAWS:CloudWatch
x_mitre_log_sources[30]['name']CloudMetrics:InstanceHealthAWS:CloudMetrics

[DC0082] Network Connection Creation

Current version: 2.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:34.190000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_sources[19]['channel']EventCode=22EventCode=3, 22
x_mitre_log_sources[27]['channel']EventCode=5156EventCode=5156, 5157
x_mitre_log_sources[90]['channel']8001, 8002, 8003EventCode=8001, 8002, 8003
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Sysmon', 'channel': 'EventCode=3'}
x_mitre_log_sources{'name': 'WinEventLog:Sysmon', 'channel': 'EventCode=22'}
x_mitre_log_sources{'name': 'auditd:SYSCALL', 'channel': 'netconnect'}
x_mitre_log_sources{'name': 'auditd:SYSCALL', 'channel': 'open or connect'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=5156,5157'}
x_mitre_log_sources{'name': 'linux:Sysmon', 'channel': 'EventCode=3'}

[DC0078] Network Traffic Flow

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Summarized network packet data that captures session-level dt1Summarized network packet data that captures session-level d
>etails such as source/destination IPs, ports, protocol types>etails such as source/destination IPs, ports, protocol types
>, timestamps, and data volume, without storing full packet p>, timestamps, and data volume, without storing full packet p
>ayloads. This is commonly used for traffic analysis, anomaly>ayloads. This is commonly used for traffic analysis, anomaly
> detection, and network performance monitoring.  *Data Colle> detection, and network performance monitoring.
>ction Measures:*  - Network Flow Logs (Metadata Collection)  
>    - NetFlow          - Summarized metadata for network con 
>versations (no packet payloads).     - sFlow (Sampled Flow L 
>ogging)         - Captures sampled packets from switches and 
> routers.         - Used for real-time traffic monitoring an 
>d anomaly detection.     - Zeek (Bro) Flow Logs         - Ze 
>ek logs session-level details in logs like conn.log, http.lo 
>g, dns.log, etc. - Host-Based Collection     - Sysmon Event  
>ID 3 – Network Connection Initiated         - Logs process-l 
>evel network activity, useful for detecting malicious outbou 
>nd connections.     - AuditD (Linux) – syscall=connect       
>   - Monitors system calls for network connections. `auditct 
>l -a always,exit -F arch=b64 -S connect -k network_activity` 
> - Cloud & SaaS Flow Monitoring     - AWS VPC Flow Logs      
>    - Captures metadata for traffic between EC2 instances, s 
>ecurity groups, and internet gateways.     - Azure NSG Flow  
>Logs / Google VPC Flow Logs         - Logs ingress/egress tr 
>affic for cloud-based resources. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:34.703000+00:002025-11-12 22:03:39.105000+00:00
descriptionSummarized network packet data that captures session-level details such as source/destination IPs, ports, protocol types, timestamps, and data volume, without storing full packet payloads. This is commonly used for traffic analysis, anomaly detection, and network performance monitoring. + +*Data Collection Measures:* + +- Network Flow Logs (Metadata Collection) + - NetFlow + - Summarized metadata for network conversations (no packet payloads). + - sFlow (Sampled Flow Logging) + - Captures sampled packets from switches and routers. + - Used for real-time traffic monitoring and anomaly detection. + - Zeek (Bro) Flow Logs + - Zeek logs session-level details in logs like conn.log, http.log, dns.log, etc. +- Host-Based Collection + - Sysmon Event ID 3 – Network Connection Initiated + - Logs process-level network activity, useful for detecting malicious outbound connections. + - AuditD (Linux) – syscall=connect + - Monitors system calls for network connections. `auditctl -a always,exit -F arch=b64 -S connect -k network_activity` +- Cloud & SaaS Flow Monitoring + - AWS VPC Flow Logs + - Captures metadata for traffic between EC2 instances, security groups, and internet gateways. + - Azure NSG Flow Logs / Google VPC Flow Logs + - Logs ingress/egress traffic for cloud-based resources.Summarized network packet data that captures session-level details such as source/destination IPs, ports, protocol types, timestamps, and data volume, without storing full packet payloads. This is commonly used for traffic analysis, anomaly detection, and network performance monitoring.
x_mitre_log_sources[72]['channel']EventCode=2004,2005,2006EventCode=2004, 2005, 2006

[DC0021] OS API Execution

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Calls made by a process to operating system-provided Applicat1Calls made by a process to operating system-provided Applica
>tion Programming Interfaces (APIs). These calls are essentia>tion Programming Interfaces (APIs). These calls are essentia
>l for interacting with system resources such as memory, file>l for interacting with system resources such as memory, file
>s, and hardware, or for performing system-level tasks. Monit>s, and hardware, or for performing system-level tasks. Monit
>oring these calls can provide insight into a process's inten>oring these calls can provide insight into a process's inten
>t, especially if the process is malicious.  *Data Collection>t, especially if the process is malicious.
> Measures:*  - Endpoint Detection and Response (EDR) Tools:  
>    - Leverage tools to monitor API execution behaviors at t 
>he process level.     - Example: Sysmon Event ID 10 captures 
> API call traces for process access and memory allocation. - 
> Process Monitor (ProcMon):     - Use ProcMon to collect det 
>ailed logs of process and API activity. ProcMon can provide  
>granular details on API usage and identify malicious behavio 
>r during analysis. - Windows Event Logs:     - Use Event IDs 
> from Windows logs for specific API-related activities:      
>    - Event ID 4688: A new process has been created (can ind 
>irectly infer API use).         - Event ID 4657: A registry  
>value has been modified (to monitor registry-altering APIs). 
> - Dynamic Analysis Tools:     - Tools like Cuckoo Sandbox,  
>Flare VM, or Hybrid Analysis monitor API execution during ma 
>lware detonation. - Host-Based Logs:     - On Linux/macOS sy 
>stems, leverage audit frameworks (e.g., `auditd`, `strace`)  
>to capture and analyze system call usage that APIs map to. - 
> Runtime Monitors:     - Runtime security tools like Falco c 
>an monitor system-level calls for API execution. - Debugging 
> and Tracing:     - Use debugging tools like gdb (Linux) or  
>WinDbg (Windows) for deep tracing of API executions in real  
>time. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:36.999000+00:002025-11-12 22:03:39.105000+00:00
descriptionCalls made by a process to operating system-provided Application Programming Interfaces (APIs). These calls are essential for interacting with system resources such as memory, files, and hardware, or for performing system-level tasks. Monitoring these calls can provide insight into a process's intent, especially if the process is malicious. + +*Data Collection Measures:* + +- Endpoint Detection and Response (EDR) Tools: + - Leverage tools to monitor API execution behaviors at the process level. + - Example: Sysmon Event ID 10 captures API call traces for process access and memory allocation. +- Process Monitor (ProcMon): + - Use ProcMon to collect detailed logs of process and API activity. ProcMon can provide granular details on API usage and identify malicious behavior during analysis. +- Windows Event Logs: + - Use Event IDs from Windows logs for specific API-related activities: + - Event ID 4688: A new process has been created (can indirectly infer API use). + - Event ID 4657: A registry value has been modified (to monitor registry-altering APIs). +- Dynamic Analysis Tools: + - Tools like Cuckoo Sandbox, Flare VM, or Hybrid Analysis monitor API execution during malware detonation. +- Host-Based Logs: + - On Linux/macOS systems, leverage audit frameworks (e.g., `auditd`, `strace`) to capture and analyze system call usage that APIs map to. +- Runtime Monitors: + - Runtime security tools like Falco can monitor system-level calls for API execution. +- Debugging and Tracing: + - Use debugging tools like gdb (Linux) or WinDbg (Windows) for deep tracing of API executions in real time.Calls made by a process to operating system-provided Application Programming Interfaces (APIs). These calls are essential for interacting with system resources such as memory, files, and hardware, or for performing system-level tasks. Monitoring these calls can provide insight into a process's intent, especially if the process is malicious.
x_mitre_log_sources[19]['channel']EventCode=4656EventCode=4663, 4670, 4656

[DC0032] Process Creation

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Refers to the event in which a new process (executable) is it1Refers to the event in which a new process (executable) is i
>nitialized by an operating system. This can involve parent-c>nitialized by an operating system. This can involve parent-c
>hild process relationships, process arguments, and environme>hild process relationships, process arguments, and environme
>ntal variables. Monitoring process creation is crucial for d>ntal variables. Monitoring process creation is crucial for d
>etecting malicious behaviors, such as execution of unauthori>etecting malicious behaviors, such as execution of unauthori
>zed binaries, scripting abuse, or privilege escalation attem>zed binaries, scripting abuse, or privilege escalation attem
>pts.  *Data Collection Measures:*  - Endpoint Detection and >pts.. 
>Response (EDR) Tools:     - EDRs provide process telemetry,  
>tracking execution flows and arguments. - Windows Event Logs 
>:     - Event ID 4688 (Audit Process Creation): Captures pro 
>cess creation with associated parent process. - Sysmon (Wind 
>ows):     - Event ID 1 (Process Creation): Provides detailed 
> logging - Linux/macOS Monitoring:     - AuditD (execve sysc 
>all): Logs process creation.     - eBPF/XDP: Used for low-le 
>vel monitoring of system calls related to process execution. 
>     - OSQuery: Allows SQL-like queries to track process eve 
>nts (process_events table).     - Apple Endpoint Security Fr 
>amework (ESF): Monitors process creation on macOS. - Network 
>-Based Monitoring:     - Zeek (Bro) Logs: Captures network-b 
>ased process execution related to remote shells.     - Syslo 
>g/OSSEC: Tracks execution of processes on distributed system 
>s. - Behavioral SIEM Rules:     - Monitor process creation f 
>or uncommon binaries in user directories.     - Detect proce 
>sses with suspicious command-line arguments.  
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 19:28:39.339000+00:002025-11-12 22:03:39.105000+00:00
external_references[0]['url']https://attack.mitre.org/data-components/DC0032https://attack.mitre.org/datacomponents/DC0032
descriptionRefers to the event in which a new process (executable) is initialized by an operating system. This can involve parent-child process relationships, process arguments, and environmental variables. Monitoring process creation is crucial for detecting malicious behaviors, such as execution of unauthorized binaries, scripting abuse, or privilege escalation attempts. + +*Data Collection Measures:* + +- Endpoint Detection and Response (EDR) Tools: + - EDRs provide process telemetry, tracking execution flows and arguments. +- Windows Event Logs: + - Event ID 4688 (Audit Process Creation): Captures process creation with associated parent process. +- Sysmon (Windows): + - Event ID 1 (Process Creation): Provides detailed logging +- Linux/macOS Monitoring: + - AuditD (execve syscall): Logs process creation. + - eBPF/XDP: Used for low-level monitoring of system calls related to process execution. + - OSQuery: Allows SQL-like queries to track process events (process_events table). + - Apple Endpoint Security Framework (ESF): Monitors process creation on macOS. +- Network-Based Monitoring: + - Zeek (Bro) Logs: Captures network-based process execution related to remote shells. + - Syslog/OSSEC: Tracks execution of processes on distributed systems. +- Behavioral SIEM Rules: + - Monitor process creation for uncommon binaries in user directories. + - Detect processes with suspicious command-line arguments. Refers to the event in which a new process (executable) is initialized by an operating system. This can involve parent-child process relationships, process arguments, and environmental variables. Monitoring process creation is crucial for detecting malicious behaviors, such as execution of unauthorized binaries, scripting abuse, or privilege escalation attempts..
x_mitre_log_sources[293]['channel']EventCode=8003,8004EventCode=8003, 8004
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventlog:Security', 'channel': 'EventCode=4688'}
x_mitre_log_sources{'name': 'WinEventLog:Microsoft-Windows-Security-Auditing', 'channel': 'EventCode=4688'}
x_mitre_log_sources{'name': 'WinEventLog:security', 'channel': 'EventCode=4688'}

[DC0034] Process Metadata

Current version: 2.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:35.331000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_sources[36]['channel']EventCode=400,403EventCode=400, 403

[DC0033] Process Termination

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1The exit or termination of a running process on a system. Tht1The exit or termination of a running process on a system. Th
>is can occur due to normal operations, user-initiated comman>is can occur due to normal operations, user-initiated comman
>ds, or malicious actions such as process termination by malw>ds, or malicious actions such as process termination by malw
>are to disable security controls.  *Data Collection Measures>are to disable security controls.
>:*  - Endpoint Detection and Response (EDR) Tools:     - Mon 
>itor process termination events. - Windows Event Logs:     - 
> Event ID 4689 (Process Termination) – Captures when a proce 
>ss exits, including process ID and parent process.     - Eve 
>nt ID 7036 (Service Control Manager) – Monitors system servi 
>ce stops. - Sysmon (Windows):     - Event ID 5 (Process Term 
>ination) – Detects when a process exits, including parent-ch 
>ild relationships. - Linux/macOS Monitoring:     - AuditD (` 
>execve`, `exit_group`, `kill` syscalls) – Captures process t 
>ermination via command-line interactions.     - eBPF/XDP: Mo 
>nitors low-level system calls related to process termination 
>.     - OSQuery: The processes table can be queried for abno 
>rmal exits. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:36.181000+00:002025-11-12 22:03:39.105000+00:00
descriptionThe exit or termination of a running process on a system. This can occur due to normal operations, user-initiated commands, or malicious actions such as process termination by malware to disable security controls. + +*Data Collection Measures:* + +- Endpoint Detection and Response (EDR) Tools: + - Monitor process termination events. +- Windows Event Logs: + - Event ID 4689 (Process Termination) – Captures when a process exits, including process ID and parent process. + - Event ID 7036 (Service Control Manager) – Monitors system service stops. +- Sysmon (Windows): + - Event ID 5 (Process Termination) – Detects when a process exits, including parent-child relationships. +- Linux/macOS Monitoring: + - AuditD (`execve`, `exit_group`, `kill` syscalls) – Captures process termination via command-line interactions. + - eBPF/XDP: Monitors low-level system calls related to process termination. + - OSQuery: The processes table can be queried for abnormal exits.The exit or termination of a running process on a system. This can occur due to normal operations, user-initiated commands, or malicious actions such as process termination by malware to disable security controls.

ics-attack

Patches

[DC0038] Application Log Content

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Application Log Content refers to logs generated by applicatt1Application Log Content refers to logs generated by applicat
>ions or services, providing a record of their activity. Thes>ions or services, providing a record of their activity. Thes
>e logs may include metrics, errors, performance data, and op>e logs may include metrics, errors, performance data, and op
>erational alerts from web, mail, or other applications. Thes>erational alerts from web, mail, or other applications. Thes
>e logs are vital for monitoring application behavior and det>e logs are vital for monitoring application behavior and det
>ecting malicious activities or anomalies. Examples:   - Web >ecting malicious activities or anomalies. Examples:   - Web 
>Application Logs: These logs include information about reque>Application Logs: These logs include information about reque
>sts, responses, errors, and security events (e.g., unauthori>sts, responses, errors, and security events (e.g., unauthori
>zed access attempts). - Email Application Logs: Logs contain>zed access attempts). - Email Application Logs: Logs contain
> metadata about emails sent, received, or blocked (e.g., sen> metadata about emails sent, received, or blocked (e.g., sen
>der/receiver addresses, message IDs). - SaaS Application Log>der/receiver addresses, message IDs). - SaaS Application Log
>s: Activity logs include user logins, configuration changes,>s: Activity logs include user logins, configuration changes,
> and access to sensitive resources. - Cloud Application Logs> and access to sensitive resources. - Cloud Application Logs
>: Logs detail control plane activities, including API calls,>: Logs detail control plane activities, including API calls,
> instance modifications, and network changes. - System/Appli> instance modifications, and network changes. - System/Appli
>cation Monitoring Logs: Logs provide insights into applicati>cation Monitoring Logs: Logs provide insights into applicati
>on performance, errors, and anomalies.  This data component >on performance, errors, and anomalies.
>can be collected through the following measures:  Configure  
>Application Logging  - Enable logging within the application 
> or service. - Examples:     - Web Servers: Enable access an 
>d error logs in NGINX or Apache.     - Email Systems: Enable 
> audit logging in Microsoft Exchange or Gmail.  Centralized  
>Log Management  - Use log management solutions like Splunk,  
>or a cloud-native logging solution. - Configure the applicat 
>ion to send logs to a centralized system for analysis.  Clou 
>d-Specific Collection  - Use services like AWS CloudWatch, A 
>zure Monitor, or Google Cloud Operations Suite for cloud-bas 
>ed applications. - Ensure logging is enabled for all critica 
>l resources (e.g., API calls, IAM changes).  SIEM Integratio 
>n  - Integrate application logs with a SIEM platform (e.g.,  
>Splunk, QRadar) for real-time correlation and analysis. - Us 
>e parsers to standardize log formats and extract key fields  
>like timestamps, user IDs, and error codes. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:36.580000+00:002025-11-12 22:03:39.105000+00:00
descriptionApplication Log Content refers to logs generated by applications or services, providing a record of their activity. These logs may include metrics, errors, performance data, and operational alerts from web, mail, or other applications. These logs are vital for monitoring application behavior and detecting malicious activities or anomalies. Examples: + +- Web Application Logs: These logs include information about requests, responses, errors, and security events (e.g., unauthorized access attempts). +- Email Application Logs: Logs contain metadata about emails sent, received, or blocked (e.g., sender/receiver addresses, message IDs). +- SaaS Application Logs: Activity logs include user logins, configuration changes, and access to sensitive resources. +- Cloud Application Logs: Logs detail control plane activities, including API calls, instance modifications, and network changes. +- System/Application Monitoring Logs: Logs provide insights into application performance, errors, and anomalies. + +This data component can be collected through the following measures: + +Configure Application Logging + +- Enable logging within the application or service. +- Examples: + - Web Servers: Enable access and error logs in NGINX or Apache. + - Email Systems: Enable audit logging in Microsoft Exchange or Gmail. + +Centralized Log Management + +- Use log management solutions like Splunk, or a cloud-native logging solution. +- Configure the application to send logs to a centralized system for analysis. + +Cloud-Specific Collection + +- Use services like AWS CloudWatch, Azure Monitor, or Google Cloud Operations Suite for cloud-based applications. +- Ensure logging is enabled for all critical resources (e.g., API calls, IAM changes). + +SIEM Integration + +- Integrate application logs with a SIEM platform (e.g., Splunk, QRadar) for real-time correlation and analysis. +- Use parsers to standardize log formats and extract key fields like timestamps, user IDs, and error codes.Application Log Content refers to logs generated by applications or services, providing a record of their activity. These logs may include metrics, errors, performance data, and operational alerts from web, mail, or other applications. These logs are vital for monitoring application behavior and detecting malicious activities or anomalies. Examples: + +- Web Application Logs: These logs include information about requests, responses, errors, and security events (e.g., unauthorized access attempts). +- Email Application Logs: Logs contain metadata about emails sent, received, or blocked (e.g., sender/receiver addresses, message IDs). +- SaaS Application Logs: Activity logs include user logins, configuration changes, and access to sensitive resources. +- Cloud Application Logs: Logs detail control plane activities, including API calls, instance modifications, and network changes. +- System/Application Monitoring Logs: Logs provide insights into application performance, errors, and anomalies.
x_mitre_log_sources[17]['name']WinEventLog:Microsoft-Windows-DriverFrameworks-UserMode/OperationalWinEventLog:System
x_mitre_log_sources[37]['name']azure:signinLogsazure:signinlogs
x_mitre_log_sources[75]['name']WinEventLog:ApplicationWinEventLog:System
x_mitre_log_sources[75]['channel']EventCode=1000-1026EventCode=1000
x_mitre_log_sources[44]['channel']EventCode=7031,7034,1000,1001EventCode=1341, 1342, 1020, 1063
x_mitre_log_sources[172]['channel']EventCode=4663EventCode=4663, 4670, 4656
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Application', 'channel': 'EventCode=1000, 1001, 1002'}
x_mitre_log_sources{'name': 'WinEventLog:System', 'channel': 'EventCode=1341,1342,1020,1063'}
x_mitre_log_sources{'name': 'WinEventLog:Application', 'channel': 'EventCode=1000,1001'}

[DC0064] Command Execution

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Command Execution involves monitoring and capturing the exect1Command Execution involves monitoring and capturing the exec
>ution of textual commands (including shell commands, cmdlets>ution of textual commands (including shell commands, cmdlets
>, and scripts) within an operating system or application. Th>, and scripts) within an operating system or application. Th
>ese commands may include arguments or parameters and are typ>ese commands may include arguments or parameters and are typ
>ically executed through interpreters such as `cmd.exe`, `bas>ically executed through interpreters such as `cmd.exe`, `bas
>h`, `zsh`, `PowerShell`, or programmatic execution. Examples>h`, `zsh`, `PowerShell`, or programmatic execution. Examples
>:   - Windows Command Prompt     - dir – Lists directory con>:   - Windows Command Prompt     - dir – Lists directory con
>tents.     - net user – Queries or manipulates user accounts>tents.     - net user – Queries or manipulates user accounts
>.     - tasklist – Lists running processes. - PowerShell    >.     - tasklist – Lists running processes. - PowerShell    
> - Get-Process – Retrieves processes running on a system.   > - Get-Process – Retrieves processes running on a system.   
>  - Set-ExecutionPolicy – Changes PowerShell script executio>  - Set-ExecutionPolicy – Changes PowerShell script executio
>n policies.     - Invoke-WebRequest – Downloads remote resou>n policies.     - Invoke-WebRequest – Downloads remote resou
>rces. - Linux Shell     - ls – Lists files in a directory.  >rces. - Linux Shell     - ls – Lists files in a directory.  
>   - cat /etc/passwd – Reads the user accounts file.     - c>   - cat /etc/passwd – Reads the user accounts file.     - c
>url http://malicious-site.com – Retrieves content from a mal>url http://malicious-site.com – Retrieves content from a mal
>icious URL. - Container Environments     - docker exec – Exe>icious URL. - Container Environments     - docker exec – Exe
>cutes a command inside a running container.     - kubectl ex>cutes a command inside a running container.     - kubectl ex
>ec – Runs commands in Kubernetes pods. - macOS Terminal     >ec – Runs commands in Kubernetes pods. - macOS Terminal     
>- open – Opens files or URLs.     - dscl . -list /Users – Li>- open – Opens files or URLs.     - dscl . -list /Users – Li
>sts all users on the system.     - osascript -e – Executes A>sts all users on the system.     - osascript -e – Executes A
>ppleScript commands.  This data component can be collected t>ppleScript commands.
>hrough the following measures:  Enable Command Logging  - Wi 
>ndows:     - Enable PowerShell logging: `Set-ExecutionPolicy 
> Bypass`, `Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\M 
>icrosoft\Windows\PowerShell\ScriptBlockLogging" -Name Enable 
>ScriptBlockLogging -Value 1`     - Enable Windows Event Logg 
>ing:         - Event ID 4688: Tracks process creation, inclu 
>ding command-line arguments.         - Event ID 4104: Logs P 
>owerShell script block execution. - Linux/macOS:     - Enabl 
>e shell history logging in `.bashrc` or `.zshrc`: `export HI 
>STTIMEFORMAT="%d/%m/%y %T "`, `export PROMPT_COMMAND='histor 
>y -a; history -w'`     - Use audit frameworks (e.g., `auditd 
>`) to log command executions. Example rule to log all `execv 
>e` syscalls: `-a always,exit -F arch=b64 -S execve -k cmd_ex 
>ec` - Containers:     - Use runtime-specific tools like Dock 
>er’s --log-driver or Kubernetes Audit Logs to capture exec c 
>ommands.  Integrate with Centralized Logging  - Collect logs 
> using a SIEM (e.g., Splunk) or cloud-based log aggregation  
>tools like AWS CloudWatch or Azure Monitor. Example Splunk S 
>earch for Windows Event 4688: `index=windows EventID=4688 Co 
>mmandLine=*`  Use Endpoint Detection and Response (EDR) Tool 
>s  - Monitor command executions via EDR solutions   Deploy S 
>ysmon for Advanced Logging (Windows)  - Use Sysmon's Event I 
>D 1 to log process creation with command-line arguments 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:34.849000+00:002025-11-12 22:03:39.105000+00:00
descriptionCommand Execution involves monitoring and capturing the execution of textual commands (including shell commands, cmdlets, and scripts) within an operating system or application. These commands may include arguments or parameters and are typically executed through interpreters such as `cmd.exe`, `bash`, `zsh`, `PowerShell`, or programmatic execution. Examples: + +- Windows Command Prompt + - dir – Lists directory contents. + - net user – Queries or manipulates user accounts. + - tasklist – Lists running processes. +- PowerShell + - Get-Process – Retrieves processes running on a system. + - Set-ExecutionPolicy – Changes PowerShell script execution policies. + - Invoke-WebRequest – Downloads remote resources. +- Linux Shell + - ls – Lists files in a directory. + - cat /etc/passwd – Reads the user accounts file. + - curl http://malicious-site.com – Retrieves content from a malicious URL. +- Container Environments + - docker exec – Executes a command inside a running container. + - kubectl exec – Runs commands in Kubernetes pods. +- macOS Terminal + - open – Opens files or URLs. + - dscl . -list /Users – Lists all users on the system. + - osascript -e – Executes AppleScript commands. + +This data component can be collected through the following measures: + +Enable Command Logging + +- Windows: + - Enable PowerShell logging: `Set-ExecutionPolicy Bypass`, `Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging" -Name EnableScriptBlockLogging -Value 1` + - Enable Windows Event Logging: + - Event ID 4688: Tracks process creation, including command-line arguments. + - Event ID 4104: Logs PowerShell script block execution. +- Linux/macOS: + - Enable shell history logging in `.bashrc` or `.zshrc`: `export HISTTIMEFORMAT="%d/%m/%y %T "`, `export PROMPT_COMMAND='history -a; history -w'` + - Use audit frameworks (e.g., `auditd`) to log command executions. Example rule to log all `execve` syscalls: `-a always,exit -F arch=b64 -S execve -k cmd_exec` +- Containers: + - Use runtime-specific tools like Docker’s --log-driver or Kubernetes Audit Logs to capture exec commands. + +Integrate with Centralized Logging + +- Collect logs using a SIEM (e.g., Splunk) or cloud-based log aggregation tools like AWS CloudWatch or Azure Monitor. Example Splunk Search for Windows Event 4688: +`index=windows EventID=4688 CommandLine=*` + +Use Endpoint Detection and Response (EDR) Tools + +- Monitor command executions via EDR solutions + +Deploy Sysmon for Advanced Logging (Windows) + +- Use Sysmon's Event ID 1 to log process creation with command-line argumentsCommand Execution involves monitoring and capturing the execution of textual commands (including shell commands, cmdlets, and scripts) within an operating system or application. These commands may include arguments or parameters and are typically executed through interpreters such as `cmd.exe`, `bash`, `zsh`, `PowerShell`, or programmatic execution. Examples: + +- Windows Command Prompt + - dir – Lists directory contents. + - net user – Queries or manipulates user accounts. + - tasklist – Lists running processes. +- PowerShell + - Get-Process – Retrieves processes running on a system. + - Set-ExecutionPolicy – Changes PowerShell script execution policies. + - Invoke-WebRequest – Downloads remote resources. +- Linux Shell + - ls – Lists files in a directory. + - cat /etc/passwd – Reads the user accounts file. + - curl http://malicious-site.com – Retrieves content from a malicious URL. +- Container Environments + - docker exec – Executes a command inside a running container. + - kubectl exec – Runs commands in Kubernetes pods. +- macOS Terminal + - open – Opens files or URLs. + - dscl . -list /Users – Lists all users on the system. + - osascript -e – Executes AppleScript commands.
x_mitre_log_sources[4]['channel']/var/log/syslog or journalctlcron activity
x_mitre_log_sources[10]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106
x_mitre_log_sources[35]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106
x_mitre_log_sources[226]['name']azure:signinLogsazure:signinlogs
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Powershell', 'channel': 'EventCode=4104'}
x_mitre_log_sources{'name': 'WinEventLog:PowerShell', 'channel': 'EventCode=4103,4104'}
x_mitre_log_sources{'name': 'WinEventLog:PowerShell', 'channel': 'EventCode=4103'}
x_mitre_log_sources{'name': 'WinEventLog:PowerShell', 'channel': 'EventCode=4103,4104,4105, 4106'}
x_mitre_log_sources{'name': 'WinEventLog:PowerShell', 'channel': 'EventCode=4105'}
x_mitre_log_sources{'name': 'WinEventLog:PowerShell', 'channel': 'EventCode=4106'}
x_mitre_log_sources{'name': 'WinEventLog:PowerShell', 'channel': 'EventCode=4103, 4104'}

[DC0042] Drive Creation

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1The activity of assigning a new drive letter or creating a mt1The activity of assigning a new drive letter or creating a m
>ount point for a data storage device, such as a USB, network>ount point for a data storage device, such as a USB, network
> share, or external hard drive, enabling access to its conte> share, or external hard drive, enabling access to its conte
>nt on a host system. Examples:   - USB Drive Insertion: A US>nt on a host system. Examples:   - USB Drive Insertion: A US
>B drive is plugged in and automatically assigned the letter >B drive is plugged in and automatically assigned the letter 
>`E:\` on a Windows machine. - Network Drive Mapping: A netwo>`E:\` on a Windows machine. - Network Drive Mapping: A netwo
>rk share `\\server\share` is mapped to the drive `Z:\`. - Vi>rk share `\\server\share` is mapped to the drive `Z:\`. - Vi
>rtual Drive Creation: A virtual disk is mounted on `/mnt/vir>rtual Drive Creation: A virtual disk is mounted on `/mnt/vir
>tualdrive` using an ISO image or a virtual hard disk (VHD). >tualdrive` using an ISO image or a virtual hard disk (VHD). 
>- Cloud Storage Mounting: Google Drive is mounted as `G:\` o>- Cloud Storage Mounting: Google Drive is mounted as `G:\` o
>n a Windows machine using a cloud sync tool. - External Stor>n a Windows machine using a cloud sync tool. - External Stor
>age Integration: An external HDD or SSD is connected and ass>age Integration: An external HDD or SSD is connected and ass
>igned `/mnt/external` on a Linux system.  This data componen>igned `/mnt/external` on a Linux system..
>t can be collected through the following measures:  Windows  
>Event Logs  - Relevant Events:     - Event ID 98: Logs the c 
>reation of a volume (mount or new drive letter assignment).  
>    - Event ID 1006: Logs removable storage device insertion 
>s. - Configuration: Enable "Removable Storage Events" in the 
> Group Policy settings: `Computer Configuration > Administra 
>tive Templates > System > Removable Storage Access`  Linux S 
>ystem Logs  - Command-Line Monitoring: Use `dmesg` or `journ 
>alctl` to monitor mount events.  - Auditd Configuration: Add 
> audit rules to track mount points. - Logs can be reviewed i 
>n /var/log/audit/audit.log.  macOS System Logs  - Unified Lo 
>gs: Monitor system logs for mount activity: - Command-Line T 
>ools: Use `diskutil list` to verify newly created or mounted 
> drives.  Endpoint Detection and Response (EDR) Tools  - EDR 
> solutions can log removable drive usage and network-mounted 
> drives. Configure EDR policies to alert on suspicious drive 
> creation events.  SIEM Tools  - Centralize logs from multip 
>le platforms into a SIEM (e.g., Splunk) to correlate and ale 
>rt on suspicious drive creation activities. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:37.342000+00:002025-11-12 22:03:39.105000+00:00
descriptionThe activity of assigning a new drive letter or creating a mount point for a data storage device, such as a USB, network share, or external hard drive, enabling access to its content on a host system. Examples: + +- USB Drive Insertion: A USB drive is plugged in and automatically assigned the letter `E:\` on a Windows machine. +- Network Drive Mapping: A network share `\\server\share` is mapped to the drive `Z:\`. +- Virtual Drive Creation: A virtual disk is mounted on `/mnt/virtualdrive` using an ISO image or a virtual hard disk (VHD). +- Cloud Storage Mounting: Google Drive is mounted as `G:\` on a Windows machine using a cloud sync tool. +- External Storage Integration: An external HDD or SSD is connected and assigned `/mnt/external` on a Linux system. + +This data component can be collected through the following measures: + +Windows Event Logs + +- Relevant Events: + - Event ID 98: Logs the creation of a volume (mount or new drive letter assignment). + - Event ID 1006: Logs removable storage device insertions. +- Configuration: Enable "Removable Storage Events" in the Group Policy settings: +`Computer Configuration > Administrative Templates > System > Removable Storage Access` + +Linux System Logs + +- Command-Line Monitoring: Use `dmesg` or `journalctl` to monitor mount events. + +- Auditd Configuration: Add audit rules to track mount points. +- Logs can be reviewed in /var/log/audit/audit.log. + +macOS System Logs + +- Unified Logs: Monitor system logs for mount activity: +- Command-Line Tools: Use `diskutil list` to verify newly created or mounted drives. + +Endpoint Detection and Response (EDR) Tools + +- EDR solutions can log removable drive usage and network-mounted drives. Configure EDR policies to alert on suspicious drive creation events. + +SIEM Tools + +- Centralize logs from multiple platforms into a SIEM (e.g., Splunk) to correlate and alert on suspicious drive creation activities.The activity of assigning a new drive letter or creating a mount point for a data storage device, such as a USB, network share, or external hard drive, enabling access to its content on a host system. Examples: + +- USB Drive Insertion: A USB drive is plugged in and automatically assigned the letter `E:\` on a Windows machine. +- Network Drive Mapping: A network share `\\server\share` is mapped to the drive `Z:\`. +- Virtual Drive Creation: A virtual disk is mounted on `/mnt/virtualdrive` using an ISO image or a virtual hard disk (VHD). +- Cloud Storage Mounting: Google Drive is mounted as `G:\` on a Windows machine using a cloud sync tool. +- External Storage Integration: An external HDD or SSD is connected and assigned `/mnt/external` on a Linux system..
x_mitre_log_sources[4]['name']WinEventLog:Microsoft-Windows-Partition/DiagnosticWinEventLog:System
x_mitre_log_sources[7]['channel']EventCode=1006,10001EventCode=1006, 10001
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Microsoft-Windows-DriverFrameworks-UserMode/Operational', 'channel': 'EventCode=2003'}
x_mitre_log_sources{'name': 'WinEventLog:System', 'channel': 'EventCode=20001/20003'}
x_mitre_log_sources{'name': 'WinEventLog:System', 'channel': '20001-20003'}

[DC0046] Drive Modification

Current version: 2.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-22 19:03:17.198000+00:002025-11-12 22:03:39.105000+00:00
external_references[0]['url']https://attack.mitre.org/data-components/DC0046https://attack.mitre.org/datacomponents/DC0046

[DC0055] File Access

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1To events where a file is opened or accessed, making its cont1To events where a file is opened or accessed, making its con
>tents available to the requester. This includes reading, exe>tents available to the requester. This includes reading, exe
>cuting, or interacting with files by authorized or unauthori>cuting, or interacting with files by authorized or unauthori
>zed entities. Examples include logging file access events (e>zed entities. Examples include logging file access events (e
>.g., Windows Event ID 4663), monitoring file reads, and dete>.g., Windows Event ID 4663), monitoring file reads, and dete
>cting unusual file access patterns. Examples:   - File Read >cting unusual file access patterns. Examples:   - File Read 
>Operations: A user opens a sensitive document (e.g., financi>Operations: A user opens a sensitive document (e.g., financi
>al_report.xlsx) on a shared drive. - File Execution: A scrip>al_report.xlsx) on a shared drive. - File Execution: A scrip
>t or executable file is accessed and executed (e.g., malware>t or executable file is accessed and executed (e.g., malware
>.exe is run from a temporary directory). - Unauthorized File>.exe is run from a temporary directory). - Unauthorized File
> Access: An unauthorized user attempts to access a protected> Access: An unauthorized user attempts to access a protected
> configuration file (e.g., `/etc/passwd` on Linux or `System> configuration file (e.g., `/etc/passwd` on Linux or `System
>32` files on Windows). - File Access Patterns: Bulk access t>32` files on Windows). - File Access Patterns: Bulk access t
>o multiple files in a short time (e.g., mass access to docum>o multiple files in a short time (e.g., mass access to docum
>ents on a file server). - File Access via Network: Files on >ents on a file server). - File Access via Network: Files on 
>a network share are accessed remotely (e.g., logs of SMB fil>a network share are accessed remotely (e.g., logs of SMB fil
>e access).  This data component can be collected through the>e access).
> following measures:  Windows  - Windows Event Logs: Event I 
>D 4663: Captures file system auditing details, including who 
> accessed the file, access type, and file name. - Sysmon:    
>  - Event ID 11: Logs file creation time changes.     - Even 
>t ID 1 (process creation): Can provide insight into files ex 
>ecuted. - PowerShell: Commands to monitor file access in rea 
>l-time: `Get-WinEvent -FilterHashtable @{LogName='Security'; 
> ID=4663}`  Linux  - Auditd: Monitor file access events usin 
>g audit rules: `auditctl -w /path/to/file -p rwxa -k file_ac 
>cess` - View logs: `ausearch -k file_access` - Inotify: Use  
>inotify to track file access on Linux: `inotifywait -m /path 
>/to/watch -e access`  macOS  - Unified Logs: Monitor file ac 
>cess using the macOS Unified Logging System. - FSEvents: Fil 
>e System Events can track file accesses: `fs_usage | grep op 
>en`  Network Devices  - SMB/CIFS Logs: Monitor file access o 
>ver network shares using logs from SMB or CIFS protocol. - N 
>AS Logs: Collect logs from network-attached storage systems  
>for file access events.  SIEM Integration  - Collect file ac 
>cess logs from all platforms (Windows, Linux, macOS) and cen 
>tralize in a SIEM for correlation and analysis. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:35.674000+00:002025-11-12 22:03:39.105000+00:00
descriptionTo events where a file is opened or accessed, making its contents available to the requester. This includes reading, executing, or interacting with files by authorized or unauthorized entities. Examples include logging file access events (e.g., Windows Event ID 4663), monitoring file reads, and detecting unusual file access patterns. Examples: + +- File Read Operations: A user opens a sensitive document (e.g., financial_report.xlsx) on a shared drive. +- File Execution: A script or executable file is accessed and executed (e.g., malware.exe is run from a temporary directory). +- Unauthorized File Access: An unauthorized user attempts to access a protected configuration file (e.g., `/etc/passwd` on Linux or `System32` files on Windows). +- File Access Patterns: Bulk access to multiple files in a short time (e.g., mass access to documents on a file server). +- File Access via Network: Files on a network share are accessed remotely (e.g., logs of SMB file access). + +This data component can be collected through the following measures: + +Windows + +- Windows Event Logs: Event ID 4663: Captures file system auditing details, including who accessed the file, access type, and file name. +- Sysmon: + - Event ID 11: Logs file creation time changes. + - Event ID 1 (process creation): Can provide insight into files executed. +- PowerShell: Commands to monitor file access in real-time: `Get-WinEvent -FilterHashtable @{LogName='Security'; ID=4663}` + +Linux + +- Auditd: Monitor file access events using audit rules: `auditctl -w /path/to/file -p rwxa -k file_access` +- View logs: `ausearch -k file_access` +- Inotify: Use inotify to track file access on Linux: `inotifywait -m /path/to/watch -e access` + +macOS + +- Unified Logs: Monitor file access using the macOS Unified Logging System. +- FSEvents: File System Events can track file accesses: `fs_usage | grep open` + +Network Devices + +- SMB/CIFS Logs: Monitor file access over network shares using logs from SMB or CIFS protocol. +- NAS Logs: Collect logs from network-attached storage systems for file access events. + +SIEM Integration + +- Collect file access logs from all platforms (Windows, Linux, macOS) and centralize in a SIEM for correlation and analysis.To events where a file is opened or accessed, making its contents available to the requester. This includes reading, executing, or interacting with files by authorized or unauthorized entities. Examples include logging file access events (e.g., Windows Event ID 4663), monitoring file reads, and detecting unusual file access patterns. Examples: + +- File Read Operations: A user opens a sensitive document (e.g., financial_report.xlsx) on a shared drive. +- File Execution: A script or executable file is accessed and executed (e.g., malware.exe is run from a temporary directory). +- Unauthorized File Access: An unauthorized user attempts to access a protected configuration file (e.g., `/etc/passwd` on Linux or `System32` files on Windows). +- File Access Patterns: Bulk access to multiple files in a short time (e.g., mass access to documents on a file server). +- File Access via Network: Files on a network share are accessed remotely (e.g., logs of SMB file access).
x_mitre_log_sources[4]['channel']EventCode=4663EventCode=4663, 4670, 4656
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4656, 4663'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4656,4663'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4670, 4663'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4656'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=5145, 4663'}
x_mitre_log_sources{'name': 'auditd:PATH', 'channel': 'path'}

[DC0039] File Creation

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1A new file is created on a system or network storage. This at1A new file is created on a system or network storage. This a
>ction often signifies an operation such as saving a document>ction often signifies an operation such as saving a document
>, writing data, or deploying a file. Logging these events he>, writing data, or deploying a file. Logging these events he
>lps identify legitimate or potentially malicious file creati>lps identify legitimate or potentially malicious file creati
>on activities. Examples include logging file creation events>on activities. Examples include logging file creation events
> (e.g., Sysmon Event ID 11 or Linux auditd logs).   This dat> (e.g., Sysmon Event ID 11 or Linux auditd logs). 
>a component can be collected through the following measures: 
>  Windows  - Sysmon: Event ID 11: Logs file creation events, 
> capturing details like the file path, hash, and creation ti 
>me. - Windows Event Log: Enable "Object Access" auditing in  
>Group Policy to track file creation under Event ID 4663. - P 
>owerShell: Real-time monitoring of file creation:`Get-WinEve 
>nt -FilterHashtable @{LogName='Security'; ID=4663}`  Linux   
>- Auditd: Use audit rules to monitor file creation: `auditct 
>l -w /path/to/directory -p w -k file_creation` - View logs:  
>`ausearch -k file_creation` - Inotify: Monitor file creation 
> with inotifywait: `inotifywait -m /path/to/watch -e create` 
>  macOS  - Unified Logs: Use the macOS Unified Logging Syste 
>m to capture file creation events. - FSEvents: Use File Syst 
>em Events to monitor file creation: `fs_usage | grep create` 
>  Network Devices  - NAS Logs: Monitor file creation events  
>on network-attached storage devices. - SMB Logs: Collect log 
>s of file creation activities over SMB/CIFS protocols.  SIEM 
> Integration  - Forward logs from all platforms (Windows, Li 
>nux, macOS) to a SIEM for central analysis and alerting. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 19:32:14.744000+00:002025-11-12 22:03:39.105000+00:00
external_references[0]['url']https://attack.mitre.org/data-components/DC0039https://attack.mitre.org/datacomponents/DC0039
descriptionA new file is created on a system or network storage. This action often signifies an operation such as saving a document, writing data, or deploying a file. Logging these events helps identify legitimate or potentially malicious file creation activities. Examples include logging file creation events (e.g., Sysmon Event ID 11 or Linux auditd logs). + +This data component can be collected through the following measures: + +Windows + +- Sysmon: Event ID 11: Logs file creation events, capturing details like the file path, hash, and creation time. +- Windows Event Log: Enable "Object Access" auditing in Group Policy to track file creation under Event ID 4663. +- PowerShell: Real-time monitoring of file creation:`Get-WinEvent -FilterHashtable @{LogName='Security'; ID=4663}` + +Linux + +- Auditd: Use audit rules to monitor file creation: `auditctl -w /path/to/directory -p w -k file_creation` +- View logs: `ausearch -k file_creation` +- Inotify: Monitor file creation with inotifywait: `inotifywait -m /path/to/watch -e create` + +macOS + +- Unified Logs: Use the macOS Unified Logging System to capture file creation events. +- FSEvents: Use File System Events to monitor file creation: `fs_usage | grep create` + +Network Devices + +- NAS Logs: Monitor file creation events on network-attached storage devices. +- SMB Logs: Collect logs of file creation activities over SMB/CIFS protocols. + +SIEM Integration + +- Forward logs from all platforms (Windows, Linux, macOS) to a SIEM for central analysis and alerting.A new file is created on a system or network storage. This action often signifies an operation such as saving a document, writing data, or deploying a file. Logging these events helps identify legitimate or potentially malicious file creation activities. Examples include logging file creation events (e.g., Sysmon Event ID 11 or Linux auditd logs).
x_mitre_log_sources[37]['name']macos:unifiedmacos:unifiedlog
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Sysmon', 'channel': 'Modification of .asar in /opt or ~/.config directories'}

[DC0040] File Deletion

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Refers to events where files are removed from a system or stt1Refers to events where files are removed from a system or st
>orage device. These events can indicate legitimate housekeep>orage device. These events can indicate legitimate housekeep
>ing activities or malicious actions such as attackers attemp>ing activities or malicious actions such as attackers attemp
>ting to cover their tracks. Monitoring file deletions helps >ting to cover their tracks. Monitoring file deletions helps 
>organizations identify unauthorized or suspicious activities>organizations identify unauthorized or suspicious activities
>.  This data component can be collected through the followin>.
>g measures:  Windows  - Sysmon: Event ID 23: Logs file delet 
>ion events, including details such as file paths and respons 
>ible processes. - Windows Event Log: Enable "Object Access"  
>auditing to monitor file deletions. - PowerShell: `Get-WinEv 
>ent -FilterHashtable @{LogName='Security'; ID=4663} | Where- 
>Object {$_.Message -like '*DELETE*'}`  Linux  - Auditd: Use  
>audit rules to capture file deletion events: `auditctl -a al 
>ways,exit -F arch=b64 -S unlink -S rename -S rmdir -k file_d 
>eletion` - Query logs: `ausearch -k file_deletion` - Inotify 
>: Use inotifywait to monitor file deletions: `inotifywait -m 
> /path/to/watch -e delete`  macOS  - Endpoint Security Frame 
>work (ESF): Monitor events like ES_EVENT_TYPE_AUTH_UNLINK to 
> capture file deletion activities. - FSEvents: Track file de 
>letion activities in real-time: `fs_usage | grep unlink`  SI 
>EM Integration  - Forward file deletion logs to a SIEM for c 
>entralized monitoring and correlation with other events.  
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:36.450000+00:002025-11-12 22:03:39.105000+00:00
descriptionRefers to events where files are removed from a system or storage device. These events can indicate legitimate housekeeping activities or malicious actions such as attackers attempting to cover their tracks. Monitoring file deletions helps organizations identify unauthorized or suspicious activities. + +This data component can be collected through the following measures: + +Windows + +- Sysmon: Event ID 23: Logs file deletion events, including details such as file paths and responsible processes. +- Windows Event Log: Enable "Object Access" auditing to monitor file deletions. +- PowerShell: `Get-WinEvent -FilterHashtable @{LogName='Security'; ID=4663} | Where-Object {$_.Message -like '*DELETE*'}` + +Linux + +- Auditd: Use audit rules to capture file deletion events: `auditctl -a always,exit -F arch=b64 -S unlink -S rename -S rmdir -k file_deletion` +- Query logs: `ausearch -k file_deletion` +- Inotify: Use inotifywait to monitor file deletions: `inotifywait -m /path/to/watch -e delete` + +macOS + +- Endpoint Security Framework (ESF): Monitor events like ES_EVENT_TYPE_AUTH_UNLINK to capture file deletion activities. +- FSEvents: Track file deletion activities in real-time: `fs_usage | grep unlink` + +SIEM Integration + +- Forward file deletion logs to a SIEM for centralized monitoring and correlation with other events. +Refers to events where files are removed from a system or storage device. These events can indicate legitimate housekeeping activities or malicious actions such as attackers attempting to cover their tracks. Monitoring file deletions helps organizations identify unauthorized or suspicious activities.

[DC0059] File Metadata

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1contextual information about a file, including attributes sut1contextual information about a file, including attributes su
>ch as the file's name, size, type, content (e.g., signatures>ch as the file's name, size, type, content (e.g., signatures
>, headers, media), user/owner, permissions, timestamps, and >, headers, media), user/owner, permissions, timestamps, and 
>other related properties. File metadata provides insights in>other related properties. File metadata provides insights in
>to a file's characteristics and can be used to detect malici>to a file's characteristics and can be used to detect malici
>ous activity, unauthorized modifications, or other anomalies>ous activity, unauthorized modifications, or other anomalies
>. Examples:   - File Ownership and Permissions: Checking the>. Examples:   - File Ownership and Permissions: Checking the
> owner and permissions of a critical configuration file like> owner and permissions of a critical configuration file like
> /etc/passwd on Linux or C:\Windows\System32\config\SAM on W> /etc/passwd on Linux or C:\Windows\System32\config\SAM on W
>indows. - Timestamps: Analyzing the creation, modification, >indows. - Timestamps: Analyzing the creation, modification, 
>and access timestamps of a file. - File Content and Signatur>and access timestamps of a file. - File Content and Signatur
>es: Extracting the headers of an executable file to verify i>es: Extracting the headers of an executable file to verify i
>ts signature or detect packing/obfuscation. - File Attribute>ts signature or detect packing/obfuscation. - File Attribute
>s: Analyzing attributes like hidden, system, or read-only fl>s: Analyzing attributes like hidden, system, or read-only fl
>ags in Windows. - File Hashes: Generating MD5, SHA-1, or SHA>ags in Windows. - File Hashes: Generating MD5, SHA-1, or SHA
>-256 hashes of files to compare against threat intelligence >-256 hashes of files to compare against threat intelligence 
>feeds. - File Location: Monitoring files located in unusual >feeds. - File Location: Monitoring files located in unusual 
>directories or paths, such as temporary or user folders.  Th>directories or paths, such as temporary or user folders.
>is data component can be collected through the following mea 
>sures:  Windows  - Sysinternals Tools: Use `AccessEnum` or ` 
>PSFile` to retrieve metadata about file access and permissio 
>ns. - Windows Event Logs: Enable object access auditing and  
>monitor events like 4663 (Object Access) and 5140 (A network 
> share object was accessed). - PowerShell: Use Get-Item or G 
>et-ChildItem cmdlets: `Get-ChildItem -Path "C:\Path\To\Direc 
>tory" -Recurse | Select-Object Name, Length, LastWriteTime,  
>Attributes`  Linux  - File System Commands: Use `ls -l` or s 
>tat to retrieve file metadata: `stat /path/to/file` - Auditd 
>: Configure audit rules to log metadata access: `auditctl -w 
> /path/to/file -p wa -k file_metadata` - Filesystem Integrit 
>y Tools: Tools like tripwire or AIDE (Advanced Intrusion Det 
>ection Environment) can monitor file metadata changes.  macO 
>S  - FSEvents: Use FSEvents to track file metadata changes.  
>- Endpoint Security Framework (ESF): Capture metadata-relate 
>d events via ESF APIs. - Command-Line Tools: Use ls -l or xa 
>ttr for file attributes: `ls -l@ /path/to/file`  SIEM Integr 
>ation  - Forward file metadata logs from endpoint or network 
> devices to a SIEM for centralized analysis. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:35.397000+00:002025-11-12 22:03:39.105000+00:00
descriptioncontextual information about a file, including attributes such as the file's name, size, type, content (e.g., signatures, headers, media), user/owner, permissions, timestamps, and other related properties. File metadata provides insights into a file's characteristics and can be used to detect malicious activity, unauthorized modifications, or other anomalies. Examples: + +- File Ownership and Permissions: Checking the owner and permissions of a critical configuration file like /etc/passwd on Linux or C:\Windows\System32\config\SAM on Windows. +- Timestamps: Analyzing the creation, modification, and access timestamps of a file. +- File Content and Signatures: Extracting the headers of an executable file to verify its signature or detect packing/obfuscation. +- File Attributes: Analyzing attributes like hidden, system, or read-only flags in Windows. +- File Hashes: Generating MD5, SHA-1, or SHA-256 hashes of files to compare against threat intelligence feeds. +- File Location: Monitoring files located in unusual directories or paths, such as temporary or user folders. + +This data component can be collected through the following measures: + +Windows + +- Sysinternals Tools: Use `AccessEnum` or `PSFile` to retrieve metadata about file access and permissions. +- Windows Event Logs: Enable object access auditing and monitor events like 4663 (Object Access) and 5140 (A network share object was accessed). +- PowerShell: Use Get-Item or Get-ChildItem cmdlets: `Get-ChildItem -Path "C:\Path\To\Directory" -Recurse | Select-Object Name, Length, LastWriteTime, Attributes` + +Linux + +- File System Commands: Use `ls -l` or stat to retrieve file metadata: `stat /path/to/file` +- Auditd: Configure audit rules to log metadata access: `auditctl -w /path/to/file -p wa -k file_metadata` +- Filesystem Integrity Tools: Tools like tripwire or AIDE (Advanced Intrusion Detection Environment) can monitor file metadata changes. + +macOS + +- FSEvents: Use FSEvents to track file metadata changes. +- Endpoint Security Framework (ESF): Capture metadata-related events via ESF APIs. +- Command-Line Tools: Use ls -l or xattr for file attributes: `ls -l@ /path/to/file` + +SIEM Integration + +- Forward file metadata logs from endpoint or network devices to a SIEM for centralized analysis.contextual information about a file, including attributes such as the file's name, size, type, content (e.g., signatures, headers, media), user/owner, permissions, timestamps, and other related properties. File metadata provides insights into a file's characteristics and can be used to detect malicious activity, unauthorized modifications, or other anomalies. Examples: + +- File Ownership and Permissions: Checking the owner and permissions of a critical configuration file like /etc/passwd on Linux or C:\Windows\System32\config\SAM on Windows. +- Timestamps: Analyzing the creation, modification, and access timestamps of a file. +- File Content and Signatures: Extracting the headers of an executable file to verify its signature or detect packing/obfuscation. +- File Attributes: Analyzing attributes like hidden, system, or read-only flags in Windows. +- File Hashes: Generating MD5, SHA-1, or SHA-256 hashes of files to compare against threat intelligence feeds. +- File Location: Monitoring files located in unusual directories or paths, such as temporary or user folders.
x_mitre_log_sources[18]['channel']pathPATH
x_mitre_log_sources[42]['channel']EventCode=4670EventCode=4663, 4670, 4656
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4663'}
x_mitre_log_sources{'name': 'WinEventLog:Sysmon', 'channel': 'EventCode=15 '}

[DC0061] File Modification

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Changes made to a file, including updates to its contents, mt1Changes made to a file, including updates to its contents, m
>etadata, access permissions, or attributes. These modificati>etadata, access permissions, or attributes. These modificati
>ons may indicate legitimate activity (e.g., software updates>ons may indicate legitimate activity (e.g., software updates
>) or unauthorized changes (e.g., tampering, ransomware, or a>) or unauthorized changes (e.g., tampering, ransomware, or a
>dversarial modifications). Examples:   - Content Modificatio>dversarial modifications). Examples:   - Content Modificatio
>ns: Changes to the content of a configuration file, such as >ns: Changes to the content of a configuration file, such as 
>modifying `/etc/ssh/sshd_config` on Linux or `C:\Windows\Sys>modifying `/etc/ssh/sshd_config` on Linux or `C:\Windows\Sys
>tem32\drivers\etc\hosts` on Windows. - Permission Changes: A>tem32\drivers\etc\hosts` on Windows. - Permission Changes: A
>ltering file permissions to allow broader access, such as ch>ltering file permissions to allow broader access, such as ch
>anging a file from `644` to `777` on Linux or modifying NTFS>anging a file from `644` to `777` on Linux or modifying NTFS
> permissions on Windows. - Attribute Modifications: Changing> permissions on Windows. - Attribute Modifications: Changing
> a file's attributes to hidden, read-only, or system on Wind> a file's attributes to hidden, read-only, or system on Wind
>ows. - Timestamp Manipulation: Adjusting a file's creation o>ows. - Timestamp Manipulation: Adjusting a file's creation o
>r modification timestamp using tools like `touch` in Linux o>r modification timestamp using tools like `touch` in Linux o
>r timestomping tools on Windows. - Software or System File C>r timestomping tools on Windows. - Software or System File C
>hanges: Modifying system files such as `boot.ini`, kernel mo>hanges: Modifying system files such as `boot.ini`, kernel mo
>dules, or application binaries.  This data component can be >dules, or application binaries.
>collected through the following measures:  Windows  - Event  
>Logs: Enable file system auditing to monitor file modificati 
>ons using Security Event ID 4670 (File System Audit) or Sysm 
>on Event ID 2 (File creation time changed). - PowerShell: Us 
>e Get-ItemProperty or Get-Acl cmdlets to monitor file proper 
>ties: `Get-Item -Path "C:\path\to\file" | Select-Object Name 
>, Attributes, LastWriteTime`  Linux  - File System Monitorin 
>g: Use tools like auditd with rules to monitor file modifica 
>tions: `auditctl -w /path/to/file -p wa -k file_modification 
>` - Inotify: Use inotifywait to watch for real-time changes  
>to files or directories: `inotifywait -m /path/to/file`  mac 
>OS  - Endpoint Security Framework (ESF): Monitor file modifi 
>cation events using ESF APIs. - Audit Framework: Configure a 
>udit rules to track file changes. - Command-Line Tools: Use  
>fs_usage to monitor file activities: `fs_usage -w /path/to/f 
>ile`  SIEM Tools  - Collect logs from endpoint agents (e.g., 
> Sysmon, Auditd) and file servers to centralize file modific 
>ation event data. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:35.239000+00:002025-11-12 22:03:39.105000+00:00
descriptionChanges made to a file, including updates to its contents, metadata, access permissions, or attributes. These modifications may indicate legitimate activity (e.g., software updates) or unauthorized changes (e.g., tampering, ransomware, or adversarial modifications). Examples: + +- Content Modifications: Changes to the content of a configuration file, such as modifying `/etc/ssh/sshd_config` on Linux or `C:\Windows\System32\drivers\etc\hosts` on Windows. +- Permission Changes: Altering file permissions to allow broader access, such as changing a file from `644` to `777` on Linux or modifying NTFS permissions on Windows. +- Attribute Modifications: Changing a file's attributes to hidden, read-only, or system on Windows. +- Timestamp Manipulation: Adjusting a file's creation or modification timestamp using tools like `touch` in Linux or timestomping tools on Windows. +- Software or System File Changes: Modifying system files such as `boot.ini`, kernel modules, or application binaries. + +This data component can be collected through the following measures: + +Windows + +- Event Logs: Enable file system auditing to monitor file modifications using Security Event ID 4670 (File System Audit) or Sysmon Event ID 2 (File creation time changed). +- PowerShell: Use Get-ItemProperty or Get-Acl cmdlets to monitor file properties: `Get-Item -Path "C:\path\to\file" | Select-Object Name, Attributes, LastWriteTime` + +Linux + +- File System Monitoring: Use tools like auditd with rules to monitor file modifications: `auditctl -w /path/to/file -p wa -k file_modification` +- Inotify: Use inotifywait to watch for real-time changes to files or directories: `inotifywait -m /path/to/file` + +macOS + +- Endpoint Security Framework (ESF): Monitor file modification events using ESF APIs. +- Audit Framework: Configure audit rules to track file changes. +- Command-Line Tools: Use fs_usage to monitor file activities: `fs_usage -w /path/to/file` + +SIEM Tools + +- Collect logs from endpoint agents (e.g., Sysmon, Auditd) and file servers to centralize file modification event data.Changes made to a file, including updates to its contents, metadata, access permissions, or attributes. These modifications may indicate legitimate activity (e.g., software updates) or unauthorized changes (e.g., tampering, ransomware, or adversarial modifications). Examples: + +- Content Modifications: Changes to the content of a configuration file, such as modifying `/etc/ssh/sshd_config` on Linux or `C:\Windows\System32\drivers\etc\hosts` on Windows. +- Permission Changes: Altering file permissions to allow broader access, such as changing a file from `644` to `777` on Linux or modifying NTFS permissions on Windows. +- Attribute Modifications: Changing a file's attributes to hidden, read-only, or system on Windows. +- Timestamp Manipulation: Adjusting a file's creation or modification timestamp using tools like `touch` in Linux or timestomping tools on Windows. +- Software or System File Changes: Modifying system files such as `boot.ini`, kernel modules, or application binaries.
x_mitre_log_sources[8]['channel']EventCode=4663EventCode=4663, 4670, 4656
x_mitre_log_sources[59]['name']WinEventLog:SysmonWinEventLog:CodeIntegrity
x_mitre_log_sources[59]['channel']EvenCode=2EventCode=3033
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4656,4663'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4670'}
x_mitre_log_sources{'name': 'WinEventLog:Application', 'channel': '81,3033'}

[DC0067] Logon Session Creation

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1The successful establishment of a new user session followingt1The successful establishment of a new user session following
> a successful authentication attempt. This typically signifi> a successful authentication attempt. This typically signifi
>es that a user has provided valid credentials or authenticat>es that a user has provided valid credentials or authenticat
>ion tokens, and the system has initiated a session associate>ion tokens, and the system has initiated a session associate
>d with that user account. This data is crucial for tracking >d with that user account. This data is crucial for tracking 
>authentication events and identifying potential unauthorized>authentication events and identifying potential unauthorized
> access. Examples:   - Windows Systems     - Event ID: 4624 > access. Examples:   - Windows Systems     - Event ID: 4624 
>        - Logon Type: 2 (Interactive) or 10 (Remote Interact>        - Logon Type: 2 (Interactive) or 10 (Remote Interact
>ive via RDP).         - Account Name: JohnDoe         - Sour>ive via RDP).         - Account Name: JohnDoe         - Sour
>ce Network Address: 192.168.1.100         - Authentication P>ce Network Address: 192.168.1.100         - Authentication P
>ackage: NTLM - Linux Systems     - /var/log/utmp or /var/log>ackage: NTLM - Linux Systems     - /var/log/utmp or /var/log
>/wtmp:         - Log format: login user [tty] from [source_i>/wtmp:         - Log format: login user [tty] from [source_i
>p]         - User: jane         - IP: 10.0.0.5         - Tim>p]         - User: jane         - IP: 10.0.0.5         - Tim
>estamp: 2024-12-28 08:30:00 - macOS Systems     - /var/log/a>estamp: 2024-12-28 08:30:00 - macOS Systems     - /var/log/a
>sl.log or unified logging framework:         - Log: com.appl>sl.log or unified logging framework:         - Log: com.appl
>e.securityd: Authentication succeeded for user 'admin' - Clo>e.securityd: Authentication succeeded for user 'admin' - Clo
>ud Environments     - Azure Sign-In Logs:         - Activity>ud Environments     - Azure Sign-In Logs:         - Activity
>: Sign-in successful         - Client App: Browser         ->: Sign-in successful         - Client App: Browser         -
> Location: Unknown (Country: X) - Google Workspace     - Act> Location: Unknown (Country: X) - Google Workspace     - Act
>ivity: Login         - Event Type: successful_login         >ivity: Login         - Event Type: successful_login         
>- Source IP: 203.0.113.55  This data component can be collec>- Source IP: 203.0.113.55
>ted through the following measures:  - Windows Systems     - 
> Event Logs: Monitor Security Event Logs using Event ID 4624 
> for successful logons.     - PowerShell Example: `Get-Event 
>Log -LogName Security -InstanceId 4624` - Linux Systems      
>- Log Files: Monitor `/var/log/utmp`, `/var/log/wtmp`, or `/ 
>var/log/auth.log` for logon events.     - Tools: Use `last`  
>or `who` commands to parse login records. - macOS Systems    
>  - Log Sources: Monitor `/var/log/asl.log` or Apple Unified 
> Logs using the `log show` command.     - Command Example: ` 
>log show --predicate 'eventMessage contains "Authentication  
>succeeded"' --info` - Cloud Environments     - Azure AD: Use 
> Azure Monitor to analyze sign-in logs. Example CLI Query: ` 
>az monitor log-analytics query -w <workspace_id> --analytics 
>-query "AzureActivity | where ActivityStatus == 'Success' an 
>d OperationName == 'Sign-in'"`     - Google Workspace: Enabl 
>e and monitor Login Audit logs from the Admin Console.     - 
> Office 365: Use Audit Log Search in Microsoft 365 Security  
>& Compliance Center for login-related events. - Network Logs 
>     - Sources: Network authentication mechanisms (e.g., RAD 
>IUS or TACACS logs). - Enable EDR Monitoring:      - EDR too 
>ls monitor logon session activity, including the creation of 
> new sessions.     - Configure alerts for: Suspicious logon  
>types (e.g., Logon Type 10 for RDP or Type 5 for Service). L 
>ogons from unusual locations, accounts, or devices.     - Le 
>verage EDR telemetry for session attributes like source IP,  
>session duration, and originating process. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:35.022000+00:002025-11-12 22:03:39.105000+00:00
descriptionThe successful establishment of a new user session following a successful authentication attempt. This typically signifies that a user has provided valid credentials or authentication tokens, and the system has initiated a session associated with that user account. This data is crucial for tracking authentication events and identifying potential unauthorized access. Examples: + +- Windows Systems + - Event ID: 4624 + - Logon Type: 2 (Interactive) or 10 (Remote Interactive via RDP). + - Account Name: JohnDoe + - Source Network Address: 192.168.1.100 + - Authentication Package: NTLM +- Linux Systems + - /var/log/utmp or /var/log/wtmp: + - Log format: login user [tty] from [source_ip] + - User: jane + - IP: 10.0.0.5 + - Timestamp: 2024-12-28 08:30:00 +- macOS Systems + - /var/log/asl.log or unified logging framework: + - Log: com.apple.securityd: Authentication succeeded for user 'admin' +- Cloud Environments + - Azure Sign-In Logs: + - Activity: Sign-in successful + - Client App: Browser + - Location: Unknown (Country: X) +- Google Workspace + - Activity: Login + - Event Type: successful_login + - Source IP: 203.0.113.55 + +This data component can be collected through the following measures: + +- Windows Systems + - Event Logs: Monitor Security Event Logs using Event ID 4624 for successful logons. + - PowerShell Example: `Get-EventLog -LogName Security -InstanceId 4624` +- Linux Systems + - Log Files: Monitor `/var/log/utmp`, `/var/log/wtmp`, or `/var/log/auth.log` for logon events. + - Tools: Use `last` or `who` commands to parse login records. +- macOS Systems + - Log Sources: Monitor `/var/log/asl.log` or Apple Unified Logs using the `log show` command. + - Command Example: `log show --predicate 'eventMessage contains "Authentication succeeded"' --info` +- Cloud Environments + - Azure AD: Use Azure Monitor to analyze sign-in logs. Example CLI Query: `az monitor log-analytics query -w --analytics-query "AzureActivity | where ActivityStatus == 'Success' and OperationName == 'Sign-in'"` + - Google Workspace: Enable and monitor Login Audit logs from the Admin Console. + - Office 365: Use Audit Log Search in Microsoft 365 Security & Compliance Center for login-related events. +- Network Logs + - Sources: Network authentication mechanisms (e.g., RADIUS or TACACS logs). +- Enable EDR Monitoring: + - EDR tools monitor logon session activity, including the creation of new sessions. + - Configure alerts for: Suspicious logon types (e.g., Logon Type 10 for RDP or Type 5 for Service). Logons from unusual locations, accounts, or devices. + - Leverage EDR telemetry for session attributes like source IP, session duration, and originating process.The successful establishment of a new user session following a successful authentication attempt. This typically signifies that a user has provided valid credentials or authentication tokens, and the system has initiated a session associated with that user account. This data is crucial for tracking authentication events and identifying potential unauthorized access. Examples: + +- Windows Systems + - Event ID: 4624 + - Logon Type: 2 (Interactive) or 10 (Remote Interactive via RDP). + - Account Name: JohnDoe + - Source Network Address: 192.168.1.100 + - Authentication Package: NTLM +- Linux Systems + - /var/log/utmp or /var/log/wtmp: + - Log format: login user [tty] from [source_ip] + - User: jane + - IP: 10.0.0.5 + - Timestamp: 2024-12-28 08:30:00 +- macOS Systems + - /var/log/asl.log or unified logging framework: + - Log: com.apple.securityd: Authentication succeeded for user 'admin' +- Cloud Environments + - Azure Sign-In Logs: + - Activity: Sign-in successful + - Client App: Browser + - Location: Unknown (Country: X) +- Google Workspace + - Activity: Login + - Event Type: successful_login + - Source IP: 203.0.113.55
x_mitre_log_sources[5]['name']m365:signinm365:signinlogs
x_mitre_log_sources[31]['name']m365:signinm365:signinlogs
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4624 with LogonType=9 or smartcard logon'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4624 (LogonType=10 or 3), EventCode=4648'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4624 (LogonType=3)'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4624 (LogonType=10), EventCode=4648'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4624, 4672, 4648'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': '4624'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4624,4648, 4672'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4624,4648,4672,4769'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventID=4624'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4624, 4634'}

[DC0088] Logon Session Metadata

Current version: 2.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:36.246000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_sources[4]['name']azure:signinLogsazure:signinlogs
x_mitre_log_sources[3]['channel']EventCode=4624, 4634, 4672, 4768, 4769EventCode=4776, 4771, 4770
x_mitre_log_sources[32]['name']m365:signinm365:signinlogs
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4672, 4634'}
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4624, 4634, 4672, 4769'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4624, 4672'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4776,4771,4770'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4624,4672'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4624, 4672, 4634, 4768, 4769'}

[DC0016] Module Load

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1When a process or program dynamically attaches a shared librt1When a process or program dynamically attaches a shared libr
>ary, module, or plugin into its memory space. This action is>ary, module, or plugin into its memory space. This action is
> typically performed to extend the functionality of an appli> typically performed to extend the functionality of an appli
>cation, access shared system resources, or interact with ker>cation, access shared system resources, or interact with ker
>nel-mode components.  *Data Collection Measures:*  - Event L>nel-mode components.
>ogging (Windows):     - Sysmon Event ID 7: Logs when a DLL i 
>s loaded into a process.     - Windows Security Event ID 468 
>8: Captures process creation events, often useful for correl 
>ating module loads.     - Windows Defender ATP: Can provide  
>visibility into suspicious module loads. - Event Logging (Li 
>nux/macOS):     - AuditD (`execve` and `open` syscalls): Cap 
>tures when shared libraries (`.so` files) are loaded.     -  
>Ltrace/Strace: Monitors process behavior, including library  
>calls (`dlopen`, `execve`).     - MacOS Endpoint Security Fr 
>amework (ESF): Monitors library loads (`ES_EVENT_TYPE_NOTIFY 
>_DYLD_INSERT_LIBRARIES`). - Endpoint Detection & Response (E 
>DR):      - Provide real-time telemetry on module loads and  
>process injections.     - Sysinternals Process Monitor (`pro 
>cmon`): Captures loaded modules and their execution context. 
> - Memory Forensics:     - Volatility Framework (`malfind`,  
>`ldrmodules`): Detects injected DLLs and anomalous module lo 
>ads.     - Rekall Framework: Useful for kernel-mode module d 
>etection. - SIEM and Log Analysis:     - Centralized log agg 
>regation to correlate suspicious module loads across the env 
>ironment.     - Detection rules using correlation searches a 
>nd behavioral analytics. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:35.471000+00:002025-11-12 22:03:39.105000+00:00
descriptionWhen a process or program dynamically attaches a shared library, module, or plugin into its memory space. This action is typically performed to extend the functionality of an application, access shared system resources, or interact with kernel-mode components. + +*Data Collection Measures:* + +- Event Logging (Windows): + - Sysmon Event ID 7: Logs when a DLL is loaded into a process. + - Windows Security Event ID 4688: Captures process creation events, often useful for correlating module loads. + - Windows Defender ATP: Can provide visibility into suspicious module loads. +- Event Logging (Linux/macOS): + - AuditD (`execve` and `open` syscalls): Captures when shared libraries (`.so` files) are loaded. + - Ltrace/Strace: Monitors process behavior, including library calls (`dlopen`, `execve`). + - MacOS Endpoint Security Framework (ESF): Monitors library loads (`ES_EVENT_TYPE_NOTIFY_DYLD_INSERT_LIBRARIES`). +- Endpoint Detection & Response (EDR): + - Provide real-time telemetry on module loads and process injections. + - Sysinternals Process Monitor (`procmon`): Captures loaded modules and their execution context. +- Memory Forensics: + - Volatility Framework (`malfind`, `ldrmodules`): Detects injected DLLs and anomalous module loads. + - Rekall Framework: Useful for kernel-mode module detection. +- SIEM and Log Analysis: + - Centralized log aggregation to correlate suspicious module loads across the environment. + - Detection rules using correlation searches and behavioral analytics.When a process or program dynamically attaches a shared library, module, or plugin into its memory space. This action is typically performed to extend the functionality of an application, access shared system resources, or interact with kernel-mode components.

[DC0082] Network Connection Creation

Current version: 2.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:34.190000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_sources[19]['channel']EventCode=22EventCode=3, 22
x_mitre_log_sources[27]['channel']EventCode=5156EventCode=5156, 5157
x_mitre_log_sources[90]['channel']8001, 8002, 8003EventCode=8001, 8002, 8003
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Sysmon', 'channel': 'EventCode=3'}
x_mitre_log_sources{'name': 'WinEventLog:Sysmon', 'channel': 'EventCode=22'}
x_mitre_log_sources{'name': 'auditd:SYSCALL', 'channel': 'netconnect'}
x_mitre_log_sources{'name': 'auditd:SYSCALL', 'channel': 'open or connect'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=5156,5157'}
x_mitre_log_sources{'name': 'linux:Sysmon', 'channel': 'EventCode=3'}

[DC0102] Network Share Access

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Opening a network share, which makes the contents available t1Opening a network share, which makes the contents available 
>to the requestor (ex: Windows EID 5140 or 5145)  *Data Colle>to the requestor (ex: Windows EID 5140 or 5145)
>ction Measures:*  - Windows:     - Event ID 5140 – Network S 
>hare Object Access Logs every access attempt to a network sh 
>are.     - Event ID 5145 – Detailed Network Share Object Acc 
>ess Captures granular access control information, including  
>the requesting user, source IP, and access permissions.      
>- Sysmon Event ID 3 – Network Connection Initiated Helps tra 
>ck SMB connections to suspicious or unauthorized network sha 
>res.     - Enable Audit Policy for Network Share Access: `au 
>ditpol /set /subcategory:"File Share" /success:enable /failu 
>re:enable`     - Enable PowerShell Logging to Detect Unautho 
>rized SMB Access: `Set-ExecutionPolicy RemoteSigned`     - R 
>estrict Network Share Access with Group Policy (GPO): `Compu 
>ter Configuration → Windows Settings → Security Settings → L 
>ocal Policies → User Rights Assignment` Set "Access this com 
>puter from the network" to restrict unauthorized accounts. - 
> Linux/macOS:     - AuditD (`open`, `read`, `write`, `connec 
>t` syscalls) Detects access to NFS, CIFS, and SMB network sh 
>ares.     - Lsof (`lsof | grep nfs` or `lsof | grep smb`) Id 
>entifies active network share connections.     - Mount (`mou 
>nt | grep nfs` or `mount | grep cifs`) Lists currently mount 
>ed network shares.     - Enable AuditD for SMB/NFS Access: ` 
>auditctl -a always,exit -F arch=b64 -S open -F path=/mnt/sha 
>re -k network_share_access`     - Monitor Active Network Sha 
>res Using Netstat: `netstat -an | grep :445` - Endpoint Dete 
>ction & Response (EDR):     - Detects abnormal network share 
> access behavior, such as unusual account usage, large file  
>transfers, or encrypted file activity. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:37.412000+00:002025-11-12 22:03:39.105000+00:00
descriptionOpening a network share, which makes the contents available to the requestor (ex: Windows EID 5140 or 5145) + +*Data Collection Measures:* + +- Windows: + - Event ID 5140 – Network Share Object Access Logs every access attempt to a network share. + - Event ID 5145 – Detailed Network Share Object Access Captures granular access control information, including the requesting user, source IP, and access permissions. + - Sysmon Event ID 3 – Network Connection Initiated Helps track SMB connections to suspicious or unauthorized network shares. + - Enable Audit Policy for Network Share Access: `auditpol /set /subcategory:"File Share" /success:enable /failure:enable` + - Enable PowerShell Logging to Detect Unauthorized SMB Access: `Set-ExecutionPolicy RemoteSigned` + - Restrict Network Share Access with Group Policy (GPO): `Computer Configuration → Windows Settings → Security Settings → Local Policies → User Rights Assignment` Set "Access this computer from the network" to restrict unauthorized accounts. +- Linux/macOS: + - AuditD (`open`, `read`, `write`, `connect` syscalls) Detects access to NFS, CIFS, and SMB network shares. + - Lsof (`lsof | grep nfs` or `lsof | grep smb`) Identifies active network share connections. + - Mount (`mount | grep nfs` or `mount | grep cifs`) Lists currently mounted network shares. + - Enable AuditD for SMB/NFS Access: `auditctl -a always,exit -F arch=b64 -S open -F path=/mnt/share -k network_share_access` + - Monitor Active Network Shares Using Netstat: `netstat -an | grep :445` +- Endpoint Detection & Response (EDR): + - Detects abnormal network share access behavior, such as unusual account usage, large file transfers, or encrypted file activity.Opening a network share, which makes the contents available to the requestor (ex: Windows EID 5140 or 5145)
x_mitre_log_sources[1]['channel']EventID=31001EventCode=31001

[DC0078] Network Traffic Flow

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Summarized network packet data that captures session-level dt1Summarized network packet data that captures session-level d
>etails such as source/destination IPs, ports, protocol types>etails such as source/destination IPs, ports, protocol types
>, timestamps, and data volume, without storing full packet p>, timestamps, and data volume, without storing full packet p
>ayloads. This is commonly used for traffic analysis, anomaly>ayloads. This is commonly used for traffic analysis, anomaly
> detection, and network performance monitoring.  *Data Colle> detection, and network performance monitoring.
>ction Measures:*  - Network Flow Logs (Metadata Collection)  
>    - NetFlow          - Summarized metadata for network con 
>versations (no packet payloads).     - sFlow (Sampled Flow L 
>ogging)         - Captures sampled packets from switches and 
> routers.         - Used for real-time traffic monitoring an 
>d anomaly detection.     - Zeek (Bro) Flow Logs         - Ze 
>ek logs session-level details in logs like conn.log, http.lo 
>g, dns.log, etc. - Host-Based Collection     - Sysmon Event  
>ID 3 – Network Connection Initiated         - Logs process-l 
>evel network activity, useful for detecting malicious outbou 
>nd connections.     - AuditD (Linux) – syscall=connect       
>   - Monitors system calls for network connections. `auditct 
>l -a always,exit -F arch=b64 -S connect -k network_activity` 
> - Cloud & SaaS Flow Monitoring     - AWS VPC Flow Logs      
>    - Captures metadata for traffic between EC2 instances, s 
>ecurity groups, and internet gateways.     - Azure NSG Flow  
>Logs / Google VPC Flow Logs         - Logs ingress/egress tr 
>affic for cloud-based resources. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:34.703000+00:002025-11-12 22:03:39.105000+00:00
descriptionSummarized network packet data that captures session-level details such as source/destination IPs, ports, protocol types, timestamps, and data volume, without storing full packet payloads. This is commonly used for traffic analysis, anomaly detection, and network performance monitoring. + +*Data Collection Measures:* + +- Network Flow Logs (Metadata Collection) + - NetFlow + - Summarized metadata for network conversations (no packet payloads). + - sFlow (Sampled Flow Logging) + - Captures sampled packets from switches and routers. + - Used for real-time traffic monitoring and anomaly detection. + - Zeek (Bro) Flow Logs + - Zeek logs session-level details in logs like conn.log, http.log, dns.log, etc. +- Host-Based Collection + - Sysmon Event ID 3 – Network Connection Initiated + - Logs process-level network activity, useful for detecting malicious outbound connections. + - AuditD (Linux) – syscall=connect + - Monitors system calls for network connections. `auditctl -a always,exit -F arch=b64 -S connect -k network_activity` +- Cloud & SaaS Flow Monitoring + - AWS VPC Flow Logs + - Captures metadata for traffic between EC2 instances, security groups, and internet gateways. + - Azure NSG Flow Logs / Google VPC Flow Logs + - Logs ingress/egress traffic for cloud-based resources.Summarized network packet data that captures session-level details such as source/destination IPs, ports, protocol types, timestamps, and data volume, without storing full packet payloads. This is commonly used for traffic analysis, anomaly detection, and network performance monitoring.
x_mitre_log_sources[72]['channel']EventCode=2004,2005,2006EventCode=2004, 2005, 2006

[DC0021] OS API Execution

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Calls made by a process to operating system-provided Applicat1Calls made by a process to operating system-provided Applica
>tion Programming Interfaces (APIs). These calls are essentia>tion Programming Interfaces (APIs). These calls are essentia
>l for interacting with system resources such as memory, file>l for interacting with system resources such as memory, file
>s, and hardware, or for performing system-level tasks. Monit>s, and hardware, or for performing system-level tasks. Monit
>oring these calls can provide insight into a process's inten>oring these calls can provide insight into a process's inten
>t, especially if the process is malicious.  *Data Collection>t, especially if the process is malicious.
> Measures:*  - Endpoint Detection and Response (EDR) Tools:  
>    - Leverage tools to monitor API execution behaviors at t 
>he process level.     - Example: Sysmon Event ID 10 captures 
> API call traces for process access and memory allocation. - 
> Process Monitor (ProcMon):     - Use ProcMon to collect det 
>ailed logs of process and API activity. ProcMon can provide  
>granular details on API usage and identify malicious behavio 
>r during analysis. - Windows Event Logs:     - Use Event IDs 
> from Windows logs for specific API-related activities:      
>    - Event ID 4688: A new process has been created (can ind 
>irectly infer API use).         - Event ID 4657: A registry  
>value has been modified (to monitor registry-altering APIs). 
> - Dynamic Analysis Tools:     - Tools like Cuckoo Sandbox,  
>Flare VM, or Hybrid Analysis monitor API execution during ma 
>lware detonation. - Host-Based Logs:     - On Linux/macOS sy 
>stems, leverage audit frameworks (e.g., `auditd`, `strace`)  
>to capture and analyze system call usage that APIs map to. - 
> Runtime Monitors:     - Runtime security tools like Falco c 
>an monitor system-level calls for API execution. - Debugging 
> and Tracing:     - Use debugging tools like gdb (Linux) or  
>WinDbg (Windows) for deep tracing of API executions in real  
>time. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:36.999000+00:002025-11-12 22:03:39.105000+00:00
descriptionCalls made by a process to operating system-provided Application Programming Interfaces (APIs). These calls are essential for interacting with system resources such as memory, files, and hardware, or for performing system-level tasks. Monitoring these calls can provide insight into a process's intent, especially if the process is malicious. + +*Data Collection Measures:* + +- Endpoint Detection and Response (EDR) Tools: + - Leverage tools to monitor API execution behaviors at the process level. + - Example: Sysmon Event ID 10 captures API call traces for process access and memory allocation. +- Process Monitor (ProcMon): + - Use ProcMon to collect detailed logs of process and API activity. ProcMon can provide granular details on API usage and identify malicious behavior during analysis. +- Windows Event Logs: + - Use Event IDs from Windows logs for specific API-related activities: + - Event ID 4688: A new process has been created (can indirectly infer API use). + - Event ID 4657: A registry value has been modified (to monitor registry-altering APIs). +- Dynamic Analysis Tools: + - Tools like Cuckoo Sandbox, Flare VM, or Hybrid Analysis monitor API execution during malware detonation. +- Host-Based Logs: + - On Linux/macOS systems, leverage audit frameworks (e.g., `auditd`, `strace`) to capture and analyze system call usage that APIs map to. +- Runtime Monitors: + - Runtime security tools like Falco can monitor system-level calls for API execution. +- Debugging and Tracing: + - Use debugging tools like gdb (Linux) or WinDbg (Windows) for deep tracing of API executions in real time.Calls made by a process to operating system-provided Application Programming Interfaces (APIs). These calls are essential for interacting with system resources such as memory, files, and hardware, or for performing system-level tasks. Monitoring these calls can provide insight into a process's intent, especially if the process is malicious.
x_mitre_log_sources[19]['channel']EventCode=4656EventCode=4663, 4670, 4656

[DC0032] Process Creation

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Refers to the event in which a new process (executable) is it1Refers to the event in which a new process (executable) is i
>nitialized by an operating system. This can involve parent-c>nitialized by an operating system. This can involve parent-c
>hild process relationships, process arguments, and environme>hild process relationships, process arguments, and environme
>ntal variables. Monitoring process creation is crucial for d>ntal variables. Monitoring process creation is crucial for d
>etecting malicious behaviors, such as execution of unauthori>etecting malicious behaviors, such as execution of unauthori
>zed binaries, scripting abuse, or privilege escalation attem>zed binaries, scripting abuse, or privilege escalation attem
>pts.  *Data Collection Measures:*  - Endpoint Detection and >pts.. 
>Response (EDR) Tools:     - EDRs provide process telemetry,  
>tracking execution flows and arguments. - Windows Event Logs 
>:     - Event ID 4688 (Audit Process Creation): Captures pro 
>cess creation with associated parent process. - Sysmon (Wind 
>ows):     - Event ID 1 (Process Creation): Provides detailed 
> logging - Linux/macOS Monitoring:     - AuditD (execve sysc 
>all): Logs process creation.     - eBPF/XDP: Used for low-le 
>vel monitoring of system calls related to process execution. 
>     - OSQuery: Allows SQL-like queries to track process eve 
>nts (process_events table).     - Apple Endpoint Security Fr 
>amework (ESF): Monitors process creation on macOS. - Network 
>-Based Monitoring:     - Zeek (Bro) Logs: Captures network-b 
>ased process execution related to remote shells.     - Syslo 
>g/OSSEC: Tracks execution of processes on distributed system 
>s. - Behavioral SIEM Rules:     - Monitor process creation f 
>or uncommon binaries in user directories.     - Detect proce 
>sses with suspicious command-line arguments.  
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 19:28:39.339000+00:002025-11-12 22:03:39.105000+00:00
external_references[0]['url']https://attack.mitre.org/data-components/DC0032https://attack.mitre.org/datacomponents/DC0032
descriptionRefers to the event in which a new process (executable) is initialized by an operating system. This can involve parent-child process relationships, process arguments, and environmental variables. Monitoring process creation is crucial for detecting malicious behaviors, such as execution of unauthorized binaries, scripting abuse, or privilege escalation attempts. + +*Data Collection Measures:* + +- Endpoint Detection and Response (EDR) Tools: + - EDRs provide process telemetry, tracking execution flows and arguments. +- Windows Event Logs: + - Event ID 4688 (Audit Process Creation): Captures process creation with associated parent process. +- Sysmon (Windows): + - Event ID 1 (Process Creation): Provides detailed logging +- Linux/macOS Monitoring: + - AuditD (execve syscall): Logs process creation. + - eBPF/XDP: Used for low-level monitoring of system calls related to process execution. + - OSQuery: Allows SQL-like queries to track process events (process_events table). + - Apple Endpoint Security Framework (ESF): Monitors process creation on macOS. +- Network-Based Monitoring: + - Zeek (Bro) Logs: Captures network-based process execution related to remote shells. + - Syslog/OSSEC: Tracks execution of processes on distributed systems. +- Behavioral SIEM Rules: + - Monitor process creation for uncommon binaries in user directories. + - Detect processes with suspicious command-line arguments. Refers to the event in which a new process (executable) is initialized by an operating system. This can involve parent-child process relationships, process arguments, and environmental variables. Monitoring process creation is crucial for detecting malicious behaviors, such as execution of unauthorized binaries, scripting abuse, or privilege escalation attempts..
x_mitre_log_sources[293]['channel']EventCode=8003,8004EventCode=8003, 8004
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventlog:Security', 'channel': 'EventCode=4688'}
x_mitre_log_sources{'name': 'WinEventLog:Microsoft-Windows-Security-Auditing', 'channel': 'EventCode=4688'}
x_mitre_log_sources{'name': 'WinEventLog:security', 'channel': 'EventCode=4688'}

[DC0034] Process Metadata

Current version: 2.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:35.331000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_sources[36]['channel']EventCode=400,403EventCode=400, 403

[DC0033] Process Termination

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1The exit or termination of a running process on a system. Tht1The exit or termination of a running process on a system. Th
>is can occur due to normal operations, user-initiated comman>is can occur due to normal operations, user-initiated comman
>ds, or malicious actions such as process termination by malw>ds, or malicious actions such as process termination by malw
>are to disable security controls.  *Data Collection Measures>are to disable security controls.
>:*  - Endpoint Detection and Response (EDR) Tools:     - Mon 
>itor process termination events. - Windows Event Logs:     - 
> Event ID 4689 (Process Termination) – Captures when a proce 
>ss exits, including process ID and parent process.     - Eve 
>nt ID 7036 (Service Control Manager) – Monitors system servi 
>ce stops. - Sysmon (Windows):     - Event ID 5 (Process Term 
>ination) – Detects when a process exits, including parent-ch 
>ild relationships. - Linux/macOS Monitoring:     - AuditD (` 
>execve`, `exit_group`, `kill` syscalls) – Captures process t 
>ermination via command-line interactions.     - eBPF/XDP: Mo 
>nitors low-level system calls related to process termination 
>.     - OSQuery: The processes table can be queried for abno 
>rmal exits. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:36.181000+00:002025-11-12 22:03:39.105000+00:00
descriptionThe exit or termination of a running process on a system. This can occur due to normal operations, user-initiated commands, or malicious actions such as process termination by malware to disable security controls. + +*Data Collection Measures:* + +- Endpoint Detection and Response (EDR) Tools: + - Monitor process termination events. +- Windows Event Logs: + - Event ID 4689 (Process Termination) – Captures when a process exits, including process ID and parent process. + - Event ID 7036 (Service Control Manager) – Monitors system service stops. +- Sysmon (Windows): + - Event ID 5 (Process Termination) – Detects when a process exits, including parent-child relationships. +- Linux/macOS Monitoring: + - AuditD (`execve`, `exit_group`, `kill` syscalls) – Captures process termination via command-line interactions. + - eBPF/XDP: Monitors low-level system calls related to process termination. + - OSQuery: The processes table can be queried for abnormal exits.The exit or termination of a running process on a system. This can occur due to normal operations, user-initiated commands, or malicious actions such as process termination by malware to disable security controls.

[DC0001] Scheduled Job Creation

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1The establishment of a task or job that will execute at a prt1The establishment of a task or job that will execute at a pr
>edefined time or based on specific triggers.  *Data Collecti>edefined time or based on specific triggers.
>on Measures: *  - Windows Event Logs:     - Event ID 4698 (S 
>cheduled Task Created) – Detects the creation of new schedul 
>ed tasks.     - Event ID 4702 (Scheduled Task Updated) – Ide 
>ntifies modifications to existing scheduled jobs.     - Even 
>t ID 106 (TaskScheduler Operational Log) – Provides details  
>about scheduled task execution. - Sysmon (Windows):     - Ev 
>ent ID 1 (Process Creation) – Detects the execution of suspi 
>cious tasks started by `schtasks.exe`, `at.exe`, or `taskeng 
>.exe`. - Linux/macOS Monitoring:     - AuditD: Monitor modif 
>ications to `/etc/cron*`, `/var/spool/cron/`, and `crontab`  
>files.     - Syslog: Capture cron job execution logs from `/ 
>var/log/cron`.     - OSQuery: Query the `crontab` and `launc 
>hd` tables for scheduled job configurations. - Endpoint Dete 
>ction and Response (EDR) Tools:     - Track scheduled task c 
>reation and modification events. - SIEM & XDR Detection Rule 
>s:     - Monitor for scheduled jobs created by unusual users 
>.     - Detect tasks executing scripts from non-standard dir 
>ectories. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:35.814000+00:002025-11-12 22:03:39.105000+00:00
descriptionThe establishment of a task or job that will execute at a predefined time or based on specific triggers. + +*Data Collection Measures: * + +- Windows Event Logs: + - Event ID 4698 (Scheduled Task Created) – Detects the creation of new scheduled tasks. + - Event ID 4702 (Scheduled Task Updated) – Identifies modifications to existing scheduled jobs. + - Event ID 106 (TaskScheduler Operational Log) – Provides details about scheduled task execution. +- Sysmon (Windows): + - Event ID 1 (Process Creation) – Detects the execution of suspicious tasks started by `schtasks.exe`, `at.exe`, or `taskeng.exe`. +- Linux/macOS Monitoring: + - AuditD: Monitor modifications to `/etc/cron*`, `/var/spool/cron/`, and `crontab` files. + - Syslog: Capture cron job execution logs from `/var/log/cron`. + - OSQuery: Query the `crontab` and `launchd` tables for scheduled job configurations. +- Endpoint Detection and Response (EDR) Tools: + - Track scheduled task creation and modification events. +- SIEM & XDR Detection Rules: + - Monitor for scheduled jobs created by unusual users. + - Detect tasks executing scripts from non-standard directories.The establishment of a task or job that will execute at a predefined time or based on specific triggers.

[DC0005] Scheduled Job Metadata

Current version: 2.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-22 19:03:38.549000+00:002025-11-12 22:03:39.105000+00:00
external_references[0]['url']https://attack.mitre.org/data-components/DC0005https://attack.mitre.org/datacomponents/DC0005
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'linux:cron', 'channel': '/var/log/syslog or journalctl'}
x_mitre_log_sources{'name': 'linux::cron', 'channel': 'crontab or at job created within TimeWindow post time discovery'}

[DC0029] Script Execution

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1The execution of a text file that contains code via the intet1The execution of a text file that contains code via the inte
>rpreter.  *Data Collection Measures:*  - Windows Event Logs:>rpreter.
>     - Event ID 4104 (PowerShell Script Block Logging) – Cap 
>tures full command-line execution of PowerShell scripts.     
> - Event ID 4688 (Process Creation) – Detects script executi 
>on by tracking process launches (`powershell.exe`, `wscript. 
>exe`, `cscript.exe`).     - Event ID 5861 (Script Execution) 
> – Captures script execution via Windows Defender AMSI loggi 
>ng. - Sysmon (Windows):     - Event ID 1 (Process Creation)  
>– Monitors script execution initiated by scripting engines.  
>    - Event ID 11 (File Creation) – Detects new script files 
> written to disk before execution. - Endpoint Detection and  
>Response (EDR) Tools:     - Track script execution behavior, 
> detect obfuscated commands, and prevent malicious scripts.  
>- PowerShell Logging:     - Enable Module Logging: Logs all  
>loaded modules and cmdlets.     - Enable Script Block Loggin 
>g: Captures complete PowerShell script execution history. -  
>SIEM Detection Rules:     - Detect script execution with obf 
>uscated, encoded, or remote URLs.     - Alert on script exec 
>utions using `-EncodedCommand` or `iex(iwr)`. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:36.018000+00:002025-11-12 22:03:39.105000+00:00
descriptionThe execution of a text file that contains code via the interpreter. + +*Data Collection Measures:* + +- Windows Event Logs: + - Event ID 4104 (PowerShell Script Block Logging) – Captures full command-line execution of PowerShell scripts. + - Event ID 4688 (Process Creation) – Detects script execution by tracking process launches (`powershell.exe`, `wscript.exe`, `cscript.exe`). + - Event ID 5861 (Script Execution) – Captures script execution via Windows Defender AMSI logging. +- Sysmon (Windows): + - Event ID 1 (Process Creation) – Monitors script execution initiated by scripting engines. + - Event ID 11 (File Creation) – Detects new script files written to disk before execution. +- Endpoint Detection and Response (EDR) Tools: + - Track script execution behavior, detect obfuscated commands, and prevent malicious scripts. +- PowerShell Logging: + - Enable Module Logging: Logs all loaded modules and cmdlets. + - Enable Script Block Logging: Captures complete PowerShell script execution history. +- SIEM Detection Rules: + - Detect script execution with obfuscated, encoded, or remote URLs. + - Alert on script executions using `-EncodedCommand` or `iex(iwr)`.The execution of a text file that contains code via the interpreter.
x_mitre_log_sources[11]['channel']EventCode=4103, 4104EventCode=4103, 4104, 4105, 4106
x_mitre_log_sources[22]['channel']EventCode=4016,5312EventCode=4016, 5312

[DC0060] Service Creation

Current version: 2.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:36.315000+00:002025-11-12 22:03:39.105000+00:00
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=7045'}

[DC0041] Service Metadata

Current version: 2.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:36.382000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_sources[1]['name']WinEventLog:sysmonWinEventLog:Sysmon

[DC0065] Service Modification

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1Changes made to an existing service or daemon, such as modift1Changes made to an existing service or daemon, such as modif
>ying the service name, start type, execution parameters, or >ying the service name, start type, execution parameters, or 
>security configurations.  *Data Collection Measures: *  - Wi>security configurations.
>ndows Event Logs     - Event ID 7040 - Detects modifications 
> to the startup behavior of a service.     - Event ID 7045 - 
> Can capture changes made to existing services.     - Event  
>ID 7036 - Tracks when services start or stop, potentially in 
>dicating malicious tampering.     - Event ID 4697 - Can dete 
>ct when an adversary reinstalls a service with different par 
>ameters. - Sysmon Logs     - Sysmon Event ID 13 - Detects ch 
>anges to service configurations in the Windows Registry (e.g 
>., `HKLM\SYSTEM\CurrentControlSet\Services\`).     - Sysmon  
>Event ID 1 - Can track execution of `sc.exe` or `PowerShell  
>Set-Service`. - PowerShell Logging     - Event ID 4104 (Scri 
>pt Block Logging) - Captures execution of commands like `Set 
>-Service`, `New-Service`, or `sc config`.     - Command-Line 
> Logging (Event ID 4688) - Tracks usage of service modificat 
>ion commands:         - `sc config <service_name> start= aut 
>o`           - `sc qc <service_name>`   - Linux/macOS Collec 
>tion Methods     - Systemd Journals (`journalctl -u <service 
>_name>`) Tracks modifications to systemd service configurati 
>ons.     - Daemon Logs (`/var/log/syslog`, `/var/log/message 
>s`, `/var/log/daemon.log`) Captures changes to service state 
> and execution parameters.     - AuditD Rules for Service Mo 
>dification          - Monitor modifications to `/etc/systemd 
>/system/` for new or altered service unit files: `auditctl - 
>w /etc/systemd/system/ -p wa -k service_modification`        
>  - Track execution of `systemctl` or `service` commands: `a 
>uditctl -a always,exit -F arch=b64 -S execve -F a0=systemctl 
> -F key=service_mod`     - OSQuery for Linux/macOS Monitorin 
>g         - Query modified services using OSQuery’s `process 
>es` or `system_info` tables: `SELECT * FROM systemd_units WH 
>ERE state != 'running';`     - macOS Launch Daemon/Agent Mod 
>ification         - Monitor for changes in:             - `/ 
>Library/LaunchDaemons/`             - `/Library/LaunchAgents 
>/`         - Track modifications to `.plist` files indicatin 
>g persistence attempts. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:37.211000+00:002025-11-12 22:03:39.105000+00:00
descriptionChanges made to an existing service or daemon, such as modifying the service name, start type, execution parameters, or security configurations. + +*Data Collection Measures: * + +- Windows Event Logs + - Event ID 7040 - Detects modifications to the startup behavior of a service. + - Event ID 7045 - Can capture changes made to existing services. + - Event ID 7036 - Tracks when services start or stop, potentially indicating malicious tampering. + - Event ID 4697 - Can detect when an adversary reinstalls a service with different parameters. +- Sysmon Logs + - Sysmon Event ID 13 - Detects changes to service configurations in the Windows Registry (e.g., `HKLM\SYSTEM\CurrentControlSet\Services\`). + - Sysmon Event ID 1 - Can track execution of `sc.exe` or `PowerShell Set-Service`. +- PowerShell Logging + - Event ID 4104 (Script Block Logging) - Captures execution of commands like `Set-Service`, `New-Service`, or `sc config`. + - Command-Line Logging (Event ID 4688) - Tracks usage of service modification commands: + - `sc config start= auto` + - `sc qc ` +- Linux/macOS Collection Methods + - Systemd Journals (`journalctl -u `) Tracks modifications to systemd service configurations. + - Daemon Logs (`/var/log/syslog`, `/var/log/messages`, `/var/log/daemon.log`) Captures changes to service state and execution parameters. + - AuditD Rules for Service Modification + - Monitor modifications to `/etc/systemd/system/` for new or altered service unit files: `auditctl -w /etc/systemd/system/ -p wa -k service_modification` + - Track execution of `systemctl` or `service` commands: `auditctl -a always,exit -F arch=b64 -S execve -F a0=systemctl -F key=service_mod` + - OSQuery for Linux/macOS Monitoring + - Query modified services using OSQuery’s `processes` or `system_info` tables: `SELECT * FROM systemd_units WHERE state != 'running';` + - macOS Launch Daemon/Agent Modification + - Monitor for changes in: + - `/Library/LaunchDaemons/` + - `/Library/LaunchAgents/` + - Track modifications to `.plist` files indicating persistence attempts.Changes made to an existing service or daemon, such as modifying the service name, start type, execution parameters, or security configurations.

[DC0002] User Account Authentication

Current version: 2.0

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Old Description
New Description
t1An attempt (successful and failed login attempts) by a user,t1An attempt (successful and failed login attempts) by a user,
> service, or application to gain access to a network, system> service, or application to gain access to a network, system
>, or cloud-based resource. This typically involves credentia>, or cloud-based resource. This typically involves credentia
>ls such as passwords, tokens, multi-factor authentication (M>ls such as passwords, tokens, multi-factor authentication (M
>FA), or biometric validation.  *Data Collection Measures:*  >FA), or biometric validation.
>- Host-Based Authentication Logs     - Windows Event Logs    
>      - Event ID 4776 – NTLM authentication attempt.         
> - Event ID 4624 – Successful user logon.         - Event ID 
> 4625 – Failed authentication attempt.         - Event ID 46 
>48 – Explicit logon with alternate credentials.     - Linux/ 
>macOS Authentication Logs         - `/var/log/auth.log`, `/v 
>ar/log/secure` – Logs SSH, sudo, and other authentication at 
>tempts.         - AuditD – Tracks authentication events via  
>PAM modules.         - macOS Unified Logs – `/var/db/diagnos 
>tics` captures authentication failures. - Cloud Authenticati 
>on Logs     - Azure AD Logs         - Sign-in Logs – Tracks  
>authentication attempts, MFA challenges, and conditional acc 
>ess failures.         - Audit Logs – Captures authentication 
>-related configuration changes.         - Microsoft Graph AP 
>I – Provides real-time sign-in analytics.     - Google Works 
>pace & Office 365         - Google Admin Console – `User Log 
>in Report` tracks login attempts and failures.         - Off 
>ice 365 Unified Audit Logs – Captures logins across Exchange 
>, SharePoint, and Teams.     - AWS CloudTrail & IAM          
>- Tracks authentication via `AWS IAM AuthenticateUser` and ` 
>sts:GetSessionToken`.         - Logs failed authentications  
>to AWS Management Console and API requests. - Container Auth 
>entication Monitoring     - Kubernetes Authentication Logs   
>       - kubectl audit logs – Captures authentication attemp 
>ts for service accounts and admin users.         - Azure Kub 
>ernetes Service (AKS) and Google Kubernetes Engine (GKE) – L 
>ogs IAM authentication events. 
Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:14:34.948000+00:002025-11-12 22:03:39.105000+00:00
descriptionAn attempt (successful and failed login attempts) by a user, service, or application to gain access to a network, system, or cloud-based resource. This typically involves credentials such as passwords, tokens, multi-factor authentication (MFA), or biometric validation. + +*Data Collection Measures:* + +- Host-Based Authentication Logs + - Windows Event Logs + - Event ID 4776 – NTLM authentication attempt. + - Event ID 4624 – Successful user logon. + - Event ID 4625 – Failed authentication attempt. + - Event ID 4648 – Explicit logon with alternate credentials. + - Linux/macOS Authentication Logs + - `/var/log/auth.log`, `/var/log/secure` – Logs SSH, sudo, and other authentication attempts. + - AuditD – Tracks authentication events via PAM modules. + - macOS Unified Logs – `/var/db/diagnostics` captures authentication failures. +- Cloud Authentication Logs + - Azure AD Logs + - Sign-in Logs – Tracks authentication attempts, MFA challenges, and conditional access failures. + - Audit Logs – Captures authentication-related configuration changes. + - Microsoft Graph API – Provides real-time sign-in analytics. + - Google Workspace & Office 365 + - Google Admin Console – `User Login Report` tracks login attempts and failures. + - Office 365 Unified Audit Logs – Captures logins across Exchange, SharePoint, and Teams. + - AWS CloudTrail & IAM + - Tracks authentication via `AWS IAM AuthenticateUser` and `sts:GetSessionToken`. + - Logs failed authentications to AWS Management Console and API requests. +- Container Authentication Monitoring + - Kubernetes Authentication Logs + - kubectl audit logs – Captures authentication attempts for service accounts and admin users. + - Azure Kubernetes Service (AKS) and Google Kubernetes Engine (GKE) – Logs IAM authentication events.An attempt (successful and failed login attempts) by a user, service, or application to gain access to a network, system, or cloud-based resource. This typically involves credentials such as passwords, tokens, multi-factor authentication (MFA), or biometric validation.
x_mitre_log_sources[12]['name']m365:signinm365:signinlogs
x_mitre_log_sources[15]['channel']EventCode=4769,1200,1202EventCode=4776, 4625
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4769, 1200, 1202'}
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4624, 4625'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4625, 4624'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': '4624, 4625'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventID=4625'}

[DC0063] Windows Registry Key Modification

Current version: 2.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-22 18:34:46.572000+00:002025-11-12 22:03:39.105000+00:00
external_references[0]['url']https://attack.mitre.org/data-components/DC0063https://attack.mitre.org/datacomponents/DC0063
x_mitre_log_sources[3]['channel']EventCode=4663EventCode=4663, 4670, 4656
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_sources{'name': 'WinEventLog:Sysmon', 'channel': 'EventCode=13'}
x_mitre_log_sources{'name': 'WinEventLog:Sysmon', 'channel': 'EventCode=14'}
x_mitre_log_sources{'name': 'WinEventLog:Security', 'channel': 'EventCode=4670'}

Detection Strategies

enterprise-attack

Patches

[DET0897] Detection of Selective Exclusion

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-23 20:53:44.184000+00:002025-11-12 22:03:39.105000+00:00
external_references[0]['url']https://attack.mitre.org/detection-strategies/DET0897https://attack.mitre.org/detectionstrategies/DET0897

[DET0898] Detection of Spoofed User-Agent

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-23 19:55:18.990000+00:002025-11-12 22:03:39.105000+00:00
external_references[0]['url']https://attack.mitre.org/detection-strategies/DET0898https://attack.mitre.org/detectionstrategies/DET0898

Analytics

enterprise-attack

Patches

[AN0001] Analytic 0001

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['name']CloudTrail:GetInstanceIdentityDocumentAWS:CloudTrail

[AN0002] Analytic 0002

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=3EventCode=3, 22

[AN0009] Analytic 0009

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-22 18:36:42.025000+00:002025-11-12 17:36:06.423000+00:00
x_mitre_log_source_references[0]['channel']EvenCode=4657EventCode=4657

[AN0014] Analytic 0014

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']/var/log/syslog or journalctlcron activity

[AN0021] Analytic 0021

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[3]['channel']EventCode=13EventCode=13, 14

[AN0030] Analytic 0030

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=3EventCode=3, 22

[AN0037] Analytic 0037

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106

[AN0040] Analytic 0040

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4663EventCode=4663, 4670, 4656

[AN0043] Analytic 0043

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']PutObject, CopyObjectGetObject, CopyObject

[AN0061] Analytic 0061

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[3]['name']WinEventLog:sysmonWinEventLog:Sysmon

[AN0065] Analytic 0065

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4663EventCode=4663, 4670, 4656

[AN0071] Analytic 0071

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[3]['channel']EventCode=3EventCode=3, 22

[AN0072] Analytic 0072

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']Modification of .asar in /opt or ~/.config directoriesEventCode=11

[AN0074] Analytic 0074

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=13EventCode=13, 14

[AN0075] Analytic 0075

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22

[AN0080] Analytic 0080

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=3EventCode=3, 22

[AN0089] Analytic 0089

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106

[AN0094] Analytic 0094

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=13EventCode=13, 14

[AN0100] Analytic 0100

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=3EventCode=3, 22
x_mitre_log_source_references[1]['channel']Event ID 1EventCode=1

[AN0105] Analytic 0105

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4656, 4663EventCode=4663, 4670, 4656

[AN0109] Analytic 0109

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]{'x_mitre_data_component_ref': 'x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba', 'name': 'WinEventLog:Sysmon', 'channel': 'EventCode=22'}{'x_mitre_data_component_ref': 'x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba', 'name': 'WinEventLog:Sysmon', 'channel': 'EventCode=3, 22'}
x_mitre_log_source_references[1]{'x_mitre_data_component_ref': 'x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077', 'name': 'WinEventLog:Security', 'channel': 'EventCode=1'}{'x_mitre_data_component_ref': 'x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077', 'name': 'WinEventLog:Sysmon', 'channel': 'EventCode=1'}

[AN0118] Analytic 0118

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-22 18:38:17.503000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[3]['channel']EventCode=3EventCode=3, 22

[AN0123] Analytic 0123

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=22EventCode=3, 22
x_mitre_log_source_references[3]['channel']EventCode=13EventCode=13, 14

[AN0130] Analytic 0130

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4663EventCode=4663, 4670, 4656
x_mitre_log_source_references[3]['channel']EventCode=3EventCode=3, 22

[AN0131] Analytic 0131

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106
x_mitre_log_source_references[3]['channel']EventCode=3EventCode=3, 22

[AN0133] Analytic 0133

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4663EventCode=4663, 4670, 4656

[AN0137] Analytic 0137

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[3]['channel']EventCode=13EventCode=13, 14

[AN0139] Analytic 0139

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4663EventCode=4663, 4670, 4656

[AN0147] Analytic 0147

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4624EventCode=4624, 4648

[AN0151] Analytic 0151

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106

[AN0152] Analytic 0152

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['name']WinEventLog:PowershellWinEventLog:PowerShell
x_mitre_log_source_references[2]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106

[AN0158] Analytic 0158

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=3EventCode=3, 22

[AN0159] Analytic 0159

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']netconnectconnect

[AN0162] Analytic 0162

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[3]['channel']EventCode=4656,4663EventCode=4663, 4670, 4656

[AN0165] Analytic 0165

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=3EventCode=3, 22

[AN0170] Analytic 0170

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=13,14EventCode=13, 14

[AN0178] Analytic 0178

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22

[AN0182] Analytic 0182

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106

[AN0184] Analytic 0184

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4663EventCode=4663, 4670, 4656

[AN0185] Analytic 0185

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[5]['channel']EventCode=22EventCode=3, 22

[AN0194] Analytic 0194

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventID=31001EventCode=31001

[AN0198] Analytic 0198

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']PutObject, CopyObjectGetObject, CopyObject

[AN0199] Analytic 0199

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4670, 4663EventCode=4663, 4670, 4656
x_mitre_log_source_references[2]['channel']EventCode=4624EventCode=4624, 4648
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_source_references{'x_mitre_data_component_ref': 'x-mitre-data-component--d27b0089-2c39-4b6c-84ff-303e48657e77', 'name': 'WinEventLog:DirectoryService', 'channel': 'EventID 5136'}

[AN0204] Analytic 0204

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=3EventCode=3, 22

[AN0212] Analytic 0212

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=3EventCode=3, 22

[AN0216] Analytic 0216

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=3EventCode=3, 22

[AN0219] Analytic 0219

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[3]['channel']EventCode=3EventCode=3, 22

[AN0226] Analytic 0226

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22

[AN0227] Analytic 0227

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']open or connectconnect

[AN0229] Analytic 0229

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4670, 4663EventCode=4663, 4670, 4656

[AN0235] Analytic 0235

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=13EventCode=13, 14

[AN0236] Analytic 0236

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['name']WinEventLog:Microsoft-Windows-WMI-Activity/OperationalWinEventLog:WMI
x_mitre_log_source_references[0]['channel']EventCode=5861EventCode=5857, 5858, 5860, 5861

[AN0238] Analytic 0238

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=22EventCode=3, 22

[AN0240] Analytic 0240

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=13EventCode=13, 14

[AN0243] Analytic 0243

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4656EventCode=4663, 4670, 4656
x_mitre_log_source_references[3]['channel']EventCode=13EventCode=13, 14

[AN0247] Analytic 0247

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-27 15:59:01.140000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['name']WinEventLog:Microsoft-Windows-Partition/DiagnosticWinEventLog:System

[AN0251] Analytic 0251

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=13EventCode=13, 14
x_mitre_log_source_references[3]['channel']EventCode=3EventCode=3, 22

[AN0254] Analytic 0254

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106

[AN0271] Analytic 0271

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106

[AN0274] Analytic 0274

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22
x_mitre_log_source_references[2]['channel']EventCode=4103,4104EventCode=4103, 4104, 4105, 4106

[AN0279] Analytic 0279

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']pathPATH

[AN0282] Analytic 0282

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4656EventCode=4663, 4670, 4656

[AN0286] Analytic 0286

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4624EventCode=4624, 4648
x_mitre_log_source_references[2]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106

[AN0292] Analytic 0292

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-27 15:59:35.823000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=5145, 4663EventCode=4663, 4670, 4656

[AN0298] Analytic 0298

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=3EventCode=3, 22

[AN0301] Analytic 0301

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['name']azure:signinLogsazure:signinlogs

[AN0302] Analytic 0302

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=3EventCode=3, 22

[AN0320] Analytic 0320

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=3EventCode=3, 22

[AN0323] Analytic 0323

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=13EventCode=13, 14

[AN0325] Analytic 0325

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']/var/log/syslog or journalctlcron activity

[AN0327] Analytic 0327

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=7031,7034,1000,1001EventCode=1000
x_mitre_log_source_references[2]['channel']EventCode=3EventCode=3, 22

[AN0331] Analytic 0331

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22
x_mitre_log_source_references[2]['channel']EventCode=4663EventCode=4663, 4670, 4656

[AN0334] Analytic 0334

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4723, 4724, 4726, 4740EventCode=4723, 4724, 4740

[AN0338] Analytic 0338

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['name']m365:signinm365:signinlogs

[AN0341] Analytic 0341

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=13EventCode=13, 14

[AN0342] Analytic 0342

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=4663EventCode=4663, 4670, 4656
x_mitre_log_source_references[3]['channel']EventCode=1006,10001EventCode=1006, 10001

[AN0345] Analytic 0345

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22
x_mitre_log_source_references[2]['channel']EventCode=4103, 4104EventCode=4103, 4104, 4105, 4106

[AN0346] Analytic 0346

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22

[AN0355] Analytic 0355

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['name']WinEventLog:SecurityWinEventLog:System

[AN0360] Analytic 0360

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=13EventCode=13, 14

[AN0363] Analytic 0363

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106

[AN0367] Analytic 0367

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=3EventCode=3, 22

[AN0370] Analytic 0370

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']PutObject, GetObject, CopyObject, DeleteObjectGetObject, CopyObject

[AN0379] Analytic 0379

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=3EventCode=3, 22

[AN0388] Analytic 0388

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106

[AN0392] Analytic 0392

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4663EventCode=4663, 4670, 4656
x_mitre_log_source_references[2]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106

[AN0400] Analytic 0400

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22

[AN0405] Analytic 0405

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4624, 4634, 4672, 4768, 4769EventCode=4672, 4634
x_mitre_log_source_references[1]['name']WinEventLog:KerberosWinEventLog:Security
x_mitre_log_source_references[1]['channel']EventCode=4769, 4768EventCode=4769

[AN0406] Analytic 0406

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=13EventCode=13, 14

[AN0418] Analytic 0418

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]{'x_mitre_data_component_ref': 'x-mitre-data-component--39b9db72-8b48-4595-a18d-db5bbba3091b', 'name': 'azure:signinLogs', 'channel': 'SAML-based login with anomalous issuer or NotOnOrAfter lifetime'}{'x_mitre_data_component_ref': 'x-mitre-data-component--39b9db72-8b48-4595-a18d-db5bbba3091b', 'name': 'azure:signinlogs', 'channel': 'SAML-based login with anomalous issuer or NotOnOrAfter lifetime'}
x_mitre_log_source_references[1]{'x_mitre_data_component_ref': 'x-mitre-data-component--a953ca55-921a-44f7-9b8d-3d40141aa17e', 'name': 'WinEventLog:Security', 'channel': 'EventCode=4769,1200,1202'}{'x_mitre_data_component_ref': 'x-mitre-data-component--a953ca55-921a-44f7-9b8d-3d40141aa17e', 'name': 'WinEventLog:Security', 'channel': 'EventCode=4769, 1200, 1202'}

[AN0420] Analytic 0420

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4624EventCode=4624, 4648

[AN0423] Analytic 0423

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=3EventCode=3, 22
x_mitre_log_source_references[2]['channel']EventCode=4663EventCode=4663, 4670, 4656

[AN0428] Analytic 0428

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 17:35:05.178000+00:00
iterable_item_removed
STIX FieldOld valueNew Value
x_mitre_log_source_references{'x_mitre_data_component_ref': 'x-mitre-data-component--0f72bf50-35b3-419d-ab95-70f9b6a818dd', 'name': 'WinEventLog:Security', 'channel': '4673, 4674'}

[AN0430] Analytic 0430

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[4]['channel']EventCode=4103EventCode=4103, 4104, 4105, 4106

[AN0431] Analytic 0431

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[3]['name']linux::cronlinux:cron
x_mitre_log_source_references[3]['channel']crontab or at job created within TimeWindow post time discoverycron activity

[AN0436] Analytic 0436

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22
x_mitre_log_source_references[2]['channel']EventCode=4663EventCode=4663, 4670, 4656

[AN0441] Analytic 0441

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=13EventCode=13, 14

[AN0444] Analytic 0444

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=4624EventCode=4624, 4648

[AN0445] Analytic 0445

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=3EventCode=3, 22

[AN0446] Analytic 0446

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['name']WinEventLog:Microsoft-Windows-DriverFrameworks-UserMode/OperationalWinEventLog:System

[AN0455] Analytic 0455

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106

[AN0462] Analytic 0462

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=3EventCode=3, 22

[AN0469] Analytic 0469

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106
x_mitre_log_source_references[2]['channel']EventCode=4663EventCode=4663, 4670, 4656

[AN0472] Analytic 0472

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106

[AN0484] Analytic 0484

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4624EventCode=4624, 4648

[AN0485] Analytic 0485

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22

[AN0489] Analytic 0489

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22

[AN0498] Analytic 0498

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4624EventCode=4624, 4648
x_mitre_log_source_references[2]['channel']EventCode=3EventCode=3, 22

[AN0504] Analytic 0504

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4624EventCode=4624, 4648

[AN0507] Analytic 0507

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106

[AN0513] Analytic 0513

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22
x_mitre_log_source_references[3]['channel']EventCode=4103EventCode=4103, 4104, 4105, 4106

[AN0520] Analytic 0520

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=13EventCode=13, 14

[AN0535] Analytic 0535

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=13EventCode=13, 14

[AN0540] Analytic 0540

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=1000-1026EventCode=1000

[AN0551] Analytic 0551

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106

[AN0555] Analytic 0555

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[3]['channel']EventCode=4656,4663EventCode=4663, 4670, 4656

[AN0559] Analytic 0559

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106

[AN0564] Analytic 0564

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22

[AN0568] Analytic 0568

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22
x_mitre_log_source_references[4]['channel']EventCode=4656EventCode=4663, 4670, 4656

[AN0576] Analytic 0576

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22

[AN0580] Analytic 0580

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-27 16:01:17.493000+00:002025-11-12 17:13:52.357000+00:00
x_mitre_log_source_references[2]['channel']13EventCode=13

[AN0589] Analytic 0589

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=13EventCode=13, 14
x_mitre_log_source_references[2]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106

[AN0590] Analytic 0590

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=3EventCode=3, 22

[AN0596] Analytic 0596

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=3EventCode=3, 22

[AN0602] Analytic 0602

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EvenCode=2EventCode=2

[AN0616] Analytic 0616

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=4663EventCode=4663, 4670, 4656

[AN0619] Analytic 0619

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['name']WinEventlog:SecurityWinEventLog:Security

[AN0622] Analytic 0622

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[4]['channel']EventCode=13EventCode=13, 14
x_mitre_log_source_references[6]['channel']EventCode=3EventCode=3, 22
x_mitre_log_source_references[7]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106

[AN0628] Analytic 0628

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=4656EventCode=4663, 4670, 4656

[AN0629] Analytic 0629

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['name']WinEventLog:SystemWinEventLog:Sysmon
x_mitre_log_source_references[5]['channel']EventCode=13EventCode=13, 14

[AN0633] Analytic 0633

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=5156EventCode=5156, 5157

[AN0637] Analytic 0637

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=3EventCode=3, 22

[AN0641] Analytic 0641

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106

[AN0648] Analytic 0648

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=4663EventCode=4663, 4670, 4656

[AN0651] Analytic 0651

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=3EventCode=3, 22

[AN0653] Analytic 0653

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['name']macos:unifiedmacos:unifiedlog

[AN0655] Analytic 0655

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[3]['channel']EventCode=3EventCode=3, 22

[AN0662] Analytic 0662

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4663EventCode=4663, 4670, 4656

[AN0666] Analytic 0666

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']GetObjectGetObject, CopyObject

[AN0671] Analytic 0671

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 18:12:53.100000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4886, 4887, 4899, 4900, 4768, 4624EventCode=4768

[AN0674] Analytic 0674

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['name']azure:SigninLogsazure:signinlogs

[AN0675] Analytic 0675

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4624, 4634, 4672, 4769EventCode=4672, 4634

[AN0677] Analytic 0677

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=3EventCode=3, 22

[AN0687] Analytic 0687

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]{'x_mitre_data_component_ref': 'x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170', 'name': 'WinEventLog:Sysmon', 'channel': 'EventCode=13'}{'x_mitre_data_component_ref': 'x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170', 'name': 'WinEventLog:Sysmon', 'channel': 'EventCode=13, 14'}
x_mitre_log_source_references[0]{'x_mitre_data_component_ref': 'x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6', 'name': 'WinEventLog:Sysmon', 'channel': 'EventCode=10, 7'}{'x_mitre_data_component_ref': 'x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6', 'name': 'WinEventLog:Sysmon', 'channel': 'EventCode=10'}
x_mitre_log_source_references[1]{'x_mitre_data_component_ref': 'x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5', 'name': 'WinEventLog:Security', 'channel': 'EventCode=4624 with LogonType=9 or smartcard logon'}{'x_mitre_data_component_ref': 'x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5', 'name': 'WinEventLog:Security', 'channel': 'EventCode=4624, 4648'}

[AN0690] Analytic 0690

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['name']CloudTrail:RunInstancesAWS:CloudTrail

[AN0692] Analytic 0692

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['name']CloudTrail:RunInstancesAWS:CloudTrail
x_mitre_log_source_references[0]['channel']RunInstances: AMI not in allowlist OR AMI owner != enterprise owner/accountRunInstances

[AN0694] Analytic 0694

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=13EventCode=13, 14

[AN0702] Analytic 0702

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=3EventCode=3, 22

[AN0705] Analytic 0705

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4656EventCode=4663, 4670, 4656

[AN0712] Analytic 0712

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4663EventCode=4663, 4670, 4656

[AN0714] Analytic 0714

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22

[AN0718] Analytic 0718

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['name']azure:signinLogsazure:signinlogs

[AN0719] Analytic 0719

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4624EventCode=4624, 4648

[AN0723] Analytic 0723

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['name']m365:signinm365:signinlogs

[AN0724] Analytic 0724

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=4663EventCode=4663, 4670, 4656

[AN0728] Analytic 0728

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]{'x_mitre_data_component_ref': 'x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba', 'name': 'WinEventLog:Sysmon', 'channel': 'EventCode=22'}{'x_mitre_data_component_ref': 'x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba', 'name': 'WinEventLog:Sysmon', 'channel': 'EventCode=3, 22'}
x_mitre_log_source_references[1]{'x_mitre_data_component_ref': 'x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077', 'name': 'WinEventLog:Security', 'channel': 'EventCode=1'}{'x_mitre_data_component_ref': 'x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077', 'name': 'WinEventLog:Sysmon', 'channel': 'EventCode=1'}

[AN0737] Analytic 0737

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106
x_mitre_log_source_references[2]['channel']EventCode=4663EventCode=4663, 4670, 4656

[AN0741] Analytic 0741

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=3EventCode=3, 22

[AN0744] Analytic 0744

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['name']CloudWatch:MetricsAWS:CloudWatch

[AN0750] Analytic 0750

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4624 (LogonType=10 or 3), EventCode=4648EventCode=4624, 4648
x_mitre_log_source_references[2]['channel']EventCode=3EventCode=3, 22

[AN0755] Analytic 0755

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=5136,5137,5138,5139,5141EventCode=5136
x_mitre_log_source_references[1]['channel']EventCode=4670EventCode=4663, 4670, 4656

[AN0757] Analytic 0757

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=4624EventCode=4624, 4648

[AN0759] Analytic 0759

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=3EventCode=3, 22

[AN0764] Analytic 0764

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=13EventCode=13, 14

[AN0778] Analytic 0778

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=13EventCode=13, 14

[AN0785] Analytic 0785

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=3EventCode=3, 22

[AN0786] Analytic 0786

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4624, 4672EventCode=4672, 4634
x_mitre_log_source_references[4]['name']WinEventLog:DirectoryServiceWinEventLog:Security

[AN0787] Analytic 0787

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4663EventCode=4663, 4670, 4656
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22

[AN0791] Analytic 0791

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4624 (LogonType=3)EventCode=4624, 4648
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22

[AN0792] Analytic 0792

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4624EventCode=4624, 4648

[AN0797] Analytic 0797

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[3]['channel']EventCode=3EventCode=3, 22

[AN0814] Analytic 0814

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 17:10:37.357000+00:00
x_mitre_log_source_references[1]['name']WinEventLog:Directory ServiceWinEventLog:Security

[AN0816] Analytic 0816

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['name']CloudTrail:UpdatePolicyAWS:CloudTrail

[AN0823] Analytic 0823

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]{'x_mitre_data_component_ref': 'x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170', 'name': 'WinEventLog:Security', 'channel': 'EventCode=4670'}{'x_mitre_data_component_ref': 'x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170', 'name': 'WinEventLog:Security', 'channel': 'EventCode=4663, 4670, 4656'}
x_mitre_log_source_references[1]{'x_mitre_data_component_ref': 'x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba', 'name': 'WinEventLog:Sysmon', 'channel': 'EventCode=3'}{'x_mitre_data_component_ref': 'x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba', 'name': 'WinEventLog:Sysmon', 'channel': 'EventCode=3, 22'}

[AN0834] Analytic 0834

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4670EventCode=4663, 4670, 4656
x_mitre_log_source_references[2]['channel']EventCode=4663EventCode=4663, 4670, 4656
x_mitre_log_source_references[4]['channel']EventCode=4103,4104EventCode=4103, 4104, 4105, 4106

[AN0841] Analytic 0841

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['name']WinEventLog:Microsoft-Windows-Partition/DiagnosticWinEventLog:System

[AN0842] Analytic 0842

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22
x_mitre_log_source_references[2]['channel']EventCode=2004,2005,2006EventCode=2004, 2005, 2006

[AN0847] Analytic 0847

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']pathPATH

[AN0850] Analytic 0850

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=1000, 1001, 1002EventCode=1000

[AN0854] Analytic 0854

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=5136,5137,5138,5139,5141EventCode=5136
x_mitre_log_source_references[1]['channel']EventCode=4670EventCode=4663, 4670, 4656

[AN0856] Analytic 0856

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=4624EventCode=4624, 4648

[AN0861] Analytic 0861

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 18:16:01.708000+00:00

[AN0862] Analytic 0862

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[4]['channel']EventCode=13EventCode=13, 14
x_mitre_log_source_references[5]['channel']EventCode=22EventCode=3, 22

[AN0871] Analytic 0871

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['name']WinEventLog:Microsoft-Windows-Security-AuditingWinEventLog:Security
x_mitre_log_source_references[2]['channel']EventCode=13EventCode=13, 14

[AN0880] Analytic 0880

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=13EventCode=13, 14

[AN0895] Analytic 0895

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4663EventCode=4663, 4670, 4656
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22

[AN0903] Analytic 0903

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106

[AN0922] Analytic 0922

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=3EventCode=3, 22

[AN0927] Analytic 0927

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22
x_mitre_log_source_references[2]['channel']EventCode=4103, 4104EventCode=4103, 4104, 4105, 4106

[AN0928] Analytic 0928

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22

[AN0931] Analytic 0931

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4624 (LogonType=10), EventCode=4648EventCode=4624, 4648
x_mitre_log_source_references[2]['channel']EventCode=3EventCode=3, 22

[AN0932] Analytic 0932

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22
x_mitre_log_source_references[5]['channel']EventCode=13EventCode=13, 14

[AN0933] Analytic 0933

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[3]['channel']EventCode=13EventCode=13, 14

[AN0937] Analytic 0937

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 18:17:38.273000+00:00
x_mitre_log_source_references[1]['channel']PutBackupVaultAccessPolicyDeleteBucket, DeleteDBCluster, DeleteSnapshot, TerminateInstances

[AN0954] Analytic 0954

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4624, 4672, 4648EventCode=4624, 4648

[AN0956] Analytic 0956

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['name']azure:signinLogsazure:signinlogs

[AN0962] Analytic 0962

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106
x_mitre_log_source_references[3]['channel']EventCode=3EventCode=3, 22

[AN0968] Analytic 0968

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[3]['channel']EventCode=3EventCode=3, 22

[AN0969] Analytic 0969

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=3EventCode=3, 22

[AN0972] Analytic 0972

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['name']CloudWatch:InstanceMetricsAWS:CloudWatch

[AN0975] Analytic 0975

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=13EventCode=13, 14

[AN0978] Analytic 0978

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['name']azure:signinLogsazure:signinlogs

[AN0988] Analytic 0988

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22
x_mitre_log_source_references[3]['channel']EventCode=4663EventCode=4663, 4670, 4656

[AN1000] Analytic 1000

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=4624EventCode=4624, 4648

[AN1001] Analytic 1001

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=13EventCode=13, 14

[AN1004] Analytic 1004

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4624, 4625EventCode=4776, 4625
x_mitre_log_source_references[2]['channel']EventCode=3EventCode=3, 22

[AN1015] Analytic 1015

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106
x_mitre_log_source_references[2]['channel']EventCode=5156EventCode=5156, 5157

[AN1020] Analytic 1020

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=3EventCode=3, 22

[AN1025] Analytic 1025

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106

[AN1028] Analytic 1028

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[3]['channel']EventCode=13EventCode=13, 14
x_mitre_log_source_references[5]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106
x_mitre_log_source_references[6]['channel']EventCode=3EventCode=3, 22

[AN1030] Analytic 1030

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[4]['channel']EventCode=13EventCode=13, 14

[AN1031] Analytic 1031

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22
x_mitre_log_source_references[2]['channel']EventCode=5857, 5858EventCode=5857, 5858, 5860, 5861

[AN1032] Analytic 1032

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=13EventCode=13, 14

[AN1034] Analytic 1034

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=4016,5312EventCode=4016, 5312

[AN1057] Analytic 1057

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22

[AN1061] Analytic 1061

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['name']WinEventLog:SecurityWinEventLog:System

[AN1064] Analytic 1064

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-10-29 17:10:15.891000+00:00
iterable_item_added
STIX FieldOld valueNew Value
x_mitre_log_source_references{'x_mitre_data_component_ref': 'x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077', 'name': 'WinEventLog:Sysmon', 'channel': 'EventCode=1'}

[AN1077] Analytic 1077

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4720, EventCode=4781EventCode=4720

[AN1091] Analytic 1091

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=3EventCode=3, 22

[AN1094] Analytic 1094

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=13EventCode=13, 14

[AN1108] Analytic 1108

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=4624EventCode=4624, 4648

[AN1113] Analytic 1113

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]{'x_mitre_data_component_ref': 'x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077', 'name': 'WinEventLog:security', 'channel': 'EventCode=4688'}{'x_mitre_data_component_ref': 'x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077', 'name': 'WinEventLog:Security', 'channel': 'EventCode=4688'}
x_mitre_log_source_references[1]{'x_mitre_data_component_ref': 'x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba', 'name': 'WinEventLog:Sysmon', 'channel': 'EventCode=3'}{'x_mitre_data_component_ref': 'x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba', 'name': 'WinEventLog:Sysmon', 'channel': 'EventCode=3, 22'}

[AN1118] Analytic 1118

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22

[AN1121] Analytic 1121

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=22EventCode=3, 22

[AN1134] Analytic 1134

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=3EventCode=3, 22

[AN1137] Analytic 1137

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4624EventCode=4624, 4648

[AN1140] Analytic 1140

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=3EventCode=3, 22

[AN1144] Analytic 1144

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']4624EventCode=4624, 4648
x_mitre_log_source_references[2]['channel']EventCode=3EventCode=3, 22

[AN1148] Analytic 1148

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=5156EventCode=5156, 5157

[AN1153] Analytic 1153

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=13EventCode=13, 14

[AN1157] Analytic 1157

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['name']CloudTrail:GetSecretValueAWS:CloudTrail
x_mitre_log_source_references[1]['channel']API call to retrieve secret or access keyGetSecretValue

[AN1161] Analytic 1161

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22

[AN1168] Analytic 1168

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['name']CloudTrail:InvokeFunctionAWS:CloudTrail
x_mitre_log_source_references[2]['name']CloudMetrics:InstanceHealthAWS:CloudMetrics

[AN1169] Analytic 1169

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=3EventCode=3, 22

[AN1177] Analytic 1177

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4670EventCode=4663, 4670, 4656
x_mitre_log_source_references[4]['channel']EventCode=4103,4104,4105, 4106EventCode=4103, 4104, 4105, 4106
x_mitre_log_source_references[5]['name']WinEventLog:Microsoft-Windows-WMI-Activity/OperationalWinEventLog:WMI
x_mitre_log_source_references[5]['channel']EventCode=5857, 5860, 5861EventCode=5857, 5858, 5860, 5861

[AN1178] Analytic 1178

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=22EventCode=3, 22

[AN1185] Analytic 1185

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=13EventCode=13, 14
x_mitre_log_source_references[3]['channel']EventCode=3EventCode=3, 22

[AN1189] Analytic 1189

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=3EventCode=3, 22

[AN1198] Analytic 1198

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4656EventCode=4663, 4670, 4656

[AN1207] Analytic 1207

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[4]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106
x_mitre_log_source_references[5]['channel']EventCode=3EventCode=3, 22

[AN1212] Analytic 1212

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4663EventCode=4663, 4670, 4656

[AN1220] Analytic 1220

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106

[AN1221] Analytic 1221

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[4]['channel']EventCode=13EventCode=13, 14

[AN1222] Analytic 1222

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['name']WinEventLog:ApplicationWinEventLog:CodeIntegrity
x_mitre_log_source_references[2]['channel']81,3033EventCode=3033

[AN1225] Analytic 1225

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22

[AN1229] Analytic 1229

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=3EventCode=3, 22

[AN1234] Analytic 1234

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_mutable_elements[2]['field']pathPATH

[AN1242] Analytic 1242

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['name']CloudTrail:EC2AWS:CloudTrail
x_mitre_log_source_references[1]['name']CloudTrail:EC2AWS:CloudTrail

[AN1252] Analytic 1252

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106
x_mitre_log_source_references[2]['channel']EventCode=400,403EventCode=400, 403

[AN1253] Analytic 1253

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[3]['channel']EventCode=4624, 4672EventCode=4672, 4634
x_mitre_log_source_references[4]['name']WinEventLog:DirectoryServiceWinEventLog:Security

[AN1254] Analytic 1254

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=3EventCode=3, 22

[AN1259] Analytic 1259

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 18:15:01.136000+00:00
x_mitre_log_source_references[0]['channel']EventCode=5136,5137,5141EventCode=5136

[AN1260] Analytic 1260

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['name']azure:signinLogsazure:signinlogs

[AN1271] Analytic 1271

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4663EventCode=4663, 4670, 4656
x_mitre_log_source_references[1]['channel']EventCode=13EventCode=13, 14

[AN1275] Analytic 1275

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4625, 4624EventCode=4776, 4625

[AN1280] Analytic 1280

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106

[AN1283] Analytic 1283

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4624EventCode=4624, 4648

[AN1288] Analytic 1288

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4103EventCode=4103, 4104, 4105, 4106

[AN1290] Analytic 1290

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=1341,1342,1020,1063EventCode=1341, 1342, 1020, 1063

[AN1294] Analytic 1294

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=3EventCode=3, 22

[AN1305] Analytic 1305

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4624,4648, 4672EventCode=4624, 4648
x_mitre_log_source_references[2]['channel']EventCode=3EventCode=3, 22
x_mitre_log_source_references[5]['channel']EventCode=5857, 5860, 5861EventCode=5857, 5858, 5860, 5861
x_mitre_log_source_references[6]['channel']EventCode=4103EventCode=4103, 4104, 4105, 4106

[AN1308] Analytic 1308

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[3]['channel']EventCode=3EventCode=3, 22

[AN1309] Analytic 1309

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106
x_mitre_log_source_references[3]['channel']EventCode=3EventCode=3, 22

[AN1313] Analytic 1313

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4624EventCode=4624, 4648

[AN1314] Analytic 1314

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=1000,1001EventCode=1000
x_mitre_log_source_references[3]['channel']EventCode=3EventCode=3, 22

[AN1325] Analytic 1325

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106

[AN1328] Analytic 1328

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']GetObjectGetObject, CopyObject

[AN1331] Analytic 1331

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=22EventCode=3, 22

[AN1335] Analytic 1335

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=3EventCode=3, 22

[AN1344] Analytic 1344

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]{'x_mitre_data_component_ref': 'x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba', 'name': 'WinEventLog:Sysmon', 'channel': 'EventCode=3'}{'x_mitre_data_component_ref': 'x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba', 'name': 'WinEventLog:Sysmon', 'channel': 'EventCode=3, 22'}
x_mitre_log_source_references[0]{'x_mitre_data_component_ref': 'x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5', 'name': 'WinEventLog:Security', 'channel': 'EventCode=4624,4648,4672,4769'}{'x_mitre_data_component_ref': 'x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5', 'name': 'WinEventLog:Security', 'channel': 'EventCode=4624, 4648'}
x_mitre_log_source_references[1]{'x_mitre_data_component_ref': 'x-mitre-data-component--39b9db72-8b48-4595-a18d-db5bbba3091b', 'name': 'WinEventLog:Security', 'channel': 'EventCode=4776,4771,4770'}{'x_mitre_data_component_ref': 'x-mitre-data-component--39b9db72-8b48-4595-a18d-db5bbba3091b', 'name': 'WinEventLog:Security', 'channel': 'EventCode=4776, 4771, 4770'}
x_mitre_log_source_references[3]{'x_mitre_data_component_ref': 'x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa', 'name': 'WinEventLog:Security', 'channel': 'EventCode=4663'}{'x_mitre_data_component_ref': 'x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa', 'name': 'WinEventLog:Security', 'channel': 'EventCode=4663, 4670, 4656'}

[AN1357] Analytic 1357

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4656EventCode=4663, 4670, 4656

[AN1361] Analytic 1361

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4624EventCode=4624, 4648

[AN1366] Analytic 1366

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[3]['channel']EventCode=13EventCode=13, 14
x_mitre_log_source_references[5]['channel']EventCode=3EventCode=3, 22

[AN1367] Analytic 1367

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=3EventCode=3, 22

[AN1369] Analytic 1369

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['name']WinEventLog:SecurityWinEventLog:System
x_mitre_log_source_references[2]['channel']EventCode=13EventCode=13, 14

[AN1375] Analytic 1375

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-10-28 19:57:23.683000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4624,4672EventCode=4672

[AN1376] Analytic 1376

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=3EventCode=3, 22

[AN1381] Analytic 1381

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=3EventCode=3, 22

[AN1384] Analytic 1384

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=13EventCode=13, 14

[AN1389] Analytic 1389

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=3EventCode=3, 22

[AN1393] Analytic 1393

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=4656EventCode=4663, 4670, 4656

[AN1397] Analytic 1397

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22

[AN1398] Analytic 1398

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=4624EventCode=4624, 4648
x_mitre_log_source_references[6]['channel']EventCode=3EventCode=3, 22

[AN1407] Analytic 1407

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=3EventCode=3, 22

[AN1410] Analytic 1410

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4663EventCode=4663, 4670, 4656
x_mitre_log_source_references[1]['channel']EventCode=20001/20003EventCode=2003

[AN1413] Analytic 1413

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=3EventCode=3, 22
x_mitre_log_source_references[2]['channel']EventCode=4663EventCode=4663, 4670, 4656

[AN1417] Analytic 1417

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4663EventCode=4663, 4670, 4656

[AN1434] Analytic 1434

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=3EventCode=3, 22

[AN1440] Analytic 1440

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106

[AN1443] Analytic 1443

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4624, 4672, 4634, 4768, 4769EventCode=4672, 4634

[AN1448] Analytic 1448

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22
x_mitre_log_source_references[2]['channel']EventCode=2004,2005,2006EventCode=2004, 2005, 2006
x_mitre_log_source_references[3]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106

[AN1452] Analytic 1452

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106

[AN1461] Analytic 1461

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106

[AN1464] Analytic 1464

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106
x_mitre_log_source_references[2]['channel']EventCode=3EventCode=3, 22

[AN1468] Analytic 1468

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4624 (LogonType=3)EventCode=4624, 4648
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22

[AN1476] Analytic 1476

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]{'x_mitre_data_component_ref': 'x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba', 'name': 'WinEventLog:Microsoft-Windows-WLAN-AutoConfig', 'channel': '8001, 8002, 8003'}{'x_mitre_data_component_ref': 'x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba', 'name': 'WinEventLog:Microsoft-Windows-WLAN-AutoConfig', 'channel': 'EventCode=8001, 8002, 8003'}
x_mitre_log_source_references[1]{'x_mitre_data_component_ref': 'x-mitre-data-component--a953ca55-921a-44f7-9b8d-3d40141aa17e', 'name': 'WinEventLog:Security', 'channel': '4624, 4625'}{'x_mitre_data_component_ref': 'x-mitre-data-component--a953ca55-921a-44f7-9b8d-3d40141aa17e', 'name': 'WinEventLog:Security', 'channel': 'EventCode=4776, 4625'}

[AN1483] Analytic 1483

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=3EventCode=3, 22

[AN1489] Analytic 1489

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22

[AN1496] Analytic 1496

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22

[AN1506] Analytic 1506

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['name']m365:signinm365:signinlogs

[AN1511] Analytic 1511

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22

[AN1527] Analytic 1527

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=13EventCode=13, 14

[AN1528] Analytic 1528

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=4663EventCode=4663, 4670, 4656

[AN1543] Analytic 1543

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-27 15:56:07.094000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventID=4624EventCode=4624
x_mitre_log_source_references[1]['channel']EventID=4625EventCode=4776, 4625

[AN1548] Analytic 1548

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22

[AN1551] Analytic 1551

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=4624EventCode=4624, 4648
x_mitre_log_source_references[3]['channel']EventCode=3EventCode=3, 22
x_mitre_log_source_references[7]['channel']EventCode=13EventCode=13, 14
x_mitre_log_source_references[8]['channel']EventCode=5857, 5860, 5861EventCode=5857, 5858, 5860, 5861
x_mitre_log_source_references[9]['channel']EventCode=4103, 4104EventCode=4103, 4104, 4105, 4106

[AN1557] Analytic 1557

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4103EventCode=4103, 4104, 4105, 4106

[AN1564] Analytic 1564

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22

[AN1567] Analytic 1567

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]{'x_mitre_data_component_ref': 'x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0', 'name': 'WinEventLog:PowerShell', 'channel': 'EventCode=4104'}{'x_mitre_data_component_ref': 'x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0', 'name': 'WinEventLog:PowerShell', 'channel': 'EventCode=4103, 4104, 4105, 4106'}
x_mitre_log_source_references[0]{'x_mitre_data_component_ref': 'x-mitre-data-component--3d6e6b3b-4aa8-40e1-8c47-91db0f313d9f', 'name': 'WinEventLog:System', 'channel': '20001-20003'}{'x_mitre_data_component_ref': 'x-mitre-data-component--3d6e6b3b-4aa8-40e1-8c47-91db0f313d9f', 'name': 'WinEventLog:System', 'channel': 'EventCode=2003'}
x_mitre_log_source_references[1]{'x_mitre_data_component_ref': 'x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077', 'name': 'WinEventLog:Security', 'channel': '4688, 4104'}{'x_mitre_data_component_ref': 'x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077', 'name': 'WinEventLog:Security', 'channel': 'EventCode=4688'}

[AN1571] Analytic 1571

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4663EventCode=4663, 4670, 4656
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22

[AN1575] Analytic 1575

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=13EventCode=13, 14

[AN1583] Analytic 1583

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22

[AN1589] Analytic 1589

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106

[AN1594] Analytic 1594

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']GetObjectGetObject, CopyObject

[AN1595] Analytic 1595

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=13EventCode=13, 14

[AN1599] Analytic 1599

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=3EventCode=3, 22

[AN1620] Analytic 1620

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4624, 4634EventCode=4624, 4648
x_mitre_log_source_references[2]['channel']EventCode=3EventCode=3, 22

[AN1621] Analytic 1621

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106

[AN1622] Analytic 1622

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4663EventCode=4663, 4670, 4656

[AN1625] Analytic 1625

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[2]['channel']GetObjectGetObject, CopyObject

[AN1626] Analytic 1626

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=15 EventCode=15
x_mitre_log_source_references[1]['channel']EventCode=4663EventCode=4663, 4670, 4656

[AN1632] Analytic 1632

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-21 15:10:28.402000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['name']WinEventLog:DirectoryServiceWinEventLog:Security

[AN2029] Analytic 2029

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-24 15:00:29.811000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[1]['channel']EventCode=3EventCode=3, 22

[AN2030] Analytic 2030

Current version: 1.0

Details
values_changed
STIX FieldOld valueNew Value
modified2025-10-23 20:07:29.933000+00:002025-11-12 22:03:39.105000+00:00
x_mitre_log_source_references[0]['channel']EventCode=4104EventCode=4103, 4104, 4105, 4106
x_mitre_log_source_references[2]['channel']EventCode=4670EventCode=4663, 4670, 4656
+ + + \ No newline at end of file diff --git a/modules/resources/docs/changelogs/v18.0-v18.1/changelog.json b/modules/resources/docs/changelogs/v18.0-v18.1/changelog.json new file mode 100644 index 00000000000..dee782752a2 --- /dev/null +++ b/modules/resources/docs/changelogs/v18.0-v18.1/changelog.json @@ -0,0 +1,47246 @@ +{ + "enterprise-attack": { + "techniques": { + "additions": [], + "major_version_changes": [], + "minor_version_changes": [], + "other_version_changes": [], + "patches": [ + { + "type": "attack-pattern", + "id": "attack-pattern--b5327dd1-6bf9-4785-a199-25bcbd1f4a9d", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2020-06-29 15:36:41.535000+00:00", + "modified": "2025-11-05 15:22:05.269000+00:00", + "name": "Run Virtual Instance", + "description": "Adversaries may carry out malicious operations using a virtual instance to avoid detection. A wide variety of virtualization technologies exist that allow for the emulation of a computer or computing environment. By running malicious code inside of a virtual instance, adversaries can hide artifacts associated with their behavior from security tools that are unable to monitor activity inside the virtual instance.(Citation: CyberCX Akira Ransomware) Additionally, depending on the virtual networking implementation (ex: bridged adapter), network traffic generated by the virtual instance can be difficult to trace back to the compromised host as the IP address and hostname might not match known values.(Citation: SingHealth Breach Jan 2019)\n\nAdversaries may utilize native support for virtualization (ex: Hyper-V), deploy lightweight emulators (ex: QEMU), or drop the necessary files to run a virtual instance (ex: VirtualBox binaries).(Citation: Securonix CronTrap 2024) After running a virtual instance, adversaries may create a shared folder between the guest and host with permissions that enable the virtual instance to interact with the host file system.(Citation: Sophos Ragnar May 2020)\n\nThreat actors may also leverage temporary virtualized environments such as the Windows Sandbox, which supports the use of `.wsb` configuration files for defining execution parameters. For example, the `` property supports the creation of a shared folder, while the `` property allows the specification of a payload.(Citation: ESET MirrorFace 2025)(Citation: ITOCHU Hack the Sandbox)(Citation: ITOCHU Sandbox PPT)\n\nIn VMWare environments, adversaries may leverage the vCenter console to create new virtual machines. However, they may also create virtual machines directly on ESXi servers by running a valid `.vmx` file with the `/bin/vmx` utility. Adding this command to `/etc/rc.local.d/local.sh` (i.e., [RC Scripts](https://attack.mitre.org/techniques/T1037/004)) will cause the VM to persistently restart.(Citation: vNinja Rogue VMs 2024) Creating a VM this way prevents it from appearing in the vCenter console or in the output to the `vim-cmd vmsvc/getallvms` command on the ESXi server, thereby hiding it from typical administrative activities.(Citation: MITRE VMware Abuse 2024)", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "defense-evasion" + } + ], + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/techniques/T1564/006", + "external_id": "T1564.006" + }, + { + "source_name": "ESET MirrorFace 2025", + "description": " Dominik Breitenbacher. (2025, March 18). Operation AkaiRy\u016b: MirrorFace invites Europe to Expo 2025 and revives ANEL backdoor. Retrieved May 22, 2025.", + "url": "https://www.welivesecurity.com/en/eset-research/operation-akairyu-mirrorface-invites-europe-expo-2025-revives-anel-backdoor/" + }, + { + "source_name": "vNinja Rogue VMs 2024", + "description": "Christian Mohn. (2024, November 11). Beware Of The Rogue VMs!. Retrieved March 26, 2025.", + "url": "https://vninja.net/2024/11/11/beware-of-the-rogue-vms/" + }, + { + "source_name": "SingHealth Breach Jan 2019", + "description": "Committee of Inquiry into the Cyber Attack on SingHealth. (2019, January 10). Public Report of the Committee of Inquiry into the Cyber Attack on Singapore Health Services Private Limited's Patient Database. Retrieved June 29, 2020.", + "url": "https://www.mci.gov.sg/-/media/mcicorp/doc/report-of-the-coi-into-the-cyber-attack-on-singhealth-10-jan-2019.ashx" + }, + { + "source_name": "CyberCX Akira Ransomware", + "description": "CyberCX. (2023, September 15). Weaponising VMs to bypass EDR \u2013 Akira ransomware. Retrieved April 4, 2025.", + "url": "https://cybercx.com.au/blog/akira-ransomware/" + }, + { + "source_name": "Securonix CronTrap 2024", + "description": "Den Iuzvyk and Tim Peck. (2024, November 4). CRON#TRAP: Emulated Linux Environments as the Latest Tactic in Malware Staging. Retrieved May 22, 2025.", + "url": "https://www.securonix.com/blog/crontrap-emulated-linux-environments-as-the-latest-tactic-in-malware-staging/" + }, + { + "source_name": "ITOCHU Hack the Sandbox", + "description": "ITOCHU Cyber & Intelligence Inc.. (2025, March 12). Hack The Sandbox: Unveiling the Truth Behind Disappearing Artifacts. Retrieved November 5, 2025.", + "url": "https://blog-en.itochuci.co.jp/entry/2025/03/12/140000" + }, + { + "source_name": "ITOCHU Sandbox PPT", + "description": "ITOCHU Cyber & Intelligence Inc.. (n.d.). Hack The Sandbox: Unveiling the Truth Behind Disappearing Artifacts. Retrieved November 5, 2025.", + "url": "https://jsac.jpcert.or.jp/archive/2025/pdf/JSAC2025_2_9_kamekawa_sasada_niwa_en.pdf" + }, + { + "source_name": "MITRE VMware Abuse 2024", + "description": "Lex Crumpton. (2024, May 22). Infiltrating Defenses: Abusing VMware in MITRE\u2019s Cyber Intrusion. Retrieved March 26, 2025.", + "url": "https://medium.com/mitre-engenuity/infiltrating-defenses-abusing-vmware-in-mitres-cyber-intrusion-4ea647b83f5b" + }, + { + "source_name": "Sophos Ragnar May 2020", + "description": "SophosLabs. (2020, May 21). Ragnar Locker ransomware deploys virtual machine to dodge security. Retrieved June 29, 2020.", + "url": "https://news.sophos.com/en-us/2020/05/21/ragnar-locker-ransomware-deploys-virtual-machine-to-dodge-security/" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_contributors": [ + "Johann Rehberger", + "Janantha Marasinghe", + "Menachem Shafran, XM Cyber", + "Enis Aksu", + "Satoshi Kamekawa, ITOCHU Cyber & Intelligence Inc.", + "Yusuke Niwa, ITOCHU Cyber & Intelligence Inc.", + "Shuhei Sasada, ITOCHU Cyber & Intelligence Inc.", + "Jiraput Thamsongkrah", + "Purinut Wongwaiwuttiguldej", + "Natthawut Saexu" + ], + "x_mitre_deprecated": false, + "x_mitre_detection": "", + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_platforms": [ + "Linux", + "macOS", + "Windows", + "ESXi" + ], + "x_mitre_version": "1.3", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-05 15:22:05.269000+00:00\", \"old_value\": \"2025-10-24 17:49:15.607000+00:00\"}, \"root['description']\": {\"new_value\": \"Adversaries may carry out malicious operations using a virtual instance to avoid detection. A wide variety of virtualization technologies exist that allow for the emulation of a computer or computing environment. By running malicious code inside of a virtual instance, adversaries can hide artifacts associated with their behavior from security tools that are unable to monitor activity inside the virtual instance.(Citation: CyberCX Akira Ransomware) Additionally, depending on the virtual networking implementation (ex: bridged adapter), network traffic generated by the virtual instance can be difficult to trace back to the compromised host as the IP address and hostname might not match known values.(Citation: SingHealth Breach Jan 2019)\\n\\nAdversaries may utilize native support for virtualization (ex: Hyper-V), deploy lightweight emulators (ex: QEMU), or drop the necessary files to run a virtual instance (ex: VirtualBox binaries).(Citation: Securonix CronTrap 2024) After running a virtual instance, adversaries may create a shared folder between the guest and host with permissions that enable the virtual instance to interact with the host file system.(Citation: Sophos Ragnar May 2020)\\n\\nThreat actors may also leverage temporary virtualized environments such as the Windows Sandbox, which supports the use of `.wsb` configuration files for defining execution parameters. For example, the `` property supports the creation of a shared folder, while the `` property allows the specification of a payload.(Citation: ESET MirrorFace 2025)(Citation: ITOCHU Hack the Sandbox)(Citation: ITOCHU Sandbox PPT)\\n\\nIn VMWare environments, adversaries may leverage the vCenter console to create new virtual machines. However, they may also create virtual machines directly on ESXi servers by running a valid `.vmx` file with the `/bin/vmx` utility. Adding this command to `/etc/rc.local.d/local.sh` (i.e., [RC Scripts](https://attack.mitre.org/techniques/T1037/004)) will cause the VM to persistently restart.(Citation: vNinja Rogue VMs 2024) Creating a VM this way prevents it from appearing in the vCenter console or in the output to the `vim-cmd vmsvc/getallvms` command on the ESXi server, thereby hiding it from typical administrative activities.(Citation: MITRE VMware Abuse 2024)\", \"old_value\": \"Adversaries may carry out malicious operations using a virtual instance to avoid detection. A wide variety of virtualization technologies exist that allow for the emulation of a computer or computing environment. By running malicious code inside of a virtual instance, adversaries can hide artifacts associated with their behavior from security tools that are unable to monitor activity inside the virtual instance.(Citation: CyberCX Akira Ransomware) Additionally, depending on the virtual networking implementation (ex: bridged adapter), network traffic generated by the virtual instance can be difficult to trace back to the compromised host as the IP address and hostname might not match known values.(Citation: SingHealth Breach Jan 2019)\\n\\nAdversaries may utilize native support for virtualization (ex: Hyper-V), deploy lightweight emulators (ex: QEMU), or drop the necessary files to run a virtual instance (ex: VirtualBox binaries).(Citation: Securonix CronTrap 2024) After running a virtual instance, adversaries may create a shared folder between the guest and host with permissions that enable the virtual instance to interact with the host file system.(Citation: Sophos Ragnar May 2020)\\n\\nThreat actors may also leverage temporary virtualized environments such as the Windows Sandbox, which supports the use of `.wsb` configuration files for defining execution parameters. For example, the `` property supports the creation of a shared folder, while the `` property allows the specification of a payload.(Citation: ESET MirrorFace 2025)\\n\\nIn VMWare environments, adversaries may leverage the vCenter console to create new virtual machines. However, they may also create virtual machines directly on ESXi servers by running a valid `.vmx` file with the `/bin/vmx` utility. Adding this command to `/etc/rc.local.d/local.sh` (i.e., [RC Scripts](https://attack.mitre.org/techniques/T1037/004)) will cause the VM to persistently restart.(Citation: vNinja Rogue VMs 2024) Creating a VM this way prevents it from appearing in the vCenter console or in the output to the `vim-cmd vmsvc/getallvms` command on the ESXi server, thereby hiding it from typical administrative activities.(Citation: MITRE VMware Abuse 2024)\", \"diff\": \"--- \\n+++ \\n@@ -2,6 +2,6 @@\\n \\n Adversaries may utilize native support for virtualization (ex: Hyper-V), deploy lightweight emulators (ex: QEMU), or drop the necessary files to run a virtual instance (ex: VirtualBox binaries).(Citation: Securonix CronTrap 2024) After running a virtual instance, adversaries may create a shared folder between the guest and host with permissions that enable the virtual instance to interact with the host file system.(Citation: Sophos Ragnar May 2020)\\n \\n-Threat actors may also leverage temporary virtualized environments such as the Windows Sandbox, which supports the use of `.wsb` configuration files for defining execution parameters. For example, the `` property supports the creation of a shared folder, while the `` property allows the specification of a payload.(Citation: ESET MirrorFace 2025)\\n+Threat actors may also leverage temporary virtualized environments such as the Windows Sandbox, which supports the use of `.wsb` configuration files for defining execution parameters. For example, the `` property supports the creation of a shared folder, while the `` property allows the specification of a payload.(Citation: ESET MirrorFace 2025)(Citation: ITOCHU Hack the Sandbox)(Citation: ITOCHU Sandbox PPT)\\n \\n In VMWare environments, adversaries may leverage the vCenter console to create new virtual machines. However, they may also create virtual machines directly on ESXi servers by running a valid `.vmx` file with the `/bin/vmx` utility. Adding this command to `/etc/rc.local.d/local.sh` (i.e., [RC Scripts](https://attack.mitre.org/techniques/T1037/004)) will cause the VM to persistently restart.(Citation: vNinja Rogue VMs 2024) Creating a VM this way prevents it from appearing in the vCenter console or in the output to the `vim-cmd vmsvc/getallvms` command on the ESXi server, thereby hiding it from typical administrative activities.(Citation: MITRE VMware Abuse 2024)\"}, \"root['external_references'][6]['source_name']\": {\"new_value\": \"ITOCHU Sandbox PPT\", \"old_value\": \"Shadowbunny VM Defense Evasion\", \"new_path\": \"root['external_references'][7]['source_name']\"}, \"root['external_references'][6]['description']\": {\"new_value\": \"ITOCHU Cyber & Intelligence Inc.. (n.d.). Hack The Sandbox: Unveiling the Truth Behind Disappearing Artifacts. Retrieved November 5, 2025.\", \"old_value\": \"Johann Rehberger. (2020, September 23). Beware of the Shadowbunny - Using virtual machines to persist and evade detections. Retrieved September 22, 2021.\", \"new_path\": \"root['external_references'][7]['description']\"}, \"root['external_references'][6]['url']\": {\"new_value\": \"https://jsac.jpcert.or.jp/archive/2025/pdf/JSAC2025_2_9_kamekawa_sasada_niwa_en.pdf\", \"old_value\": \"https://embracethered.com/blog/posts/2020/shadowbunny-virtual-machine-red-teaming-technique/\", \"new_path\": \"root['external_references'][7]['url']\"}}, \"iterable_item_added\": {\"root['external_references'][6]\": {\"source_name\": \"ITOCHU Hack the Sandbox\", \"description\": \"ITOCHU Cyber & Intelligence Inc.. (2025, March 12). Hack The Sandbox: Unveiling the Truth Behind Disappearing Artifacts. Retrieved November 5, 2025.\", \"url\": \"https://blog-en.itochuci.co.jp/entry/2025/03/12/140000\"}}}", + "previous_version": "1.3", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Adversaries may carry out malicious operations using a virtut1Adversaries may carry out malicious operations using a virtu
>al instance to avoid detection. A wide variety of virtualiza>al instance to avoid detection. A wide variety of virtualiza
>tion technologies exist that allow for the emulation of a co>tion technologies exist that allow for the emulation of a co
>mputer or computing environment. By running malicious code i>mputer or computing environment. By running malicious code i
>nside of a virtual instance, adversaries can hide artifacts >nside of a virtual instance, adversaries can hide artifacts 
>associated with their behavior from security tools that are >associated with their behavior from security tools that are 
>unable to monitor activity inside the virtual instance.(Cita>unable to monitor activity inside the virtual instance.(Cita
>tion: CyberCX Akira Ransomware) Additionally, depending on t>tion: CyberCX Akira Ransomware) Additionally, depending on t
>he virtual networking implementation (ex: bridged adapter), >he virtual networking implementation (ex: bridged adapter), 
>network traffic generated by the virtual instance can be dif>network traffic generated by the virtual instance can be dif
>ficult to trace back to the compromised host as the IP addre>ficult to trace back to the compromised host as the IP addre
>ss and hostname might not match known values.(Citation: Sing>ss and hostname might not match known values.(Citation: Sing
>Health Breach Jan 2019)  Adversaries may utilize native supp>Health Breach Jan 2019)  Adversaries may utilize native supp
>ort for virtualization (ex: Hyper-V), deploy lightweight emu>ort for virtualization (ex: Hyper-V), deploy lightweight emu
>lators (ex: QEMU), or drop the necessary files to run a virt>lators (ex: QEMU), or drop the necessary files to run a virt
>ual instance (ex: VirtualBox binaries).(Citation: Securonix >ual instance (ex: VirtualBox binaries).(Citation: Securonix 
>CronTrap 2024) After running a virtual instance, adversaries>CronTrap 2024) After running a virtual instance, adversaries
> may create a shared folder between the guest and host with > may create a shared folder between the guest and host with 
>permissions that enable the virtual instance to interact wit>permissions that enable the virtual instance to interact wit
>h the host file system.(Citation: Sophos Ragnar May 2020)  T>h the host file system.(Citation: Sophos Ragnar May 2020)  T
>hreat actors may also leverage temporary virtualized environ>hreat actors may also leverage temporary virtualized environ
>ments such as the Windows Sandbox, which supports the use of>ments such as the Windows Sandbox, which supports the use of
> `.wsb` configuration files for defining execution parameter> `.wsb` configuration files for defining execution parameter
>s. For example, the `<MappedFolder>` property supports the c>s. For example, the `<MappedFolder>` property supports the c
>reation of a shared folder, while the `<LogonCommand>` prope>reation of a shared folder, while the `<LogonCommand>` prope
>rty allows the specification of a payload.(Citation: ESET Mi>rty allows the specification of a payload.(Citation: ESET Mi
>rrorFace 2025)  In VMWare environments, adversaries may leve>rrorFace 2025)(Citation: ITOCHU Hack the Sandbox)(Citation: 
>rage the vCenter console to create new virtual machines. How>ITOCHU Sandbox PPT)  In VMWare environments, adversaries may
>ever, they may also create virtual machines directly on ESXi> leverage the vCenter console to create new virtual machines
> servers by running a valid `.vmx` file with the `/bin/vmx` >. However, they may also create virtual machines directly on
>utility. Adding this command to `/etc/rc.local.d/local.sh` (> ESXi servers by running a valid `.vmx` file with the `/bin/
>i.e., [RC Scripts](https://attack.mitre.org/techniques/T1037>vmx` utility. Adding this command to `/etc/rc.local.d/local.
>/004)) will cause the VM to persistently restart.(Citation: >sh` (i.e., [RC Scripts](https://attack.mitre.org/techniques/
>vNinja Rogue VMs 2024) Creating a VM this way prevents it fr>T1037/004)) will cause the VM to persistently restart.(Citat
>om appearing in the vCenter console or in the output to the >ion: vNinja Rogue VMs 2024) Creating a VM this way prevents 
>`vim-cmd vmsvc/getallvms` command on the ESXi server, thereb>it from appearing in the vCenter console or in the output to
>y hiding it from typical administrative activities.(Citation> the `vim-cmd vmsvc/getallvms` command on the ESXi server, t
>: MITRE VMware Abuse 2024)>hereby hiding it from typical administrative activities.(Cit
 >ation: MITRE VMware Abuse 2024)
", + "changelog_mitigations": { + "shared": [ + "M1038: Execution Prevention", + "M1042: Disable or Remove Feature or Program", + "M1047: Audit" + ], + "new": [], + "dropped": [] + }, + "changelog_datacomponent_detections": { + "shared": [], + "new": [], + "dropped": [] + }, + "changelog_detectionstrategy_detections": { + "shared": [ + "DET0321: Detection Strategy for Hidden Virtual Instance Execution" + ], + "new": [], + "dropped": [] + } + }, + { + "type": "attack-pattern", + "id": "attack-pattern--2fee9321-3e71-4cf4-af24-d4d40d355b34", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2020-03-13 18:11:08.357000+00:00", + "modified": "2025-11-06 17:52:37.747000+00:00", + "name": "DLL", + "description": "Adversaries may abuse dynamic-link library files (DLLs) in order to achieve persistence, escalate privileges, and evade defenses. DLLs are libraries that contain code and data that can be simultaneously utilized by multiple programs. While DLLs are not malicious by nature, they can be abused through mechanisms such as side-loading, hijacking search order, and phantom DLL hijacking.(Citation: unit 42)\n\nSpecific ways DLLs are abused by adversaries include:\n\n### DLL Sideloading\nAdversaries may execute their own malicious payloads by side-loading DLLs. Side-loading involves hijacking which DLL a program loads by planting and then invoking a legitimate application that executes their payload(s).\n\nSide-loading positions both the victim application and malicious payload(s) alongside each other. Adversaries likely use side-loading as a means of masking actions they perform under a legitimate, trusted, and potentially elevated system or software process. Benign executables used to side-load payloads may not be flagged during delivery and/or execution. Adversary payloads may also be encrypted/packed or otherwise obfuscated until loaded into the memory of the trusted process.\n\nAdversaries may also side-load other packages, such as BPLs (Borland Package Library).(Citation: kroll bpl)\n\nAdversaries may chain DLL sideloading multiple times to fragment functionality hindering analysis. Adversaries using multiple DLL files can split the loader functions across different DLLs, with a main DLL loading the separated export functions. (Citation: Virus Bulletin) Spreading loader functions across multiple DLLs makes analysis harder, since all files must be collected to fully understand the malware\u2019s behavior. Another method implements a \u201cloader-for-a-loader\u201d, where a malicious DLL\u2019s sole role is to load a second DLL (or a chain of DLLs) that contain the real payload. (Citation: Sophos)\n\n### DLL Search Order Hijacking\nAdversaries may execute their own malicious payloads by hijacking the search order that Windows uses to load DLLs. This search order is a sequence of special and standard search locations that a program checks when loading a DLL. An adversary can plant a trojan DLL in a directory that will be prioritized by the DLL search order over the location of a legitimate library. This will cause Windows to load the malicious DLL when it is called for by the victim program.(Citation: unit 42)\n\n### DLL Redirection\nAdversaries may directly modify the search order via DLL redirection, which after being enabled (in the Registry or via the creation of a redirection file) may cause a program to load a DLL from a different location.(Citation: Microsoft redirection)(Citation: Microsoft - manifests/assembly)\n\n### Phantom DLL Hijacking\nAdversaries may leverage phantom DLL hijacking by targeting references to non-existent DLL files. They may be able to load their own malicious DLL by planting it with the correct name in the location of the missing module.(Citation: Hexacorn DLL Hijacking)(Citation: Hijack DLLs CrowdStrike)\n\n### DLL Substitution\nAdversaries may target existing, valid DLL files and substitute them with their own malicious DLLs, planting them with the same name and in the same location as the valid DLL file.(Citation: Wietze Beukema DLL Hijacking)\n\nPrograms that fall victim to DLL hijacking may appear to behave normally because malicious DLLs may be configured to also load the legitimate DLLs they were meant to replace, evading defenses.\n\nRemote DLL hijacking can occur when a program sets its current directory to a remote location, such as a Web share, before loading a DLL.(Citation: dll pre load owasp)(Citation: microsoft remote preloading)\n\nIf a valid DLL is configured to run at a higher privilege level, then the adversary-controlled DLL that is loaded will also be executed at the higher level. In this case, the technique could be used for privilege escalation.", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "persistence" + }, + { + "kill_chain_name": "mitre-attack", + "phase_name": "privilege-escalation" + }, + { + "kill_chain_name": "mitre-attack", + "phase_name": "defense-evasion" + } + ], + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/techniques/T1574/001", + "external_id": "T1574.001" + }, + { + "source_name": "Hijack DLLs CrowdStrike", + "description": " falcon.overwatch.team. (2022, December 30). 4 Ways Adversaries Hijack DLLs \u2014 and How CrowdStrike Falcon OverWatch Fights Back. Retrieved January 30, 2025.", + "url": "https://www.crowdstrike.com/en-us/blog/4-ways-adversaries-hijack-dlls/" + }, + { + "source_name": "kroll bpl", + "description": "Dave Truman. (2024, June 24). Novel Technique Combination Used In IDATLOADER Distribution. Retrieved January 30, 2025.", + "url": "https://www.kroll.com/en/insights/publications/cyber/idatloader-distribution" + }, + { + "source_name": "Sophos", + "description": "Gabor Szappanos. (2023, May 3). A doubled \u201cDragon Breath\u201d adds new air to DLL sideloading attacks. Retrieved October 3, 2025.", + "url": "https://news.sophos.com/en-us/2023/05/03/doubled-dll-sideloading-dragon-breath/" + }, + { + "source_name": "Hexacorn DLL Hijacking", + "description": "Hexacorn. (2013, December 8). Beyond good ol\u2019 Run key, Part 5. Retrieved August 14, 2024.", + "url": "https://www.hexacorn.com/blog/2013/12/08/beyond-good-ol-run-key-part-5/" + }, + { + "source_name": "microsoft remote preloading", + "description": "Microsoft. (2014, May 13). Microsoft Security Advisory 2269637: Insecure Library Loading Could Allow Remote Code Execution. Retrieved January 30, 2025.", + "url": "https://learn.microsoft.com/en-us/security-updates/securityadvisories/2010/2269637" + }, + { + "source_name": "Microsoft - manifests/assembly", + "description": "Microsoft. (2021, January 7). Manifests. Retrieved January 30, 2025.", + "url": "https://learn.microsoft.com/en-us/windows/win32/sbscs/manifests?redirectedfrom=MSDN" + }, + { + "source_name": "Microsoft redirection", + "description": "Microsoft. (2023, October 12). Dynamic-link library redirection. Retrieved January 30, 2025.", + "url": "https://learn.microsoft.com/en-us/windows/win32/dlls/dynamic-link-library-redirection?redirectedfrom=MSDN" + }, + { + "source_name": "dll pre load owasp", + "description": "OWASP. (n.d.). Binary Planting. Retrieved January 30, 2025.", + "url": "https://owasp.org/www-community/attacks/Binary_planting" + }, + { + "source_name": "Virus Bulletin", + "description": "Suguru Ishimaru, Hajime Yanagishita, Yusuke Niwa. (2023, October 5). Unveiling activities of Tropic Trooper 2023: deep analysis of Xiangoop Loader and EntryShell payload. Retrieved October 3, 2025.", + "url": "https://www.virusbulletin.com/conference/vb2023/abstracts/unveiling-activities-tropic-trooper-2023-deep-analysis-xiangoop-loader-and-entryshell-payload/" + }, + { + "source_name": "unit 42", + "description": "Tom Fakterman, Chen Erlich, & Assaf Dahan. (2024, February 22). Intruders in the Library: Exploring DLL Hijacking. Retrieved January 30, 2025.", + "url": "https://unit42.paloaltonetworks.com/dll-hijacking-techniques/" + }, + { + "source_name": "Wietze Beukema DLL Hijacking", + "description": "Wietze Beukema. (2020, June 22). Hijacking DLLs in Windows. Retrieved April 8, 2025.", + "url": "https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_contributors": [ + "Travis Smith, Tripwire", + "Stefan Kanthak", + "Marina Liang", + "Ami Holeston, CrowdStrike", + "Will Alexander, CrowdStrike", + "Wietze Beukema @Wietze", + "Yusuke Niwa, ITOCHU Cyber & Intelligence Inc.", + "Suguru Ishimaru, ITOCHU Cyber & Intelligence Inc.", + "Hajime Yanagishita, Macnica, Inc." + ], + "x_mitre_deprecated": false, + "x_mitre_detection": "", + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_is_subtechnique": true, + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "2.1", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-06 17:52:37.747000+00:00\", \"old_value\": \"2025-10-24 17:48:35.900000+00:00\"}}, \"iterable_item_added\": {\"root['x_mitre_contributors'][6]\": \"Yusuke Niwa, ITOCHU Cyber & Intelligence Inc.\", \"root['x_mitre_contributors'][7]\": \"Suguru Ishimaru, ITOCHU Cyber & Intelligence Inc.\", \"root['x_mitre_contributors'][8]\": \"Hajime Yanagishita, Macnica, Inc.\"}}", + "previous_version": "2.1", + "changelog_mitigations": { + "shared": [ + "M1013: Application Developer Guidance", + "M1038: Execution Prevention", + "M1044: Restrict Library Loading", + "M1047: Audit", + "M1051: Update Software" + ], + "new": [], + "dropped": [] + }, + "changelog_datacomponent_detections": { + "shared": [], + "new": [], + "dropped": [] + }, + "changelog_detectionstrategy_detections": { + "shared": [ + "DET0201: Detection Strategy for Hijack Execution Flow for DLLs" + ], + "new": [], + "dropped": [] + } + }, + { + "type": "attack-pattern", + "id": "attack-pattern--9fa07bef-9c81-421e-a8e5-ad4366c5a925", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2018-04-18 17:59:24.739000+00:00", + "modified": "2025-11-12 15:42:52.705000+00:00", + "name": "Trusted Relationship", + "description": "Adversaries may breach or otherwise leverage organizations who have access to intended victims. Access through trusted third party relationship abuses an existing connection that may not be protected or receives less scrutiny than standard mechanisms of gaining access to a network.\n\nOrganizations often grant elevated access to second or third-party external providers in order to allow them to manage internal systems as well as cloud-based environments. Some examples of these relationships include IT services contractors, managed security providers, infrastructure contractors (e.g. HVAC, elevators, physical security). The third-party provider's access may be intended to be limited to the infrastructure being maintained, but may exist on the same network as the rest of the enterprise. As such, [Valid Accounts](https://attack.mitre.org/techniques/T1078) used by the other party for access to internal network systems may be compromised and used.(Citation: CISA IT Service Providers)\n\nIn Office 365 environments, organizations may grant Microsoft partners or resellers delegated administrator permissions. By compromising a partner or reseller account, an adversary may be able to leverage existing delegated administrator relationships or send new delegated administrator offers to clients in order to gain administrative control over the victim tenant.(Citation: Office 365 Delegated Administration)", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "initial-access" + } + ], + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/techniques/T1199", + "external_id": "T1199" + }, + { + "source_name": "CISA IT Service Providers", + "description": "CISA. (n.d.). APTs Targeting IT Service Provider Customers. Retrieved November 16, 2020.", + "url": "https://us-cert.cisa.gov/APTs-Targeting-IT-Service-Provider-Customers" + }, + { + "source_name": "Office 365 Delegated Administration", + "description": "Microsoft. (n.d.). Partners: Offer delegated administration. Retrieved May 27, 2022.", + "url": "https://support.microsoft.com/en-us/topic/partners-offer-delegated-administration-26530dc0-ebba-415b-86b1-b55bc06b073e?ui=en-us&rs=en-us&ad=us" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_contributors": [ + "Praetorian", + "ExtraHop", + "Jannie Li, Microsoft Threat Intelligence\u202fCenter\u202f(MSTIC)" + ], + "x_mitre_deprecated": false, + "x_mitre_detection": "", + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_platforms": [ + "Windows", + "SaaS", + "IaaS", + "Linux", + "macOS", + "Identity Provider", + "Office Suite" + ], + "x_mitre_version": "2.4", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 15:42:52.705000+00:00\", \"old_value\": \"2025-10-24 17:49:09.835000+00:00\"}, \"root['x_mitre_attack_spec_version']\": {\"new_value\": \"3.3.0\", \"old_value\": \"3.2.0\"}}}", + "previous_version": "2.4", + "changelog_mitigations": { + "shared": [ + "M1018: User Account Management", + "M1030: Network Segmentation", + "M1032: Multi-factor Authentication" + ], + "new": [], + "dropped": [] + }, + "changelog_datacomponent_detections": { + "shared": [], + "new": [], + "dropped": [] + }, + "changelog_detectionstrategy_detections": { + "shared": [ + "DET0488: Detect abuse of Trusted Relationships (third-party and delegated admin access)" + ], + "new": [], + "dropped": [] + } + } + ], + "revocations": [], + "deprecations": [], + "deletions": [] + }, + "software": { + "additions": [], + "major_version_changes": [], + "minor_version_changes": [], + "other_version_changes": [], + "patches": [], + "revocations": [], + "deprecations": [], + "deletions": [] + }, + "groups": { + "additions": [], + "major_version_changes": [], + "minor_version_changes": [], + "other_version_changes": [], + "patches": [ + { + "type": "intrusion-set", + "id": "intrusion-set--0ec2f388-bf0f-4b5c-97b1-fc736d26c25f", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2019-08-26 15:03:02.577000+00:00", + "modified": "2025-11-12 18:55:12.319000+00:00", + "name": "Kimsuky", + "description": "[Kimsuky](https://attack.mitre.org/groups/G0094) is a North Korea-based cyber espionage group that has been active since at least 2012. The group initially targeted South Korean government agencies, think tanks, and subject-matter experts in various fields. Its operations expanded to include the United Nations and organizations in the government, education, business services, and manufacturing sectors across the United States, Japan, Russia, and Europe. [Kimsuky](https://attack.mitre.org/groups/G0094) has focused collection on foreign policy and national security issues tied to the Korean Peninsula, nuclear policy, and sanctions. Its operations have overlapped with other DPRK actors, likely due to ad hoc collaboration or limited resource sharing.(Citation: EST Kimsuky April 2019)(Citation: Cybereason Kimsuky November 2020)(Citation: Malwarebytes Kimsuky June 2021)(Citation: CISA AA20-301A Kimsuky)(Citation: Mandiant APT43 March 2024)(Citation: Proofpoint TA427 April 2024) Because of overlapping operations, some researchers group a wide range of North Korean state-sponsored cyber activity under the broader [Lazarus Group](https://attack.mitre.org/groups/G0032) umbrella rather than tracking separate subgroup or cluster distinctions.\n\n[Kimsuky](https://attack.mitre.org/groups/G0094) was assessed to be responsible for the 2014 Korea Hydro & Nuclear Power Co. compromise; other notable campaigns include Operation STOLEN PENCIL (2018), Operation Kabar Cobra (2019), and Operation Smoke Screen (2019).(Citation: Netscout Stolen Pencil Dec 2018)(Citation: EST Kimsuky SmokeScreen April 2019)(Citation: AhnLab Kimsuky Kabar Cobra Feb 2019)\n\nIn 2023, [Kimsuky](https://attack.mitre.org/groups/G0094) was observed using commercial large language models to assist with vulnerability research, scripting, social engineering and reconnaissance.(Citation: MSFT-AI)", + "aliases": [ + "Kimsuky", + "Black Banshee", + "Velvet Chollima", + "Emerald Sleet", + "THALLIUM", + "APT43", + "TA427", + "Springtail" + ], + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/groups/G0094", + "external_id": "G0094" + }, + { + "source_name": "Black Banshee", + "description": "(Citation: Cybereason Kimsuky November 2020)(Citation: Malwarebytes Kimsuky June 2021)" + }, + { + "source_name": "THALLIUM", + "description": "(Citation: Cybereason Kimsuky November 2020)(Citation: Malwarebytes Kimsuky June 2021)(Citation: Mandiant APT43 March 2024)(Citation: Proofpoint TA427 April 2024)" + }, + { + "source_name": "APT43", + "description": "(Citation: Mandiant APT43 March 2024)(Citation: Proofpoint TA427 April 2024)" + }, + { + "source_name": "Emerald Sleet", + "description": "(Citation: Microsoft Threat Actor Naming July 2023)(Citation: Proofpoint TA427 April 2024)" + }, + { + "source_name": "TA427", + "description": "(Citation: Proofpoint TA427 April 2024)" + }, + { + "source_name": "Kimsuky", + "description": "(Citation: Securelist Kimsuky Sept 2013)(Citation: Malwarebytes Kimsuky June 2021)" + }, + { + "source_name": "Springtail", + "description": "(Citation: Symantec Troll Stealer 2024)" + }, + { + "source_name": "Velvet Chollima", + "description": "(Citation: Zdnet Kimsuky Dec 2018)(Citation: ThreatConnect Kimsuky September 2020)(Citation: Malwarebytes Kimsuky June 2021)" + }, + { + "source_name": "AhnLab Kimsuky Kabar Cobra Feb 2019", + "description": "AhnLab. (2019, February 28). Operation Kabar Cobra - Tenacious cyber-espionage campaign by Kimsuky Group. Retrieved September 29, 2021.", + "url": "https://global.ahnlab.com/global/upload/download/techreport/%5BAnalysis_Report%5DOperation%20Kabar%20Cobra.pdf" + }, + { + "source_name": "EST Kimsuky April 2019", + "description": "Alyac. (2019, April 3). Kimsuky Organization Steals Operation Stealth Power. Retrieved August 13, 2019.", + "url": "https://blog.alyac.co.kr/2234" + }, + { + "source_name": "Netscout Stolen Pencil Dec 2018", + "description": "ASERT team. (2018, December 5). STOLEN PENCIL Campaign Targets Academia. Retrieved February 5, 2019.", + "url": "https://asert.arbornetworks.com/stolen-pencil-campaign-targets-academia/" + }, + { + "source_name": "Zdnet Kimsuky Dec 2018", + "description": "Cimpanu, C.. (2018, December 5). Cyber-espionage group uses Chrome extension to infect victims. Retrieved August 26, 2019.", + "url": "https://www.zdnet.com/article/cyber-espionage-group-uses-chrome-extension-to-infect-victims/" + }, + { + "source_name": "CISA AA20-301A Kimsuky", + "description": "CISA, FBI, CNMF. (2020, October 27). https://us-cert.cisa.gov/ncas/alerts/aa20-301a. Retrieved November 4, 2020.", + "url": "https://us-cert.cisa.gov/ncas/alerts/aa20-301a" + }, + { + "source_name": "Cybereason Kimsuky November 2020", + "description": "Dahan, A. et al. (2020, November 2). Back to the Future: Inside the Kimsuky KGH Spyware Suite. Retrieved November 6, 2020.", + "url": "https://www.cybereason.com/blog/back-to-the-future-inside-the-kimsuky-kgh-spyware-suite" + }, + { + "source_name": "EST Kimsuky SmokeScreen April 2019", + "description": "ESTSecurity. (2019, April 17). Analysis of the APT Campaign \u2018Smoke Screen\u2019 targeting to Korea and US \ucd9c\ucc98: https://blog.alyac.co.kr/2243 [\uc774\uc2a4\ud2b8\uc2dc\ud050\ub9ac\ud2f0 \uc54c\uc57d \ube14\ub85c\uadf8]. Retrieved September 29, 2021.", + "url": "https://blog.alyac.co.kr/attachment/cfile5.uf@99A0CD415CB67E210DCEB3.pdf" + }, + { + "source_name": "Malwarebytes Kimsuky June 2021", + "description": "Jazi, H. (2021, June 1). Kimsuky APT continues to target South Korean government using AppleSeed backdoor. Retrieved June 10, 2021.", + "url": "https://blog.malwarebytes.com/threat-analysis/2021/06/kimsuky-apt-continues-to-target-south-korean-government-using-appleseed-backdoor/" + }, + { + "source_name": "Proofpoint TA427 April 2024", + "description": "Lesnewich, G. et al. (2024, April 16). From Social Engineering to DMARC Abuse: TA427\u2019s Art of Information Gathering. Retrieved May 3, 2024.", + "url": "https://www.proofpoint.com/us/blog/threat-insight/social-engineering-dmarc-abuse-ta427s-art-information-gathering" + }, + { + "source_name": "Mandiant APT43 March 2024", + "description": "Mandiant. (2024, March 14). APT43: North Korean Group Uses Cybercrime to Fund Espionage Operations. Retrieved May 3, 2024.", + "url": "https://services.google.com/fh/files/misc/apt43-report-en.pdf" + }, + { + "source_name": "Microsoft Threat Actor Naming July 2023", + "description": "Microsoft . (2023, July 12). How Microsoft names threat actors. Retrieved November 17, 2023.", + "url": "https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide" + }, + { + "source_name": "MSFT-AI", + "description": "Microsoft Threat Intelligence. (2024, February 14). Staying ahead of threat actors in the age of AI. Retrieved March 11, 2024.", + "url": "https://www.microsoft.com/en-us/security/blog/2024/02/14/staying-ahead-of-threat-actors-in-the-age-of-ai/" + }, + { + "source_name": "Symantec Troll Stealer 2024", + "description": "Symantec Threat Hunter Team. (2024, May 16). Springtail: New Linux Backdoor Added to Toolkit. Retrieved January 17, 2025.", + "url": "https://www.security.com/threat-intelligence/springtail-kimsuky-backdoor-espionage" + }, + { + "source_name": "Securelist Kimsuky Sept 2013", + "description": "Tarakanov , D.. (2013, September 11). The \u201cKimsuky\u201d Operation: A North Korean APT?. Retrieved August 13, 2019.", + "url": "https://securelist.com/the-kimsuky-operation-a-north-korean-apt/57915/" + }, + { + "source_name": "ThreatConnect Kimsuky September 2020", + "description": "ThreatConnect. (2020, September 28). Kimsuky Phishing Operations Putting In Work. Retrieved October 30, 2020.", + "url": "https://threatconnect.com/blog/kimsuky-phishing-operations-putting-in-work/" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_contributors": [ + "Taewoo Lee, KISA", + "Dongwook Kim, KISA", + "Jaesang Oh, KC7 Foundation", + "Wai Linn Oo @ Kernellix" + ], + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "5.1", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 18:55:12.319000+00:00\", \"old_value\": \"2025-10-24 00:59:31.235000+00:00\"}}, \"iterable_item_added\": {\"root['x_mitre_contributors'][3]\": \"Wai Linn Oo @ Kernellix\"}}", + "previous_version": "5.1" + }, + { + "type": "intrusion-set", + "id": "intrusion-set--420ac20b-f2b9-42b8-aa1a-6d4b72895ca4", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-04-12 15:56:28.861000+00:00", + "modified": "2025-11-04 19:40:42.270000+00:00", + "name": "Mustang Panda", + "description": "[Mustang Panda](https://attack.mitre.org/groups/G0129) is a China-based cyber espionage threat actor that has been conducting operations since at least 2012. [Mustang Panda](https://attack.mitre.org/groups/G0129) has been known to use tailored phishing lures and decoy documents to deliver malicious payloads. [Mustang Panda](https://attack.mitre.org/groups/G0129) has targeted government, diplomatic, and non-governmental organizations, including think tanks, religious institutions, and research entities, across the United States, Europe, and Asia, with notable activity in Russia, Mongolia, Myanmar, Pakistan, and Vietnam. (Citation: BlackBerry MUSTANG PANDA October 2022)(Citation: Eset PlugX Korplug Mustang Panda March 2022)(Citation: Anomali MUSTANG PANDA October 2019)(Citation: Cisco Talos MUSTANG PANDA PLUGX PUBLOAD MAY 2022)(Citation: Secureworks BRONZE PRESIDENT December 2019)(Citation: DOJ Affidavit Search and Seizure PlugX December 2024)(Citation: EclecticIQ Mustang Panda PlugX)(Citation: ATTACKIQ MUSTANG PANDA TONESHELL March 2023)(Citation: Crowdstrike MUSTANG PANDA June 2018)(Citation: Palo Alto Networks, Unit 42)(Citation: Sophos PlugX September 2022)(Citation: Sophos Mustang Panda PLUGX)(Citation: Zscaler)", + "aliases": [ + "Mustang Panda", + "TA416", + "RedDelta", + "BRONZE PRESIDENT", + "STATELY TAURUS", + "FIREANT", + "CAMARO DRAGON", + "EARTH PRETA", + "HIVE0154", + "TWILL TYPHOON", + "TANTALUM", + "LUMINOUS MOTH", + "UNC6384", + "TEMP.Hex", + "Red Lich" + ], + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/groups/G0129", + "external_id": "G0129" + }, + { + "source_name": "EARTH PRETA", + "description": "(Citation: 2022 November_TrendMicro_Earth Preta_Toneshell_Pubload)(Citation: Trend Micro MUSTANG PANDA PUBLOAD HIUPAN SEPTEMBER 2024)(Citation: Trend Micro Mustang Panda Earth Preta Toneshell February 2025)(Citation: Trend Micro Mustang Panda Earth Preta TONESHELL June 2023)" + }, + { + "source_name": "FIREANT", + "description": "(Citation: Broadcom)" + }, + { + "source_name": "Mustang Panda", + "description": "(Citation: Crowdstrike MUSTANG PANDA June 2018)" + }, + { + "source_name": "UNC6384", + "description": "(Citation: Google Threat Intelligence Group MUSTANG PANDA PLUGX August 2025)" + }, + { + "source_name": "TEMP.Hex", + "description": "(Citation: Google Threat Intelligence Group MUSTANG PANDA PLUGX August 2025)" + }, + { + "source_name": "CAMARO DRAGON", + "description": "(Citation: HorseShell)" + }, + { + "source_name": "HIVE0154", + "description": "(Citation: IBM MUSTANG PANDA PUBLOAD CLAIMLOADER JUNE 2025)(Citation: 2025_IBM_PUBLOAD_TONESHELL_HIUPAN_CLAIMLOADER_MUSTANG PANDA)" + }, + { + "source_name": "TWILL TYPHOON", + "description": "(Citation: Microsoft Naming Conventions Frequently Updated)" + }, + { + "source_name": "TANTALUM", + "description": "(Citation: Microsoft Naming Conventions Frequently Updated)" + }, + { + "source_name": "LUMINOUS MOTH", + "description": "(Citation: Microsoft Naming Conventions Frequently Updated)" + }, + { + "source_name": "STATELY TAURUS", + "description": "(Citation: Palo Alto Networks, Unit 42)(Citation: Unit42 Bookworm Nov2015)(Citation: Unit42 Chinese VSCode 06 September 2024)(Citation: Broadcom)(Citation: Palo Alto Unit42 STATELY TAURUS TONESHELL September 2023)(Citation: CSIRT CTI MUSTANG PANDA PUBLOAD TONESHELL JAN 2024)" + }, + { + "source_name": "TA416", + "description": "(Citation: Proofpoint TA416 November 2020)" + }, + { + "source_name": "Red Lich", + "description": "(Citation: PWC UK MUSTANG PANDA RED LICH February 2021)" + }, + { + "source_name": "RedDelta", + "description": "(Citation: Recorded Future REDDELTA July 2020)(Citation: Proofpoint TA416 Europe March 2022)" + }, + { + "source_name": "BRONZE PRESIDENT", + "description": "(Citation: Secureworks BRONZE PRESIDENT December 2019)(Citation: Sophos PlugX September 2022)(Citation: Sophos Mustang Panda PLUGX)" + }, + { + "source_name": "Eset PlugX Korplug Mustang Panda March 2022", + "description": "Alexandre Cote Cyr. (2022, March 23). Mustang Panda\u2019s Hodur: Old tricks, new Korplug variant. Retrieved September 9, 2025.", + "url": "https://www.welivesecurity.com/2022/03/23/mustang-panda-hodur-old-tricks-new-korplug-variant/" + }, + { + "source_name": "Anomali MUSTANG PANDA October 2019", + "description": "Anomali Threat Research. (2019, October 7). China-Based APT Mustang Panda Targets Minority Groups, Public and Private Sector Organizations. Retrieved April 12, 2021.", + "url": "https://www.anomali.com/blog/china-based-apt-mustang-panda-targets-minority-groups-public-and-private-sector-organizations" + }, + { + "source_name": "Cisco Talos MUSTANG PANDA PLUGX PUBLOAD MAY 2022", + "description": "Asheer Malhotra, Jungsoo An, Kendall Mc. (2022, May 5). Mustang Panda deploys a new wave of malware targeting Europe. Retrieved August 4, 2025.", + "url": "https://blog.talosintelligence.com/mustang-panda-targets-europe/" + }, + { + "source_name": "Broadcom", + "description": "Broadcom Protection Bulletins. (2025, February 20). Bookworm malware linked to Fireant (aka Stately Tarurus) activity observed in Southeast Asia. Retrieved July 21, 2025.", + "url": "https://www.broadcom.com/support/security-center/protection-bulletin/bookworm-malware-linked-to-fireant-aka-stately-tarurus-activity-observed-in-southeast-asia" + }, + { + "source_name": "HorseShell", + "description": "Cohen, Itay. Madej, Radoslaw. Threat Intelligence Team. (2023, May 16). THE DRAGON WHO SOLD HIS CAMARO: ANALYZING CUSTOM ROUTER IMPLANT. Retrieved December 26, 2023.", + "url": "https://research.checkpoint.com/2023/the-dragon-who-sold-his-camaro-analyzing-custom-router-implant/" + }, + { + "source_name": "Secureworks BRONZE PRESIDENT December 2019", + "description": "Counter Threat Unit Research Team. (2019, December 29). BRONZE PRESIDENT Targets NGOs. Retrieved April 13, 2021.", + "url": "https://www.secureworks.com/research/bronze-president-targets-ngos" + }, + { + "source_name": "CSIRT CTI MUSTANG PANDA PUBLOAD TONESHELL JAN 2024", + "description": "CSIRT CTI. (2024, January 23). Stately Taurus Targets Myanmar Amidst Concerns over Military Junta\u2019s Handling of Rebel Attacks. Retrieved August 4, 2025.", + "url": "https://csirt-cti.net/2024/01/23/stately-taurus-targets-myanmar/" + }, + { + "source_name": "DOJ Affidavit Search and Seizure PlugX December 2024", + "description": "DOJ. (2024, December 20). Mag. No. 24-mj-1387 AFFIDAVIT IN SUPPORT OF AN APPLICATION FOR A NINTH SEARCH AND SEIZURE WARRANT- IN THE MATTER OF THE SEARCH AND SEIZURE OF COMPUTERS IN THE UNITED STATES INFECTED WITH PLUGX MALWARE . Retrieved September 9, 2025.", + "url": "https://www.justice.gov/archives/opa/media/1384136/dl" + }, + { + "source_name": "EclecticIQ Mustang Panda PlugX", + "description": "EclecticIQ Threat Research Team. (2023, February 2). Mustang Panda APT Group Uses European Commission-Themed Lure to Deliver PlugX Malware. Retrieved September 9, 2025.", + "url": "https://blog.eclecticiq.com/mustang-panda-apt-group-uses-european-commission-themed-lure-to-deliver-plugx-malware" + }, + { + "source_name": "IBM MUSTANG PANDA PUBLOAD CLAIMLOADER JUNE 2025", + "description": "Golo Muhr, Joshua Chung. (2025, June 23). Hive0154 aka Mustang Panda shifts focus on Tibetan community to deploy Pubload backdoor. Retrieved August 4, 2025.", + "url": "https://www.ibm.com/think/x-force/hive0154-mustang-panda-shifts-focus-tibetan-community-deploy-pubload-backdoor" + }, + { + "source_name": "2025_IBM_PUBLOAD_TONESHELL_HIUPAN_CLAIMLOADER_MUSTANG PANDA", + "description": "Golo Muhr, Joshua Chung. (2025, May 15). Hive0154 targeting US, Philippines, Pakistan and Taiwan in suspected espionage campaign. Retrieved August 4, 2025.", + "url": "https://www.ibm.com/think/x-force/hive0154-targeting-us-philippines-pakistan-taiwan" + }, + { + "source_name": "Recorded Future REDDELTA July 2020", + "description": "Insikt Group. (2020, July 28). CHINESE STATE-SPONSORED GROUP \u2018REDDELTA\u2019 TARGETS THE VATICAN AND CATHOLIC ORGANIZATIONS. Retrieved April 13, 2021.", + "url": "https://go.recordedfuture.com/hubfs/reports/cta-2020-0728.pdf" + }, + { + "source_name": "ATTACKIQ MUSTANG PANDA TONESHELL March 2023", + "description": "Ken Towne, Francis Guibernau. (2023, March 23). Emulating the Politically Motivated Chinese APT Mustang Panda. Retrieved September 10, 2025.", + "url": "https://www.attackiq.com/2023/03/23/emulating-the-politically-motivated-chinese-apt-mustang-panda/" + }, + { + "source_name": "Trend Micro MUSTANG PANDA PUBLOAD HIUPAN SEPTEMBER 2024", + "description": "Lenart Bermejo, Sunny Lu, Ted Lee. (2024, September 9). Earth Preta Evolves its Attacks with New Malware and Strategies. Retrieved August 4, 2025.", + "url": "https://www.trendmicro.com/en_us/research/24/i/earth-preta-new-malware-and-strategies.html" + }, + { + "source_name": "Palo Alto Unit42 STATELY TAURUS TONESHELL September 2023", + "description": "Lior Rochberger, Tom Fakterman, Robert Falcone. (2023, September 22). Cyberespionage Attacks Against Southeast Asian Government Linked to Stately Taurus, Aka Mustang Panda. Retrieved September 9, 2025.", + "url": "https://unit42.paloaltonetworks.com/stately-taurus-attacks-se-asian-government/" + }, + { + "source_name": "Crowdstrike MUSTANG PANDA June 2018", + "description": "Meyers, A. (2018, June 15). Meet CrowdStrike\u2019s Adversary of the Month for June: MUSTANG PANDA. Retrieved April 12, 2021.", + "url": "https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-june-mustang-panda/" + }, + { + "source_name": "Microsoft Naming Conventions Frequently Updated", + "description": "Microsoft. (2025, September 8). How Microsoft names threat actors. Retrieved September 10, 2025.", + "url": "https://learn.microsoft.com/en-us/unified-secops-platform/microsoft-threat-actor-naming" + }, + { + "source_name": "Trend Micro Mustang Panda Earth Preta Toneshell February 2025", + "description": "Nathaniel Morales, Nick Dai. (2025, February 18). Earth Preta Mixes Legitimate and Malicious Components to Sidestep Detection. Retrieved September 10, 2025.", + "url": "https://www.trendmicro.com/en_us/research/25/b/earth-preta-mixes-legitimate-and-malicious-components-to-sidestep-detection.html" + }, + { + "source_name": "2022 November_TrendMicro_Earth Preta_Toneshell_Pubload", + "description": "Nick Dai, Vickie Su, Sunny Lu. (2022, November 18). Earth Preta Spear-Phishing Governments Worldwide. Retrieved August 4, 2025.", + "url": "https://www.trendmicro.com/en_us/research/22/k/earth-preta-spear-phishing-governments-worldwide.html" + }, + { + "source_name": "Google Threat Intelligence Group MUSTANG PANDA PLUGX August 2025", + "description": "Patrick Whitsell. (2025, August 25). Deception in Depth: PRC-Nexus Espionage Campaign Hijacks Web Traffic to Target Diplomats. Retrieved September 9, 2025.", + "url": "https://cloud.google.com/blog/topics/threat-intelligence/prc-nexus-espionage-targets-diplomats" + }, + { + "source_name": "Proofpoint TA416 November 2020", + "description": "Proofpoint Threat Research Team. (2020, November 23). TA416 Goes to Ground and Returns with a Golang PlugX Malware Loader. Retrieved April 13, 2021.", + "url": "https://www.proofpoint.com/us/blog/threat-insight/ta416-goes-ground-and-returns-golang-plugx-malware-loader" + }, + { + "source_name": "PWC UK MUSTANG PANDA RED LICH February 2021", + "description": "PWC UK. (2021, February 28). Cyber Threats 2020: A Year in Retrospect. Retrieved October 15, 2025.", + "url": "https://www.pwc.co.uk/cyber-security/pdf/pwc-cyber-threats-2020-a-year-in-retrospect.pdf" + }, + { + "source_name": "Proofpoint TA416 Europe March 2022", + "description": "Raggi, M. et al. (2022, March 7). The Good, the Bad, and the Web Bug: TA416 Increases Operational Tempo Against European Governments as Conflict in Ukraine Escalates. Retrieved March 16, 2022.", + "url": "https://www.proofpoint.com/us/blog/threat-insight/good-bad-and-web-bug-ta416-increases-operational-tempo-against-european" + }, + { + "source_name": "Unit42 Bookworm Nov2015", + "description": "Robert Falcone, Mike Scott, Juan Cortes. (2015, November 10). Bookworm Trojan: A Model of Modular Architecture. Retrieved July 21, 2025.", + "url": "https://unit42.paloaltonetworks.com/bookworm-trojan-a-model-of-modular-architecture/" + }, + { + "source_name": "Palo Alto Networks, Unit 42", + "description": "Robert Falcone. (2025, February 20). Stately Taurus Activity in Southeast Asia Links to Bookworm Malware. Retrieved July 21, 2025.", + "url": "https://unit42.paloaltonetworks.com/stately-taurus-uses-bookworm-malware/" + }, + { + "source_name": "Sophos PlugX September 2022", + "description": "Secureworks Counter Threat Unit Research Team. (2022, April 27). BRONZE PRESIDENT Targets Russian Speakers with Updated PlugX. Retrieved September 9, 2025.", + "url": "https://www.secureworks.com/blog/bronze-president-targets-russian-speakers-with-updated-plugx" + }, + { + "source_name": "Sophos Mustang Panda PLUGX", + "description": "Secureworks Counter Threat Unit Research Team. (2022, September 8). BRONZE PRESIDENT Targets Government Officials. Retrieved September 9, 2025.", + "url": "https://www.secureworks.com/blog/bronze-president-targets-government-officials" + }, + { + "source_name": "Zscaler", + "description": "Sudeep Singh. (2025, April 16). Latest Mustang Panda Arsenal: ToneShell and StarProxy | P1. Retrieved July 21, 2025.", + "url": "https://www.zscaler.com/blogs/security-research/latest-mustang-panda-arsenal-toneshell-and-starproxy-p1" + }, + { + "source_name": "Trend Micro Mustang Panda Earth Preta TONESHELL June 2023", + "description": "Sunny Lu, Vickie Su, Nick Dai. (2023, June 14). Behind the Scenes: Unveiling the Hidden Workings of Earth Preta. Retrieved September 10, 2025.", + "url": "https://www.trendmicro.com/en_us/research/23/f/behind-the-scenes-unveiling-the-hidden-workings-of-earth-preta.html" + }, + { + "source_name": "BlackBerry MUSTANG PANDA October 2022", + "description": "The BlackBerry Research and Intelligence Team. (2022, October 6). Mustang Panda Abuses Legitimate Apps to Target Myanmar Based Victims. Retrieved October 14, 2025.", + "url": "https://blogs.blackberry.com/en/2022/10/mustang-panda-abuses-legitimate-apps-to-target-myanmar-based-victims" + }, + { + "source_name": "Unit42 Chinese VSCode 06 September 2024", + "description": "Tom Fakterman. (2024, September 6). Chinese APT Abuses VSCode to Target Government in Asia. Retrieved March 24, 2025.", + "url": "https://unit42.paloaltonetworks.com/stately-taurus-abuses-vscode-southeast-asian-espionage/" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_contributors": [ + "Kyaw Pyiyt Htet, @KyawPyiytHtet", + "Jiraput Thamsongkrah", + "ZScaler ThreatLabz" + ], + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "3.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-04 19:40:42.270000+00:00\", \"old_value\": \"2025-10-23 18:52:40.872000+00:00\"}, \"root['x_mitre_contributors'][2]\": {\"new_value\": \"ZScaler ThreatLabz\", \"old_value\": \"YH Chang, ZScaler ThreatLabz\"}}}", + "previous_version": "3.0" + } + ], + "revocations": [], + "deprecations": [], + "deletions": [] + }, + "campaigns": { + "additions": [], + "major_version_changes": [], + "minor_version_changes": [], + "other_version_changes": [], + "patches": [ + { + "type": "campaign", + "id": "campaign--1a0576df-df21-4775-843e-844d8a58a94b", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-15 19:31:55.608000+00:00", + "modified": "2025-11-12 15:13:10.723000+00:00", + "name": "SharePoint ToolShell Exploitation", + "description": "The [SharePoint ToolShell Exploitation](https://attack.mitre.org/campaigns/C0058) campaign was conducted in July 2025 and encompassed the first waves of exploitation against incompletely patched spoofing (CVE-2025-49706) and remote code execution (CVE-2025-49704) vulnerabilities affecting on-premises Microsoft SharePoint servers. Later patched and updated as CVE-2025-53770 and CVE-2025-53771, the ToolShell vulnerabilities were widely exploited including by China-based ransomware actor Storm-2603 and espionage actors [Threat Group-3390](https://attack.mitre.org/groups/G0027) and [ZIRCONIUM](https://attack.mitre.org/groups/G0128). [SharePoint ToolShell Exploitation](https://attack.mitre.org/campaigns/C0058) targeted multiple regions and industries including finance, education, energy, and healthcare across Asia, Europe, and the United States.(Citation: Microsoft SharePoint Exploit JUL 2025)(Citation: Palo Alto SharePoint Vulnerabilities JUL 2025)(Citation: Eye Research ToolShell JUL 2025)(Citation: ESET ToolShell JUL 2025)(Citation: Trend Micro SharePoint Attacks JUL 2025)\n", + "aliases": [ + "SharePoint ToolShell Exploitation" + ], + "first_seen": "2025-07-01 04:00:00+00:00", + "last_seen": "2025-07-01 04:00:00+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/campaigns/C0058", + "external_id": "C0058" + }, + { + "source_name": "Trend Micro SharePoint Attacks JUL 2025", + "description": " Trend Micro Research. (2022, July 22). Proactive Security Insights for SharePoint Attacks (CVE-2025-53770 and CVE-2025-53771). Retrieved October 15, 2025.", + "url": "https://www.trendmicro.com/en_us/research/25/g/cve-2025-53770-and-cve-2025-53771-sharepoint-attacks.html" + }, + { + "source_name": "ESET ToolShell JUL 2025", + "description": "ESET Research. (2025, July 24). ToolShell: An all-you-can-eat buffet for threat actors. Retrieved October 15, 2025.", + "url": "https://www.welivesecurity.com/en/eset-research/toolshell-an-all-you-can-eat-buffet-for-threat-actors/" + }, + { + "source_name": "Eye Research ToolShell JUL 2025", + "description": "Eye Security. (2025, July 19). SharePoint Under Siege: ToolShell Exploit (CVE-2025-49706 & CVE-2025-49704). Retrieved October 15, 2025.", + "url": "https://research.eye.security/sharepoint-under-siege/" + }, + { + "source_name": "Microsoft SharePoint Exploit JUL 2025", + "description": "Microsoft Threat Intelligence. (2025, July 22). Disrupting active exploitation of on-premises SharePoint vulnerabilities. Retrieved October 15, 2025.", + "url": "https://www.microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities/#storm-2603" + }, + { + "source_name": "Palo Alto SharePoint Vulnerabilities JUL 2025", + "description": "Unit 42. (2025, July 31). Active Exploitation of Microsoft SharePoint Vulnerabilities: Threat Brief (Updated). Retrieved October 15, 2025.", + "url": "https://unit42.paloaltonetworks.com/microsoft-sharepoint-cve-2025-49704-cve-2025-49706-cve-2025-53770/" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_contributors": [ + "Wai Linn Oo @ Kernellix" + ], + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_first_seen_citation": "(Citation: Microsoft SharePoint Exploit JUL 2025)", + "x_mitre_last_seen_citation": "(Citation: Palo Alto SharePoint Vulnerabilities JUL 2025)", + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "1.0", + "detailed_diff": "{\"dictionary_item_added\": {\"root['x_mitre_contributors']\": [\"Wai Linn Oo @ Kernellix\"]}, \"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 15:13:10.723000+00:00\", \"old_value\": \"2025-10-24 04:12:20.214000+00:00\"}, \"root['description']\": {\"new_value\": \"The [SharePoint ToolShell Exploitation](https://attack.mitre.org/campaigns/C0058) campaign was conducted in July 2025 and encompassed the first waves of exploitation against incompletely patched spoofing (CVE-2025-49706) and remote code execution (CVE-2025-49704) vulnerabilities affecting on-premises Microsoft SharePoint servers. Later patched and updated as CVE-2025-53770 and CVE-2025-53771, the ToolShell vulnerabilities were widely exploited including by China-based ransomware actor Storm-2603 and espionage actors [Threat Group-3390](https://attack.mitre.org/groups/G0027) and [ZIRCONIUM](https://attack.mitre.org/groups/G0128). [SharePoint ToolShell Exploitation](https://attack.mitre.org/campaigns/C0058) targeted multiple regions and industries including finance, education, energy, and healthcare across Asia, Europe, and the United States.(Citation: Microsoft SharePoint Exploit JUL 2025)(Citation: Palo Alto SharePoint Vulnerabilities JUL 2025)(Citation: Eye Research ToolShell JUL 2025)(Citation: ESET ToolShell JUL 2025)(Citation: Trend Micro SharePoint Attacks JUL 2025)\\n\", \"old_value\": \"The [SharePoint ToolShell Exploitation](https://attack.mitre.org/campaigns/C0058) campaign was conducted in July 2025 and encompassed the first waves of exploitation against incompetely patched spoofing (CVE-2025-49706) and remote code execution (CVE-2025-49704) vulnerabilities affecting on-premises Microsoft SharePoint servers. Later patched and updated as CVE-2025-53770 and CVE-2025-53771, the ToolShell vulnerabilities were widely exploited including by China-based ransomware actor Storm-2603 and espionage actors [Threat Group-3390](https://attack.mitre.org/groups/G0027) and [ZIRCONIUM](https://attack.mitre.org/groups/G0128). [SharePoint ToolShell Exploitation](https://attack.mitre.org/campaigns/C0058) targeted multiple regions and industries including finance, education, energy, and healthcare across Asia, Europe, and the United States.(Citation: Microsoft SharePoint Exploit JUL 2025)(Citation: Palo Alto SharePoint Vulnerabilities JUL 2025)(Citation: Eye Research ToolShell JUL 2025)(Citation: ESET ToolShell JUL 2025)(Citation: Trend Micro SharePoint Attacks JUL 2025)\\n\", \"diff\": \"--- \\n+++ \\n@@ -1 +1 @@\\n-The [SharePoint ToolShell Exploitation](https://attack.mitre.org/campaigns/C0058) campaign was conducted in July 2025 and encompassed the first waves of exploitation against incompetely patched spoofing (CVE-2025-49706) and remote code execution (CVE-2025-49704) vulnerabilities affecting on-premises Microsoft SharePoint servers. Later patched and updated as CVE-2025-53770 and CVE-2025-53771, the ToolShell vulnerabilities were widely exploited including by China-based ransomware actor Storm-2603 and espionage actors [Threat Group-3390](https://attack.mitre.org/groups/G0027) and [ZIRCONIUM](https://attack.mitre.org/groups/G0128). [SharePoint ToolShell Exploitation](https://attack.mitre.org/campaigns/C0058) targeted multiple regions and industries including finance, education, energy, and healthcare across Asia, Europe, and the United States.(Citation: Microsoft SharePoint Exploit JUL 2025)(Citation: Palo Alto SharePoint Vulnerabilities JUL 2025)(Citation: Eye Research ToolShell JUL 2025)(Citation: ESET ToolShell JUL 2025)(Citation: Trend Micro SharePoint Attacks JUL 2025)\\n+The [SharePoint ToolShell Exploitation](https://attack.mitre.org/campaigns/C0058) campaign was conducted in July 2025 and encompassed the first waves of exploitation against incompletely patched spoofing (CVE-2025-49706) and remote code execution (CVE-2025-49704) vulnerabilities affecting on-premises Microsoft SharePoint servers. Later patched and updated as CVE-2025-53770 and CVE-2025-53771, the ToolShell vulnerabilities were widely exploited including by China-based ransomware actor Storm-2603 and espionage actors [Threat Group-3390](https://attack.mitre.org/groups/G0027) and [ZIRCONIUM](https://attack.mitre.org/groups/G0128). [SharePoint ToolShell Exploitation](https://attack.mitre.org/campaigns/C0058) targeted multiple regions and industries including finance, education, energy, and healthcare across Asia, Europe, and the United States.(Citation: Microsoft SharePoint Exploit JUL 2025)(Citation: Palo Alto SharePoint Vulnerabilities JUL 2025)(Citation: Eye Research ToolShell JUL 2025)(Citation: ESET ToolShell JUL 2025)(Citation: Trend Micro SharePoint Attacks JUL 2025)\"}}}", + "previous_version": "1.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1The [SharePoint ToolShell Exploitation](https://attack.mitret1The [SharePoint ToolShell Exploitation](https://attack.mitre
>.org/campaigns/C0058) campaign was conducted in July 2025 an>.org/campaigns/C0058) campaign was conducted in July 2025 an
>d encompassed the first waves of exploitation against incomp>d encompassed the first waves of exploitation against incomp
>etely patched spoofing (CVE-2025-49706) and remote code exec>letely patched spoofing (CVE-2025-49706) and remote code exe
>ution (CVE-2025-49704) vulnerabilities affecting on-premises>cution (CVE-2025-49704) vulnerabilities affecting on-premise
> Microsoft SharePoint servers. Later patched and updated as >s Microsoft SharePoint servers. Later patched and updated as
>CVE-2025-53770 and CVE-2025-53771, the ToolShell vulnerabili> CVE-2025-53770 and CVE-2025-53771, the ToolShell vulnerabil
>ties were widely exploited including by China-based ransomwa>ities were widely exploited including by China-based ransomw
>re actor Storm-2603 and espionage actors [Threat Group-3390]>are actor Storm-2603 and espionage actors [Threat Group-3390
>(https://attack.mitre.org/groups/G0027) and [ZIRCONIUM](http>](https://attack.mitre.org/groups/G0027) and [ZIRCONIUM](htt
>s://attack.mitre.org/groups/G0128). [SharePoint ToolShell Ex>ps://attack.mitre.org/groups/G0128). [SharePoint ToolShell E
>ploitation](https://attack.mitre.org/campaigns/C0058) target>xploitation](https://attack.mitre.org/campaigns/C0058) targe
>ed multiple regions and industries including finance, educat>ted multiple regions and industries including finance, educa
>ion, energy, and healthcare across Asia, Europe, and the Uni>tion, energy, and healthcare across Asia, Europe, and the Un
>ted States.(Citation: Microsoft SharePoint Exploit JUL 2025)>ited States.(Citation: Microsoft SharePoint Exploit JUL 2025
>(Citation: Palo Alto SharePoint Vulnerabilities JUL 2025)(Ci>)(Citation: Palo Alto SharePoint Vulnerabilities JUL 2025)(C
>tation: Eye Research ToolShell JUL 2025)(Citation: ESET Tool>itation: Eye Research ToolShell JUL 2025)(Citation: ESET Too
>Shell JUL 2025)(Citation: Trend Micro SharePoint Attacks JUL>lShell JUL 2025)(Citation: Trend Micro SharePoint Attacks JU
> 2025) >L 2025) 
" + } + ], + "revocations": [], + "deprecations": [], + "deletions": [] + }, + "assets": { + "additions": [], + "major_version_changes": [], + "minor_version_changes": [], + "other_version_changes": [], + "patches": [], + "revocations": [], + "deprecations": [], + "deletions": [] + }, + "mitigations": { + "additions": [], + "major_version_changes": [], + "minor_version_changes": [], + "other_version_changes": [], + "patches": [], + "revocations": [], + "deprecations": [], + "deletions": [] + }, + "datasources": { + "additions": [], + "major_version_changes": [], + "minor_version_changes": [], + "other_version_changes": [], + "patches": [], + "revocations": [], + "deprecations": [], + "deletions": [] + }, + "datacomponents": { + "additions": [], + "major_version_changes": [], + "minor_version_changes": [], + "other_version_changes": [], + "patches": [ + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--02d090b6-8157-48da-98a2-517f7edd49fc", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.274000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0084", + "external_id": "DC0084" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Active Directory Credential Request", + "description": "Requests for authentication credentials via Kerberos or other methods like NTLM and LDAP queries. Examples:\n\n- Kerberos TGT and Service Tickets (Event IDs 4768, 4769)\n- NTLM Authentication Events\n- LDAP Bind Requests.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "WinEventLog:Security", + "channel": "EventCode=4768" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4769" + }, + { + "name": "WinEventLog:Kerberos", + "channel": "Kerberos TGS-REQ anomalies without KDC validation (Silver Ticket behavior)" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4929" + }, + { + "name": "linux:syslog", + "channel": "Unusual kinit or klist activity" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_data_source_ref": "", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-22 18:41:09.269000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/datacomponents/DC0084\", \"old_value\": \"https://attack.mitre.org/data-components/DC0084\"}, \"root['description']\": {\"new_value\": \"Requests for authentication credentials via Kerberos or other methods like NTLM and LDAP queries. Examples:\\n\\n- Kerberos TGT and Service Tickets (Event IDs 4768, 4769)\\n- NTLM Authentication Events\\n- LDAP Bind Requests.\", \"old_value\": \"Requests for authentication credentials via Kerberos or other methods like NTLM and LDAP queries. Examples:\\n\\n- Kerberos TGT and Service Tickets (Event IDs 4768, 4769)\\n- NTLM Authentication Events\\n- LDAP Bind Requests\\n\\n*Data Collection Measures:*\\n\\n- Security Event Logging:\\n - Enable \\\"`Audit Kerberos Authentication Service`\\\" or \\\"`Audit Kerberos Service Ticket Operations`.\\\"\\n - Captured Events: IDs 4768, 4769, 4624.\\n- Windows Event Forwarding (WEF): Forward domain controller logs to SIEM.\\n- SIEM Integration: Use tools like Splunk or Azure Sentinel for log analysis.\\n- Kerberos Debug Logging:\\n - Registry Key: HKLM\\\\SYSTEM\\\\CurrentControlSet\\\\Control\\\\Lsa\\\\Kerberos\\\\Parameters.\\n - Set DWORD LogLevel to 1.\\n- Azure AD Logs: Monitor Sign-In Logs for authentication and policy issues.\\n- Enable EDR Monitoring:\\n - Use EDR to detect suspicious processes querying authentication mechanisms (e.g., lsass.exe memory access).\", \"diff\": \"--- \\n+++ \\n@@ -2,18 +2,4 @@\\n \\n - Kerberos TGT and Service Tickets (Event IDs 4768, 4769)\\n - NTLM Authentication Events\\n-- LDAP Bind Requests\\n-\\n-*Data Collection Measures:*\\n-\\n-- Security Event Logging:\\n- - Enable \\\"`Audit Kerberos Authentication Service`\\\" or \\\"`Audit Kerberos Service Ticket Operations`.\\\"\\n- - Captured Events: IDs 4768, 4769, 4624.\\n-- Windows Event Forwarding (WEF): Forward domain controller logs to SIEM.\\n-- SIEM Integration: Use tools like Splunk or Azure Sentinel for log analysis.\\n-- Kerberos Debug Logging:\\n- - Registry Key: HKLM\\\\SYSTEM\\\\CurrentControlSet\\\\Control\\\\Lsa\\\\Kerberos\\\\Parameters.\\n- - Set DWORD LogLevel to 1.\\n-- Azure AD Logs: Monitor Sign-In Logs for authentication and policy issues.\\n-- Enable EDR Monitoring:\\n- - Use EDR to detect suspicious processes querying authentication mechanisms (e.g., lsass.exe memory access).\\n+- LDAP Bind Requests.\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Requests for authentication credentials via Kerberos or othet1Requests for authentication credentials via Kerberos or othe
>r methods like NTLM and LDAP queries. Examples:  - Kerberos >r methods like NTLM and LDAP queries. Examples:  - Kerberos 
>TGT and Service Tickets (Event IDs 4768, 4769) - NTLM Authen>TGT and Service Tickets (Event IDs 4768, 4769) - NTLM Authen
>tication Events - LDAP Bind Requests  *Data Collection Measu>tication Events - LDAP Bind Requests.
>res:*  - Security Event Logging:     - Enable \"`Audit Kerber 
>os Authentication Service`\" or \"`Audit Kerberos Service Tick 
>et Operations`.\"     - Captured Events: IDs 4768, 4769, 4624 
>. - Windows Event Forwarding (WEF): Forward domain controlle 
>r logs to SIEM. - SIEM Integration: Use tools like Splunk or 
> Azure Sentinel for log analysis. - Kerberos Debug Logging:  
>    - Registry Key: HKLM\\SYSTEM\\CurrentControlSet\\Control\\Ls 
>a\\Kerberos\\Parameters.     - Set DWORD LogLevel to 1. - Azur 
>e AD Logs: Monitor Sign-In Logs for authentication and polic 
>y issues. - Enable EDR Monitoring:     - Use EDR to detect s 
>uspicious processes querying authentication mechanisms (e.g. 
>, lsass.exe memory access). 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--18b236d8-7224-488f-9d2f-50076a0f653a", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.274000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0087", + "external_id": "DC0087" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Active Directory Object Creation", + "description": "Creating new objects in AD, such as user accounts, groups, organizational units (OUs), or trust relationships. Logged as Event ID 5137. Examples:\n\n- User Account Creation: New user account.\n- Group Creation: New security/distribution group.\n- OU Creation: New organizational unit.\n- Service Account Creation: New service account for automation or malicious tasks.\n- Trust Object Creation: Trust relationship with another domain.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "azure:audit", + "channel": "New device object creation" + }, + { + "name": "WinEventLog:Security", + "channel": "Device Object Creation" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4928" + }, + { + "name": "AWS:CloudTrail", + "channel": "CreateAccessKey, ImportKeyPair, CreateLoginProfile, CreateKeyPair" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:36.803000+00:00\"}, \"root['description']\": {\"new_value\": \"Creating new objects in AD, such as user accounts, groups, organizational units (OUs), or trust relationships. Logged as Event ID 5137. Examples:\\n\\n- User Account Creation: New user account.\\n- Group Creation: New security/distribution group.\\n- OU Creation: New organizational unit.\\n- Service Account Creation: New service account for automation or malicious tasks.\\n- Trust Object Creation: Trust relationship with another domain.\", \"old_value\": \"Creating new objects in AD, such as user accounts, groups, organizational units (OUs), or trust relationships. Logged as Event ID 5137. Examples:\\n\\n- User Account Creation: New user account.\\n- Group Creation: New security/distribution group.\\n- OU Creation: New organizational unit.\\n- Service Account Creation: New service account for automation or malicious tasks.\\n- Trust Object Creation: Trust relationship with another domain.\\n\\n*Data Collection Measures:*\\n\\n- Audit Policy:\\n - Enable \\\"Audit Directory Service Changes\\\" (Success and Failure).\\n - Path: `Computer Configuration > Policies > Windows Settings > Security Settings > Advanced Audit Policy Configuration > Audit Policies > Directory Service Changes`.\\n - Key Event: Event ID 5137 (object creation).\\n- Log Forwarding: Use WEF to centralize logs for SIEM tools (e.g., Splunk).\\n- Enable EDR Monitoring:\\n - Track processes that create new accounts or modify AD objects.\\n - Correlate object creation with suspicious commands (e.g., net user /add).\", \"diff\": \"--- \\n+++ \\n@@ -5,14 +5,3 @@\\n - OU Creation: New organizational unit.\\n - Service Account Creation: New service account for automation or malicious tasks.\\n - Trust Object Creation: Trust relationship with another domain.\\n-\\n-*Data Collection Measures:*\\n-\\n-- Audit Policy:\\n- - Enable \\\"Audit Directory Service Changes\\\" (Success and Failure).\\n- - Path: `Computer Configuration > Policies > Windows Settings > Security Settings > Advanced Audit Policy Configuration > Audit Policies > Directory Service Changes`.\\n- - Key Event: Event ID 5137 (object creation).\\n-- Log Forwarding: Use WEF to centralize logs for SIEM tools (e.g., Splunk).\\n-- Enable EDR Monitoring:\\n- - Track processes that create new accounts or modify AD objects.\\n- - Correlate object creation with suspicious commands (e.g., net user /add).\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Creating new objects in AD, such as user accounts, groups, ot1Creating new objects in AD, such as user accounts, groups, o
>rganizational units (OUs), or trust relationships. Logged as>rganizational units (OUs), or trust relationships. Logged as
> Event ID 5137. Examples:  - User Account Creation: New user> Event ID 5137. Examples:  - User Account Creation: New user
> account. - Group Creation: New security/distribution group.> account. - Group Creation: New security/distribution group.
> - OU Creation: New organizational unit. - Service Account C> - OU Creation: New organizational unit. - Service Account C
>reation: New service account for automation or malicious tas>reation: New service account for automation or malicious tas
>ks. - Trust Object Creation: Trust relationship with another>ks. - Trust Object Creation: Trust relationship with another
> domain.  *Data Collection Measures:*  - Audit Policy:     -> domain.
> Enable \"Audit Directory Service Changes\" (Success and Failu 
>re).     - Path: `Computer Configuration > Policies > Window 
>s Settings > Security Settings > Advanced Audit Policy Confi 
>guration > Audit Policies > Directory Service Changes`.      
>- Key Event: Event ID 5137 (object creation). - Log Forwardi 
>ng: Use WEF to centralize logs for SIEM tools (e.g., Splunk) 
>. - Enable EDR Monitoring:     - Track processes that create 
> new accounts or modify AD objects.     - Correlate object c 
>reation with suspicious commands (e.g., net user /add). 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--9085a576-636a-455b-91d2-c2921bbe6d1d", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.274000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0068", + "external_id": "DC0068" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Active Directory Object Deletion", + "description": "Object deletion in AD (e.g., user accounts, groups, OUs) is logged as Event ID 5141. Examples:\n\n- User Account: Deleted user.\n- Group: Deleted security/distribution group.\n- Organizational Unit (OU): Loss of configurations or policies.\n- Service Account: Disrupted operations or cover tracks.\n- Trust Object: Removed domain trust, disrupting connectivity.\n\n*Data Collection Measures:*\n\n- Audit Policy:\n - Enable \"Audit Directory Service Changes\" (Success and Failure).\n - Path: `Computer Configuration > Policies > Windows Settings > Security Settings > Advanced Audit Policy Configuration > Audit Policies > Directory Service Changes`.\n - Key Event: Event ID 5141.\n- Log Forwarding: Use WEF to centralize logs for SIEM tools (e.g., Splunk).\n- Enable EDR Monitoring:\n - Detect processes or users that initiate unauthorized object deletions.\n - Monitor tools and scripts that may delete key directory objects.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "WinEventLog:Security", + "channel": "EventCode=4929" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:40.681000+00:00\"}, \"root['x_mitre_log_sources'][0]['name']\": {\"new_value\": \"WinEventLog:Security\", \"old_value\": \"WinEventLog:DirectoryService\"}}}", + "previous_version": "2.0" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--5b8b466b-2c81-4fe7-946f-d677a74ae3db", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.274000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0066", + "external_id": "DC0066" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Active Directory Object Modification", + "description": "Changes to AD objects (e.g., users, groups, OUs) are logged as Event ID 5136 (Object Modification) or 5163 (Attribute Changes). Examples:\n\n- User Account: Modifying attributes (e.g., group membership, enabling/disabling accounts).\n- Group Membership: Adding/removing members.\n- OU: Changing properties/permissions (e.g., delegation).\n- Service Account: Modifying SPNs or other attributes.\n- Object Attributes: Changes to passwords, logon hours, or control flags.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "azure:activity", + "channel": "Update conditionalAccessPolicy" + }, + { + "name": "esxi:vpxa", + "channel": "vim.SessionManager.login / vim.AccountManager.createUser" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=5163" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4739" + }, + { + "name": "azure:signinlogs", + "channel": "Add certificate credential, Update certificate credential" + }, + { + "name": "m365:dirsync", + "channel": "Replication cookie changes involving Configuration partition with new server/nTDSDSA objects." + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=5136" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "name": "esxi:vpxd", + "channel": "permission change operations on datastores or VMs" + }, + { + "name": "m365:unified", + "channel": "Set-Mailbox, Set-AppPassword, Add-MailboxPermission" + }, + { + "name": "m365:unified", + "channel": "Add app role assignment grant to user: Consent to application by privileged or unexpected accounts" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_data_source_ref": "", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-22 18:42:57.886000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/datacomponents/DC0066\", \"old_value\": \"https://attack.mitre.org/data-components/DC0066\"}, \"root['description']\": {\"new_value\": \"Changes to AD objects (e.g., users, groups, OUs) are logged as Event ID 5136 (Object Modification) or 5163 (Attribute Changes). Examples:\\n\\n- User Account: Modifying attributes (e.g., group membership, enabling/disabling accounts).\\n- Group Membership: Adding/removing members.\\n- OU: Changing properties/permissions (e.g., delegation).\\n- Service Account: Modifying SPNs or other attributes.\\n- Object Attributes: Changes to passwords, logon hours, or control flags.\", \"old_value\": \"Changes to AD objects (e.g., users, groups, OUs) are logged as Event ID 5136 (Object Modification) or 5163 (Attribute Changes). Examples:\\n\\n- User Account: Modifying attributes (e.g., group membership, enabling/disabling accounts).\\n- Group Membership: Adding/removing members.\\n- OU: Changing properties/permissions (e.g., delegation).\\n- Service Account: Modifying SPNs or other attributes.\\n- Object Attributes: Changes to passwords, logon hours, or control flags.\\n\\n*Data Collection Measures:*\\n\\n- Audit Policy:\\n - Enable \\\"Audit Directory Service Changes\\\" (Success and Failure).\\n - Path: `Computer Configuration > Policies > Windows Settings > Security Settings > Advanced Audit Policy Configuration > Audit Policies > Directory Service Changes`.\\n - Key Events: 5136 (modifications), 5163 (attribute changes).\\n- Log Forwarding:\\n - Use WEF to centralize logs for SIEM.\\n - Parse logs to extract: Object Name, Attribute Changed, Initiator Account Name.\\n- Enable EDR Monitoring:\\n - Detect changes to critical attributes (e.g., memberOf, logonHours).\\n - Track processes modifying directory service objects (e.g., Set-ADUser or dsmod).\\n- Enable EDR Monitoring:\\n - Detect changes to critical attributes (e.g., memberOf, logonHours).\\n - Track processes modifying directory service objects (e.g., Set-ADUser or dsmod).\", \"diff\": \"--- \\n+++ \\n@@ -5,19 +5,3 @@\\n - OU: Changing properties/permissions (e.g., delegation).\\n - Service Account: Modifying SPNs or other attributes.\\n - Object Attributes: Changes to passwords, logon hours, or control flags.\\n-\\n-*Data Collection Measures:*\\n-\\n-- Audit Policy:\\n- - Enable \\\"Audit Directory Service Changes\\\" (Success and Failure).\\n- - Path: `Computer Configuration > Policies > Windows Settings > Security Settings > Advanced Audit Policy Configuration > Audit Policies > Directory Service Changes`.\\n- - Key Events: 5136 (modifications), 5163 (attribute changes).\\n-- Log Forwarding:\\n- - Use WEF to centralize logs for SIEM.\\n- - Parse logs to extract: Object Name, Attribute Changed, Initiator Account Name.\\n-- Enable EDR Monitoring:\\n- - Detect changes to critical attributes (e.g., memberOf, logonHours).\\n- - Track processes modifying directory service objects (e.g., Set-ADUser or dsmod).\\n-- Enable EDR Monitoring:\\n- - Detect changes to critical attributes (e.g., memberOf, logonHours).\\n- - Track processes modifying directory service objects (e.g., Set-ADUser or dsmod).\"}, \"root['x_mitre_log_sources'][6]['name']\": {\"new_value\": \"WinEventLog:Security\", \"old_value\": \"WinEventLog:DirectoryService\", \"new_path\": \"root['x_mitre_log_sources'][2]['name']\"}, \"root['x_mitre_log_sources'][6]['channel']\": {\"new_value\": \"EventCode=5163\", \"old_value\": \"EventCode=5136\", \"new_path\": \"root['x_mitre_log_sources'][2]['channel']\"}, \"root['x_mitre_log_sources'][4]['name']\": {\"new_value\": \"azure:signinlogs\", \"old_value\": \"azure:SigninLogs\"}, \"root['x_mitre_log_sources'][7]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][9]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4670\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Changes to AD objects (e.g., users, groups, OUs) are logged t1Changes to AD objects (e.g., users, groups, OUs) are logged 
>as Event ID 5136 (Object Modification) or 5163 (Attribute Ch>as Event ID 5136 (Object Modification) or 5163 (Attribute Ch
>anges). Examples:  - User Account: Modifying attributes (e.g>anges). Examples:  - User Account: Modifying attributes (e.g
>., group membership, enabling/disabling accounts). - Group M>., group membership, enabling/disabling accounts). - Group M
>embership: Adding/removing members. - OU: Changing propertie>embership: Adding/removing members. - OU: Changing propertie
>s/permissions (e.g., delegation). - Service Account: Modifyi>s/permissions (e.g., delegation). - Service Account: Modifyi
>ng SPNs or other attributes. - Object Attributes: Changes to>ng SPNs or other attributes. - Object Attributes: Changes to
> passwords, logon hours, or control flags.  *Data Collection> passwords, logon hours, or control flags.
> Measures:*  - Audit Policy:     - Enable \"Audit Directory S 
>ervice Changes\" (Success and Failure).     - Path: `Computer 
> Configuration > Policies > Windows Settings > Security Sett 
>ings > Advanced Audit Policy Configuration > Audit Policies  
>> Directory Service Changes`.     - Key Events: 5136 (modifi 
>cations), 5163 (attribute changes). - Log Forwarding:     -  
>Use WEF to centralize logs for SIEM.     - Parse logs to ext 
>ract: Object Name, Attribute Changed, Initiator Account Name 
>. - Enable EDR Monitoring:     - Detect changes to critical  
>attributes (e.g., memberOf, logonHours).     - Track process 
>es modifying directory service objects (e.g., Set-ADUser or  
>dsmod). - Enable EDR Monitoring:     - Detect changes to cri 
>tical attributes (e.g., memberOf, logonHours).     - Track p 
>rocesses modifying directory service objects (e.g., Set-ADUs 
>er or dsmod). 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.272000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0038", + "external_id": "DC0038" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Application Log Content", + "description": "Application Log Content refers to logs generated by applications or services, providing a record of their activity. These logs may include metrics, errors, performance data, and operational alerts from web, mail, or other applications. These logs are vital for monitoring application behavior and detecting malicious activities or anomalies. Examples: \n\n- Web Application Logs: These logs include information about requests, responses, errors, and security events (e.g., unauthorized access attempts).\n- Email Application Logs: Logs contain metadata about emails sent, received, or blocked (e.g., sender/receiver addresses, message IDs).\n- SaaS Application Logs: Activity logs include user logins, configuration changes, and access to sensitive resources.\n- Cloud Application Logs: Logs detail control plane activities, including API calls, instance modifications, and network changes.\n- System/Application Monitoring Logs: Logs provide insights into application performance, errors, and anomalies.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Application Log", + "channel": "None" + }, + { + "name": "WinEventLog:Application", + "channel": "Outlook errors loading or processing custom form templates" + }, + { + "name": "m365:unified", + "channel": "Unusual form activity within Outlook client, including load of non-default forms" + }, + { + "name": "saas:okta", + "channel": "Conditional Access policy rule modified or MFA requirement disabled" + }, + { + "name": "ApplicationLog:EntraIDPortal", + "channel": "DeviceRegistration events" + }, + { + "name": "ApplicationLog:Intune/MDM Logs", + "channel": "Enrollment events (e.g., MDMDeviceRegistration)" + }, + { + "name": "m365:purview", + "channel": "MailItemsAccessed & Exchange Audit" + }, + { + "name": "m365:purview", + "channel": "MailItemsAccessed, Search-Mailbox events" + }, + { + "name": "WinEventLog:Application", + "channel": "Office Add-in load errors, abnormal loading context, or unsigned add-in warnings" + }, + { + "name": "m365:unified", + "channel": "SendOnBehalf, MessageSend, ClickThrough, MailItemsAccessed" + }, + { + "name": "Application:Mail", + "channel": "smtpd$.*$: .*from=[.*@internaldomain.com](mailto:.*@internaldomain.com) to=[.*@internaldomain.com](mailto:.*@internaldomain.com)" + }, + { + "name": "saas:slack", + "channel": "file_upload, message_send, message_click" + }, + { + "name": "saas:teams", + "channel": "ChatMessageSent, ChatMessageEdited, LinkClick" + }, + { + "name": "saas:gmail", + "channel": "SendEmail, OpenAttachment, ClickLink" + }, + { + "name": "m365:unified", + "channel": "SendOnBehalf, MessageSend, AttachmentPreviewed" + }, + { + "name": "WinEventLog:System", + "channel": "Changes to applicationhost.config or DLLs loaded by w3wp.exe" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=6416" + }, + { + "name": "WinEventLog:System", + "channel": "Device started/installed (UMDF) GUIDs" + }, + { + "name": "linux:syslog", + "channel": "usb * new|thunderbolt|pci .* added|block.*: new .* device" + }, + { + "name": "macos:unifiedlog", + "channel": "Device attached|enumerated VID/PID" + }, + { + "name": "m365:unified", + "channel": "Send/Receive: Emails with suspicious sender domains, spoofed headers, or anomalous attachment types" + }, + { + "name": "Application:Mail", + "channel": "Inbound messages with anomalous headers, spoofed SPF/DKIM failures" + }, + { + "name": "macos:unifiedlog", + "channel": "Inbound email activity with suspicious domains or mismatched sender information" + }, + { + "name": "m365:unified", + "channel": "FileAccessed: Access of email attachments by Office applications" + }, + { + "name": "saas:collaboration", + "channel": "MessagePosted: Suspicious links or attachment delivery via collaboration tools (Slack, Teams, Zoom)" + }, + { + "name": "ApplicationLog:IIS", + "channel": "IIS W3C logs in C:\\inetpub\\logs\\LogFiles\\W3SVC* (spikes in 5xx, RCE/SQLi/path traversal/JNDI patterns)" + }, + { + "name": "ApplicationLog:WebServer", + "channel": "/var/log/httpd/access_log, /var/log/apache2/access.log, /var/log/nginx/access.log with exploit indicators and burst errors" + }, + { + "name": "macos:unifiedlog", + "channel": "App/web server logs ingested via unified logging or filebeat (nginx/apache/node)." + }, + { + "name": "ApplicationLog:Ingress", + "channel": "Kubernetes NGINX/Envoy ingress controller logs with anomalous payloads and 5xx spikes" + }, + { + "name": "esxi:hostd", + "channel": "/var/log/hostd.log anomalies (faults, crashes, restarts) around inbound connections" + }, + { + "name": "esxi:vmkernel", + "channel": "vmkernel / OpenSLP logs for malformed requests" + }, + { + "name": "networkdevice:controlplane", + "channel": "Syslog from edge devices with HTTP 500s on mgmt portal, SmartInstall events, unexpected CLI commands" + }, + { + "name": "WinEventLog:Application", + "channel": "Outlook rule execution failure or abnormal rule execution context" + }, + { + "name": "m365:unified", + "channel": "Creation or modification of inbox rule outside of normal user behavior" + }, + { + "name": "m365:unified", + "channel": "Send/Receive: Inbound emails containing embedded or shortened URLs" + }, + { + "name": "Application:Mail", + "channel": "Inbound emails containing hyperlinks from suspicious sources" + }, + { + "name": "macos:unifiedlog", + "channel": "Received messages with embedded or shortened URLs" + }, + { + "name": "azure:signinlogs", + "channel": "ConsentGrant: Suspicious consent grants to non-approved or unknown applications" + }, + { + "name": "m365:unified", + "channel": "AppRegistration: Unexpected application registration or OAuth authorization" + }, + { + "name": "m365:unified", + "channel": "MessageSend, MessageRead, or FileAttached events containing credential-like patterns" + }, + { + "name": "m365:exchange", + "channel": "Emails containing cleartext secrets (password=, api_key=, token=) shared across internal/external domains" + }, + { + "name": "saas:slack", + "channel": "chat.postMessage, files.upload, or discovery API calls involving token/credential regex" + }, + { + "name": "linux:syslog", + "channel": "Inbound messages from webmail services containing attachments or URLs" + }, + { + "name": "macos:unifiedlog", + "channel": "Received messages containing embedded links or attachments from non-enterprise services" + }, + { + "name": "WinEventLog:System", + "channel": "EventCode=1000" + }, + { + "name": "linux:syslog", + "channel": "kernel|systemd messages indicating 'segmentation fault'|'core dumped'|'service terminated unexpectedly' for sshd, smbd, vsftpd, mysqld, httpd, etc." + }, + { + "name": "esxi:hostd", + "channel": "Keywords: 'Backtrace','Signal 11','PANIC','hostd restarted','assert' or 'Service terminated unexpectedly' in /var/log/hostd.log, /var/log/vmkernel.log, /var/log/syslog.log." + }, + { + "name": "macos:unifiedlog", + "channel": "process 'crashed'|'EXC_BAD_ACCESS' for sshd, screensharingd, httpd; launchd restarts of these daemons." + }, + { + "name": "esxi:hostd", + "channel": "unexpected script/command invocations via hostd" + }, + { + "name": "linux:syslog", + "channel": "System daemons initiating encrypted sessions with unexpected destinations" + }, + { + "name": "esxi:vpxd", + "channel": "Symmetric crypto routines triggered for external session" + }, + { + "name": "AWS:CloudTrail", + "channel": "SendEmail" + }, + { + "name": "AWS:CloudTrail", + "channel": "InvokeModel" + }, + { + "name": "saas:openai", + "channel": "High volume of requests to /v1/chat/completions or /v1/images/generations" + }, + { + "name": "m365:unified", + "channel": "Set-Mailbox, Add-InboxRule, RegisterWebhook" + }, + { + "name": "saas:application", + "channel": "High-frequency invocation of SMS-related API endpoints from publicly accessible OTP or verification forms (e.g., Twilio: SendMessage, Cognito: AdminCreateUser) with irregular destination patterns." + }, + { + "name": "NSM:Connections", + "channel": "PushNotificationSent" + }, + { + "name": "saas:okta", + "channel": "MFAChallengeIssued" + }, + { + "name": "WinEventLog:Application", + "channel": "Exchange Transport Service loads unusual .NET assembly or errors upon transport agent execution" + }, + { + "name": "linux:syslog", + "channel": "milter configuration updated, transport rule initialized, unexpected script execution" + }, + { + "name": "WinEventLog:Application", + "channel": "Unexpected spikes in request volume, application-level errors, or thread pool exhaustion in web or API logs" + }, + { + "name": "linux:syslog", + "channel": "Repetitive HTTP 408, 500, or 503 errors logged within short timeframe" + }, + { + "name": "macos:unifiedlog", + "channel": "opendirectoryd crashes or abnormal authentication errors" + }, + { + "name": "m365:unified", + "channel": "ConsentGranted: Abuse of application integrations to mint tokens bypassing MFA" + }, + { + "name": "WinEventLog:Application", + "channel": "Browser or plugin/application logs showing script errors, plugin enumerations, or unusual extension load events" + }, + { + "name": "linux:syslog", + "channel": "Application or browser logs (webview errors, plugin enumerations) indicating suspicious script evaluation or plugin loads" + }, + { + "name": "macos:unifiedlog", + "channel": "Logs from unifiedlogging that show browser crashes, plugin enumerations, extension installs or errors around the same time as suspicious network fetches" + }, + { + "name": "m365:unified", + "channel": "Application Consent grants, new OAuth client registrations, or unusual admin-level activities executed by a user account shortly after suspected drive-by compromise" + }, + { + "name": "WinEventLog:Application", + "channel": "Outlook logs indicating failure to load or render HTML page in Home Page view" + }, + { + "name": "m365:unified", + "channel": "Folder configuration updated with external or HTML-formatted Home Page via Set-MailboxFolder" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=1102" + }, + { + "name": "linux:cli", + "channel": "cleared or truncated .bash_history" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream cleared or truncated" + }, + { + "name": "m365:unified", + "channel": "PurgeAuditLogs, Remove-MailboxAuditLog" + }, + { + "name": "WinEventLog:System", + "channel": "EventCode=104" + }, + { + "name": "WinEventLog:Application", + "channel": "EventCode=1000" + }, + { + "name": "EDR:detection", + "channel": "ThreatDetected, QuarantineLog" + }, + { + "name": "macos:unifiedlog", + "channel": "quarantine or AV-related subsystem" + }, + { + "name": "EDR:detection", + "channel": "ThreatLog" + }, + { + "name": "azure:signinlogs", + "channel": "Modify Conditional Access Policy" + }, + { + "name": "m365:unified", + "channel": "Set-CsOnlineUser or UpdateAuthPolicy" + }, + { + "name": "m365:unified", + "channel": "New-InboxRule or Set-InboxRule events recorded in Exchange Online" + }, + { + "name": "ApplicationLog:MailServer", + "channel": "Unexpected additions of sieve rules or filtering directives" + }, + { + "name": "m365:unified", + "channel": "Transport rule or inbox rule creation events" + }, + { + "name": "ApplicationLog:Outlook", + "channel": "Outlook client-level rule creation actions not consistent with normal user activity" + }, + { + "name": "kubernetes:orchestrator", + "channel": "Access to orchestrator logs containing credentials (Docker/Kubernetes logs)" + }, + { + "name": "WinEventLog:Application", + "channel": "Service crash, unhandled exception, or application hang warnings for critical services (e.g., IIS, DNS, SQL Server)" + }, + { + "name": "journald:systemd", + "channel": "Repeated service restart attempts or unit failures" + }, + { + "name": "macos:unifiedlog", + "channel": "Repeated process crashes logged by CrashReporter or system instability logs in com.apple.console" + }, + { + "name": "docker:events", + "channel": "Container exited with non-zero code repeatedly in short period" + }, + { + "name": "WinEventLog:Application", + "channel": "SCCM, Intune logs" + }, + { + "name": "macos:jamf", + "channel": "RemoteCommandExecution" + }, + { + "name": "networkdevice:syslog", + "channel": "config push events" + }, + { + "name": "linux:syslog", + "channel": "processes binding to non-standard ports or sshd configured on unexpected port" + }, + { + "name": "m365:unified", + "channel": "GAL Lookup or Address Book download" + }, + { + "name": "esxi:hostd", + "channel": "Guest Operations API invocation: StartProgramInGuest, ListProcessesInGuest, ListFileInGuest, InitiateFileTransferFromGuest" + }, + { + "name": "m365:unified", + "channel": "Send/Receive: Inbound emails with attachments from suspicious or spoofed senders" + }, + { + "name": "Application:Mail", + "channel": "Inbound email attachments logged from MTAs with suspicious metadata" + }, + { + "name": "macos:unifiedlog", + "channel": "Inbound messages with attachments from suspicious domains" + }, + { + "name": "WinEventLog:Application", + "channel": "Unexpected web application errors or CMS logs showing modification to index.html, default.aspx, or other public-facing files" + }, + { + "name": "m365:unified", + "channel": "certificate added or modified in application credentials" + }, + { + "name": "saas:Snowflake", + "channel": "QUERY: Large or repeated SELECT * queries to sensitive tables" + }, + { + "name": "saas:Airtable", + "channel": "EXPORT: User-triggered data export via GUI or API" + }, + { + "name": "ApplicationLog:CallRecords", + "channel": "Outbound or inbound calls to high-risk or blocklisted numbers" + }, + { + "name": "networkdevice:syslog", + "channel": "SIP REGISTER, INVITE, or unusual call destination metadata" + }, + { + "name": "macos:unifiedlog", + "channel": "Outgoing or incoming calls with non-standard caller IDs or unusual metadata" + }, + { + "name": "m365:unified", + "channel": "Unusual MFA requests or OAuth consent events temporally aligned with user-reported vishing call" + }, + { + "name": "docker:daemon", + "channel": "container_create,container_start" + }, + { + "name": "saas:github", + "channel": "Bulk access to multiple files or large volume of repo requests within short time window" + }, + { + "name": "m365:exchange", + "channel": "Transport Rule Modification" + }, + { + "name": "m365:exchange", + "channel": "Admin Audit Logs, Transport Rules" + }, + { + "name": "saas:application", + "channel": "High-volume API calls or traffic via messaging or webhook service" + }, + { + "name": "m365:unified", + "channel": "Set federation settings on domain|Set domain authentication|Add federated identity provider" + }, + { + "name": "linux:syslog", + "channel": "system daemons initiating TLS sessions outside expected services" + }, + { + "name": "m365:unified", + "channel": "SendOnBehalf/SendAs: Emails sent where the sending identity mismatches account ownership" + }, + { + "name": "Application:Mail", + "channel": "Mismatch between authenticated username and From header in email" + }, + { + "name": "macos:unifiedlog", + "channel": "Mail.app or third-party clients sending messages with mismatched From headers" + }, + { + "name": "gcp:workspaceaudit", + "channel": "SendAs: Outbound messages with alias identities that differ from primary account" + }, + { + "name": "m365:unified", + "channel": "Set-MailboxAutoReplyConfiguration: Unexpected rule changes creating impersonated replies" + }, + { + "name": "m365:unified", + "channel": "SendOnBehalf/SendAs: Office Suite initiated messages using impersonated identities" + }, + { + "name": "linux:syslog", + "channel": "browser/office crash, segfault, abnormal termination" + }, + { + "name": "macos:unifiedlog", + "channel": "process crash, abort, code signing violations" + }, + { + "name": "saas:okta", + "channel": "WebUI access to administrator dashboard" + }, + { + "name": "m365:unified", + "channel": "Read-only configuration review from GUI" + }, + { + "name": "saas:box", + "channel": "User navigated to admin interface" + }, + { + "name": "azure:signinlogs", + "channel": "Register PTA Agent or Modify AD FS trust" + }, + { + "name": "m365:unified", + "channel": "Modify Federation Settings or Update Authentication Policy" + }, + { + "name": "saas:okta", + "channel": "Federation configuration update or signing certificate change" + }, + { + "name": "macos:unifiedlog", + "channel": "Configuration profile modified or new profile installed" + }, + { + "name": "journald:Application", + "channel": "Segfault or crash log entry associated with specific application binary" + }, + { + "name": "macos:unifiedlog", + "channel": "Crash log entries for a process receiving malformed input or known exploit patterns" + }, + { + "name": "AWS:CloudWatch", + "channel": "Repeated crash pattern within container or instance logs" + }, + { + "name": "esxi:hostd", + "channel": "unexpected script invocations producing long encoded strings" + }, + { + "name": "docker:runtime", + "channel": "execution of cloud CLI tool (e.g., aws, az) inside container" + }, + { + "name": "WinEventLog:Application", + "channel": "VPN, Citrix, or remote access gateway logs showing external IP addresses" + }, + { + "name": "NSM:Connections", + "channel": "Failed password or accepted password for SSH users" + }, + { + "name": "ApplicationLog:API", + "channel": "Docker/Kubernetes API access from external sources" + }, + { + "name": "m365:unified", + "channel": "Send/Receive: Unusual spikes in inbound messages to a single recipient" + }, + { + "name": "Application:Mail", + "channel": "High-frequency inbound mail activity to a specific recipient address" + }, + { + "name": "m365:exchange", + "channel": "MailDelivery: High-frequency delivery of messages or attachments to a single recipient" + }, + { + "name": "macos:unifiedlog", + "channel": "Repetitive inbound email delivery activity logged within a short time window" + }, + { + "name": "saas:confluence", + "channel": "access.content" + }, + { + "name": "m365:unified", + "channel": "PowerShell: Add-MailboxPermission" + }, + { + "name": "AWS:CloudTrail", + "channel": "InvokeFunction: Unexpected or repeated invocation of functions not tied to known workflows" + }, + { + "name": "m365:exchange", + "channel": "New-InboxRule: Automation that triggers abnormal forwarding or external link generation" + }, + { + "name": "saas:googledrive", + "channel": "FileOpen / FileAccess: Event-driven script triggering on user file actions" + }, + { + "name": "networkdevice:syslog", + "channel": "Failed authentication requests redirected to non-standard portals" + }, + { + "name": "saas:okta", + "channel": "System API Call: user.read, group.read" + }, + { + "name": "esxi:hostd", + "channel": "Host daemon command log entries related to vib enumeration" + }, + { + "name": "m365:unified", + "channel": "Add-MailboxPermission or Set-ManagementRoleAssignment" + }, + { + "name": "WinEventLog:Application", + "channel": "Outlook rule creation, form load, or homepage redirection" + }, + { + "name": "m365:mailboxaudit", + "channel": "Outlook rule creation or custom form deployment" + }, + { + "name": "saas:zoom", + "channel": "unusual web session tokens and automation patterns during login" + }, + { + "name": "WinEventLog:Application", + "channel": "High-frequency errors or hangs from resource-intensive application components (e.g., .NET, IIS, Office Suite)" + }, + { + "name": "linux:syslog", + "channel": "Error/warning logs from services indicating load spike or worker exhaustion" + }, + { + "name": "macos:unifiedlog", + "channel": "Application errors or resource contention from excessive frontend or script invocation" + }, + { + "name": "AWS:CloudWatch", + "channel": "Elevated 5xx response rates in application logs or gateway layer" + }, + { + "name": "m365:messagetrace", + "channel": "AuthenticationDetails=fail OR SPF=fail OR DKIM=fail OR DMARC=fail" + }, + { + "name": "linux:syslog", + "channel": "SPF fail OR DKIM fail OR DMARC fail OR mismatched from_domain vs return_path_domain" + }, + { + "name": "macos:unifiedlog", + "channel": "SPF fail OR DKIM fail OR DMARC fail OR mismatched header vs envelope domains" + }, + { + "name": "saas:email", + "channel": "AuthenticationFailures (SPF/DKIM/DMARC) OR Domain Mismatch" + }, + { + "name": "WinEventLog:System", + "channel": "EventCode=1341, 1342, 1020, 1063" + }, + { + "name": "linux:syslog", + "channel": "suspicious DHCP lease assignment with unexpected DNS or gateway" + }, + { + "name": "macos:unifiedlog", + "channel": "new DHCP configuration with anomalous DNS or router values" + }, + { + "name": "WinEventLog:Application", + "channel": "Exchange logs or header artifacts" + }, + { + "name": "macos:unifiedlog", + "channel": "Mail or AppleScript subsystem" + }, + { + "name": "m365:exchange", + "channel": "MessageTrace logs" + }, + { + "name": "linux:syslog", + "channel": "opened document|clicked link|segfault|abnormal termination|sandbox" + }, + { + "name": "macos:unifiedlog", + "channel": "opened document|clicked link|EXC_BAD_ACCESS|abort|LSQuarantine" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "name": "m365:unified", + "channel": "Set-PartnerOfRecord / CompanyAdministrator role assignments / New-DelegatedAdminRelationship" + }, + { + "name": "AWS:CloudTrail", + "channel": "CreateUser|AttachRolePolicy|CreateAccessKey|UpdateAssumeRolePolicy|CreateLoginProfile" + }, + { + "name": "azure:activity", + "channel": "Add role assignment / ElevateAccess / Create service principal" + }, + { + "name": "saas:googleworkspace", + "channel": "OAuth2 authorization grants / Admin role assignments" + }, + { + "name": "m365:unified", + "channel": "Add-DelegatedAdmin, Set-PartnerOfRecord, Add-MailboxPermission, Set-OrganizationRelationship" + }, + { + "name": "linux:syslog", + "channel": "Authentication attempts into finance-related servers from unusual IPs or times" + }, + { + "name": "macos:unifiedlog", + "channel": "Anomalous keychain access attempts targeting payment credentials" + }, + { + "name": "saas:finance", + "channel": "Transaction/Transfer: Unusual or large transactions initiated outside business hours or by unusual accounts" + }, + { + "name": "saas:audit", + "channel": "Rule/ConfigChange: Auto-forward rules, delegate assignments, or changes to financial approval workflows" + }, + { + "name": "m365:unified", + "channel": "MailSend: Outlook messages with suspicious subject/body terms (e.g., urgent payment, wire transfer) targeting finance teams" + }, + { + "name": "m365:unified", + "channel": "FileAccessed, FileDownloaded, SearchQueried" + }, + { + "name": "m365:unified", + "channel": "Detection of hidden macro streams or SetHiddenAttribute actions" + }, + { + "name": "m365:unified", + "channel": "RunMacro" + }, + { + "name": "azure:audit", + "channel": "App registrations or consent grants by abnormal users or at unusual times" + }, + { + "name": "azure:signinlogs", + "channel": "Resource access initiated using application credentials, not user accounts" + }, + { + "name": "saas:slack", + "channel": "OAuth token use by unknown app client_id accessing private channels or files" + }, + { + "name": "esxi:esxupdate", + "channel": "/var/log/esxupdate.log contains VIB installed with `--force` or `--no-sig-check` and non-standard acceptance levels" + }, + { + "name": "linux:syslog", + "channel": "sshd sessions with unusual port forwarding parameters" + }, + { + "name": "saas:audit", + "channel": "Application added or consent granted: Integration persisting after original user disabled" + }, + { + "name": "linux:syslog", + "channel": "Non-standard processes negotiating SSL/TLS key exchanges" + }, + { + "name": "esxi:vpxd", + "channel": "ESXi process initiating asymmetric handshake with external host" + }, + { + "name": "WinEventLog:Application", + "channel": "Unusual DLL/plugin registration for IIS/SQL/Apache or unexpected error logs" + }, + { + "name": "linux:syslog", + "channel": "Module registration or stacktrace logs indicating segmentation faults or unknown module errors" + }, + { + "name": "esxi:hostd", + "channel": "New extension/module install with unknown vendor ID" + }, + { + "name": "m365:unified", + "channel": "FileUploaded or FileCopied events" + }, + { + "name": "saas:salesforce", + "channel": "DataExport, RestAPI, Login, ReportExport" + }, + { + "name": "saas:hubspot", + "channel": "contact_viewed, contact_exported, login" + }, + { + "name": "saas:slack", + "channel": "conversations.history, files.list, users.info, audit_logs" + }, + { + "name": "m365:unified", + "channel": "TeamsMessageAccess, TeamsExport, ExternalAppAccess" + }, + { + "name": "m365:unified", + "channel": "TeamsMessagesAccessedViaEDiscovery, TeamsGraphMessageExport" + }, + { + "name": "m365:unified", + "channel": "FileAccessed" + }, + { + "name": "m365:messagetrace", + "channel": "X-MS-Exchange-Organization-AutoForwarded" + }, + { + "name": "linux:syslog", + "channel": "Segfaults, kernel oops, or crashes in security software processes" + }, + { + "name": "macos:unifiedlog", + "channel": "Abnormal terminations of com.apple.security.* or 3rd-party security daemons" + }, + { + "name": "AWS:CloudTrail", + "channel": "StopLogging, DeleteTrail, UpdateTrail: API calls that disable or modify logging services" + }, + { + "name": "m365:unified", + "channel": "ApplicationModified, ConsentGranted: Unexpected app consent or modification events linked to security evasion" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:36.580000+00:00\"}, \"root['description']\": {\"new_value\": \"Application Log Content refers to logs generated by applications or services, providing a record of their activity. These logs may include metrics, errors, performance data, and operational alerts from web, mail, or other applications. These logs are vital for monitoring application behavior and detecting malicious activities or anomalies. Examples: \\n\\n- Web Application Logs: These logs include information about requests, responses, errors, and security events (e.g., unauthorized access attempts).\\n- Email Application Logs: Logs contain metadata about emails sent, received, or blocked (e.g., sender/receiver addresses, message IDs).\\n- SaaS Application Logs: Activity logs include user logins, configuration changes, and access to sensitive resources.\\n- Cloud Application Logs: Logs detail control plane activities, including API calls, instance modifications, and network changes.\\n- System/Application Monitoring Logs: Logs provide insights into application performance, errors, and anomalies.\", \"old_value\": \"Application Log Content refers to logs generated by applications or services, providing a record of their activity. These logs may include metrics, errors, performance data, and operational alerts from web, mail, or other applications. These logs are vital for monitoring application behavior and detecting malicious activities or anomalies. Examples: \\n\\n- Web Application Logs: These logs include information about requests, responses, errors, and security events (e.g., unauthorized access attempts).\\n- Email Application Logs: Logs contain metadata about emails sent, received, or blocked (e.g., sender/receiver addresses, message IDs).\\n- SaaS Application Logs: Activity logs include user logins, configuration changes, and access to sensitive resources.\\n- Cloud Application Logs: Logs detail control plane activities, including API calls, instance modifications, and network changes.\\n- System/Application Monitoring Logs: Logs provide insights into application performance, errors, and anomalies.\\n\\nThis data component can be collected through the following measures:\\n\\nConfigure Application Logging\\n\\n- Enable logging within the application or service.\\n- Examples:\\n - Web Servers: Enable access and error logs in NGINX or Apache.\\n - Email Systems: Enable audit logging in Microsoft Exchange or Gmail.\\n\\nCentralized Log Management\\n\\n- Use log management solutions like Splunk, or a cloud-native logging solution.\\n- Configure the application to send logs to a centralized system for analysis.\\n\\nCloud-Specific Collection\\n\\n- Use services like AWS CloudWatch, Azure Monitor, or Google Cloud Operations Suite for cloud-based applications.\\n- Ensure logging is enabled for all critical resources (e.g., API calls, IAM changes).\\n\\nSIEM Integration\\n\\n- Integrate application logs with a SIEM platform (e.g., Splunk, QRadar) for real-time correlation and analysis.\\n- Use parsers to standardize log formats and extract key fields like timestamps, user IDs, and error codes.\", \"diff\": \"--- \\n+++ \\n@@ -5,27 +5,3 @@\\n - SaaS Application Logs: Activity logs include user logins, configuration changes, and access to sensitive resources.\\n - Cloud Application Logs: Logs detail control plane activities, including API calls, instance modifications, and network changes.\\n - System/Application Monitoring Logs: Logs provide insights into application performance, errors, and anomalies.\\n-\\n-This data component can be collected through the following measures:\\n-\\n-Configure Application Logging\\n-\\n-- Enable logging within the application or service.\\n-- Examples:\\n- - Web Servers: Enable access and error logs in NGINX or Apache.\\n- - Email Systems: Enable audit logging in Microsoft Exchange or Gmail.\\n-\\n-Centralized Log Management\\n-\\n-- Use log management solutions like Splunk, or a cloud-native logging solution.\\n-- Configure the application to send logs to a centralized system for analysis.\\n-\\n-Cloud-Specific Collection\\n-\\n-- Use services like AWS CloudWatch, Azure Monitor, or Google Cloud Operations Suite for cloud-based applications.\\n-- Ensure logging is enabled for all critical resources (e.g., API calls, IAM changes).\\n-\\n-SIEM Integration\\n-\\n-- Integrate application logs with a SIEM platform (e.g., Splunk, QRadar) for real-time correlation and analysis.\\n-- Use parsers to standardize log formats and extract key fields like timestamps, user IDs, and error codes.\"}, \"root['x_mitre_log_sources'][17]['name']\": {\"new_value\": \"WinEventLog:System\", \"old_value\": \"WinEventLog:Microsoft-Windows-DriverFrameworks-UserMode/Operational\"}, \"root['x_mitre_log_sources'][37]['name']\": {\"new_value\": \"azure:signinlogs\", \"old_value\": \"azure:signinLogs\"}, \"root['x_mitre_log_sources'][75]['name']\": {\"new_value\": \"WinEventLog:System\", \"old_value\": \"WinEventLog:Application\", \"new_path\": \"root['x_mitre_log_sources'][44]['name']\"}, \"root['x_mitre_log_sources'][75]['channel']\": {\"new_value\": \"EventCode=1000\", \"old_value\": \"EventCode=1000-1026\", \"new_path\": \"root['x_mitre_log_sources'][44]['channel']\"}, \"root['x_mitre_log_sources'][44]['channel']\": {\"new_value\": \"EventCode=1341, 1342, 1020, 1063\", \"old_value\": \"EventCode=7031,7034,1000,1001\", \"new_path\": \"root['x_mitre_log_sources'][161]['channel']\"}, \"root['x_mitre_log_sources'][172]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\", \"new_path\": \"root['x_mitre_log_sources'][169]['channel']\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][130]\": {\"name\": \"WinEventLog:Application\", \"channel\": \"EventCode=1000, 1001, 1002\"}, \"root['x_mitre_log_sources'][163]\": {\"name\": \"WinEventLog:System\", \"channel\": \"EventCode=1341,1342,1020,1063\"}, \"root['x_mitre_log_sources'][169]\": {\"name\": \"WinEventLog:Application\", \"channel\": \"EventCode=1000,1001\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Application Log Content refers to logs generated by applicatt1Application Log Content refers to logs generated by applicat
>ions or services, providing a record of their activity. Thes>ions or services, providing a record of their activity. Thes
>e logs may include metrics, errors, performance data, and op>e logs may include metrics, errors, performance data, and op
>erational alerts from web, mail, or other applications. Thes>erational alerts from web, mail, or other applications. Thes
>e logs are vital for monitoring application behavior and det>e logs are vital for monitoring application behavior and det
>ecting malicious activities or anomalies. Examples:   - Web >ecting malicious activities or anomalies. Examples:   - Web 
>Application Logs: These logs include information about reque>Application Logs: These logs include information about reque
>sts, responses, errors, and security events (e.g., unauthori>sts, responses, errors, and security events (e.g., unauthori
>zed access attempts). - Email Application Logs: Logs contain>zed access attempts). - Email Application Logs: Logs contain
> metadata about emails sent, received, or blocked (e.g., sen> metadata about emails sent, received, or blocked (e.g., sen
>der/receiver addresses, message IDs). - SaaS Application Log>der/receiver addresses, message IDs). - SaaS Application Log
>s: Activity logs include user logins, configuration changes,>s: Activity logs include user logins, configuration changes,
> and access to sensitive resources. - Cloud Application Logs> and access to sensitive resources. - Cloud Application Logs
>: Logs detail control plane activities, including API calls,>: Logs detail control plane activities, including API calls,
> instance modifications, and network changes. - System/Appli> instance modifications, and network changes. - System/Appli
>cation Monitoring Logs: Logs provide insights into applicati>cation Monitoring Logs: Logs provide insights into applicati
>on performance, errors, and anomalies.  This data component >on performance, errors, and anomalies.
>can be collected through the following measures:  Configure  
>Application Logging  - Enable logging within the application 
> or service. - Examples:     - Web Servers: Enable access an 
>d error logs in NGINX or Apache.     - Email Systems: Enable 
> audit logging in Microsoft Exchange or Gmail.  Centralized  
>Log Management  - Use log management solutions like Splunk,  
>or a cloud-native logging solution. - Configure the applicat 
>ion to send logs to a centralized system for analysis.  Clou 
>d-Specific Collection  - Use services like AWS CloudWatch, A 
>zure Monitor, or Google Cloud Operations Suite for cloud-bas 
>ed applications. - Ensure logging is enabled for all critica 
>l resources (e.g., API calls, IAM changes).  SIEM Integratio 
>n  - Integrate application logs with a SIEM platform (e.g.,  
>Splunk, QRadar) for real-time correlation and analysis. - Us 
>e parsers to standardize log formats and extract key fields  
>like timestamps, user IDs, and error codes. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--ec0612c5-2644-4c50-bcac-82586974fedd", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.274000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0090", + "external_id": "DC0090" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Cloud Service Disable", + "description": "This data component refers to monitoring actions that deactivate or stop a cloud service in a cloud control plane. Examples include disabling essential logging services like AWS CloudTrail (`StopLogging` API call), Microsoft Azure Monitor Logs, or Google Cloud's Operations Suite (formerly Stackdriver). Disabling such services can hinder visibility into adversary activities within the cloud environment. Examples: \n\n- AWS CloudTrail StopLogging: This action stops logging of API activity for a particular trail, effectively reducing the monitoring and visibility of AWS resources and activities.\n- Microsoft Azure Monitor Logs: Disabling these logs hinders the organization\u2019s ability to detect anomalous activities and trace malicious actions.\n- Google Cloud Logging: Disabling cloud logging removes visibility into resource activity, preventing monitoring of service access or configuration changes.\n- SaaS Applications: Stopping logging removes visibility into user activities, such as email access or file downloads, enabling undetected malicious behavior.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "AWS:CloudTrail", + "channel": "Stop logging for an existing CloudTrail" + }, + { + "name": "AWS:CloudTrail", + "channel": "Removal of CloudTrail trail" + }, + { + "name": "azure:activity", + "channel": "az monitor diagnostic-settings delete" + }, + { + "name": "saas:audit", + "channel": "Log export integration removed or disabled" + }, + { + "name": "AWS:CloudTrail", + "channel": "StopLogging, DeleteTrail, or DisableSecurityService" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:39.702000+00:00\"}, \"root['description']\": {\"new_value\": \"This data component refers to monitoring actions that deactivate or stop a cloud service in a cloud control plane. Examples include disabling essential logging services like AWS CloudTrail (`StopLogging` API call), Microsoft Azure Monitor Logs, or Google Cloud's Operations Suite (formerly Stackdriver). Disabling such services can hinder visibility into adversary activities within the cloud environment. Examples: \\n\\n- AWS CloudTrail StopLogging: This action stops logging of API activity for a particular trail, effectively reducing the monitoring and visibility of AWS resources and activities.\\n- Microsoft Azure Monitor Logs: Disabling these logs hinders the organization\\u2019s ability to detect anomalous activities and trace malicious actions.\\n- Google Cloud Logging: Disabling cloud logging removes visibility into resource activity, preventing monitoring of service access or configuration changes.\\n- SaaS Applications: Stopping logging removes visibility into user activities, such as email access or file downloads, enabling undetected malicious behavior.\", \"old_value\": \"This data component refers to monitoring actions that deactivate or stop a cloud service in a cloud control plane. Examples include disabling essential logging services like AWS CloudTrail (`StopLogging` API call), Microsoft Azure Monitor Logs, or Google Cloud's Operations Suite (formerly Stackdriver). Disabling such services can hinder visibility into adversary activities within the cloud environment. Examples: \\n\\n- AWS CloudTrail StopLogging: This action stops logging of API activity for a particular trail, effectively reducing the monitoring and visibility of AWS resources and activities.\\n- Microsoft Azure Monitor Logs: Disabling these logs hinders the organization\\u2019s ability to detect anomalous activities and trace malicious actions.\\n- Google Cloud Logging: Disabling cloud logging removes visibility into resource activity, preventing monitoring of service access or configuration changes.\\n- SaaS Applications: Stopping logging removes visibility into user activities, such as email access or file downloads, enabling undetected malicious behavior.\\n\\nThis data component can be collected through the following measures:\\n\\nEnable and Monitor Cloud Service Logging\\n\\n- Ensure logging is enabled for all cloud services, including administrative actions like StopLogging.\\n- Example: Use AWS Config to verify that CloudTrail is enabled and enforce logging as a compliance rule.\\n\\nAPI Monitoring\\n\\n- Use API monitoring tools to detect calls like StopLogging or equivalent service-stopping actions in other platforms.\\n- Example: Monitor AWS CloudWatch for specific API events such as StopLogging and flag unauthorized users.\\n\\nSIEM Integration\\n\\n- Collect logs and events from the cloud control plane into a centralized SIEM for real-time analysis and correlation.\\n- Example: Ingest AWS CloudTrail logs into Splunk or Azure Monitor logs into Sentinel.\\n\\nCloud Security Posture Management (CSPM) Tools\\n\\n- Leverage CSPM tools like Prisma Cloud, Dome9, or AWS Security Hub to detect misconfigurations or suspicious activity, such as disabled logging.\\n- Example: Set alerts for changes to logging configurations in CSPM dashboards.\\n\\nConfigure Alerts in Cloud Platforms\\n\\n- Create native alerts in cloud platforms to detect service stoppages.\\n- Example: Configure an AWS CloudWatch alarm to trigger when StopLogging is invoked.\", \"diff\": \"--- \\n+++ \\n@@ -4,30 +4,3 @@\\n - Microsoft Azure Monitor Logs: Disabling these logs hinders the organization\\u2019s ability to detect anomalous activities and trace malicious actions.\\n - Google Cloud Logging: Disabling cloud logging removes visibility into resource activity, preventing monitoring of service access or configuration changes.\\n - SaaS Applications: Stopping logging removes visibility into user activities, such as email access or file downloads, enabling undetected malicious behavior.\\n-\\n-This data component can be collected through the following measures:\\n-\\n-Enable and Monitor Cloud Service Logging\\n-\\n-- Ensure logging is enabled for all cloud services, including administrative actions like StopLogging.\\n-- Example: Use AWS Config to verify that CloudTrail is enabled and enforce logging as a compliance rule.\\n-\\n-API Monitoring\\n-\\n-- Use API monitoring tools to detect calls like StopLogging or equivalent service-stopping actions in other platforms.\\n-- Example: Monitor AWS CloudWatch for specific API events such as StopLogging and flag unauthorized users.\\n-\\n-SIEM Integration\\n-\\n-- Collect logs and events from the cloud control plane into a centralized SIEM for real-time analysis and correlation.\\n-- Example: Ingest AWS CloudTrail logs into Splunk or Azure Monitor logs into Sentinel.\\n-\\n-Cloud Security Posture Management (CSPM) Tools\\n-\\n-- Leverage CSPM tools like Prisma Cloud, Dome9, or AWS Security Hub to detect misconfigurations or suspicious activity, such as disabled logging.\\n-- Example: Set alerts for changes to logging configurations in CSPM dashboards.\\n-\\n-Configure Alerts in Cloud Platforms\\n-\\n-- Create native alerts in cloud platforms to detect service stoppages.\\n-- Example: Configure an AWS CloudWatch alarm to trigger when StopLogging is invoked.\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1This data component refers to monitoring actions that deactit1This data component refers to monitoring actions that deacti
>vate or stop a cloud service in a cloud control plane. Examp>vate or stop a cloud service in a cloud control plane. Examp
>les include disabling essential logging services like AWS Cl>les include disabling essential logging services like AWS Cl
>oudTrail (`StopLogging` API call), Microsoft Azure Monitor L>oudTrail (`StopLogging` API call), Microsoft Azure Monitor L
>ogs, or Google Cloud's Operations Suite (formerly Stackdrive>ogs, or Google Cloud's Operations Suite (formerly Stackdrive
>r). Disabling such services can hinder visibility into adver>r). Disabling such services can hinder visibility into adver
>sary activities within the cloud environment. Examples:   - >sary activities within the cloud environment. Examples:   - 
>AWS CloudTrail StopLogging: This action stops logging of API>AWS CloudTrail StopLogging: This action stops logging of API
> activity for a particular trail, effectively reducing the m> activity for a particular trail, effectively reducing the m
>onitoring and visibility of AWS resources and activities. - >onitoring and visibility of AWS resources and activities. - 
>Microsoft Azure Monitor Logs: Disabling these logs hinders t>Microsoft Azure Monitor Logs: Disabling these logs hinders t
>he organization\u2019s ability to detect anomalous activities and>he organization\u2019s ability to detect anomalous activities and
> trace malicious actions. - Google Cloud Logging: Disabling > trace malicious actions. - Google Cloud Logging: Disabling 
>cloud logging removes visibility into resource activity, pre>cloud logging removes visibility into resource activity, pre
>venting monitoring of service access or configuration change>venting monitoring of service access or configuration change
>s. - SaaS Applications: Stopping logging removes visibility >s. - SaaS Applications: Stopping logging removes visibility 
>into user activities, such as email access or file downloads>into user activities, such as email access or file downloads
>, enabling undetected malicious behavior.  This data compone>, enabling undetected malicious behavior.
>nt can be collected through the following measures:  Enable  
>and Monitor Cloud Service Logging  - Ensure logging is enabl 
>ed for all cloud services, including administrative actions  
>like StopLogging. - Example: Use AWS Config to verify that C 
>loudTrail is enabled and enforce logging as a compliance rul 
>e.  API Monitoring  - Use API monitoring tools to detect cal 
>ls like StopLogging or equivalent service-stopping actions i 
>n other platforms. - Example: Monitor AWS CloudWatch for spe 
>cific API events such as StopLogging and flag unauthorized u 
>sers.  SIEM Integration  - Collect logs and events from the  
>cloud control plane into a centralized SIEM for real-time an 
>alysis and correlation. - Example: Ingest AWS CloudTrail log 
>s into Splunk or Azure Monitor logs into Sentinel.  Cloud Se 
>curity Posture Management (CSPM) Tools  - Leverage CSPM tool 
>s like Prisma Cloud, Dome9, or AWS Security Hub to detect mi 
>sconfigurations or suspicious activity, such as disabled log 
>ging. - Example: Set alerts for changes to logging configura 
>tions in CSPM dashboards.  Configure Alerts in Cloud Platfor 
>ms  - Create native alerts in cloud platforms to detect serv 
>ice stoppages. - Example: Configure an AWS CloudWatch alarm  
>to trigger when StopLogging is invoked. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--8c826308-2760-492f-9e36-4f0f7e23bcac", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.274000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0083", + "external_id": "DC0083" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Cloud Service Enumeration", + "description": "Cloud service enumeration involves listing or querying available cloud services in a cloud control plane. This activity is often performed to identify resources such as virtual machines, storage buckets, compute clusters, or other services within a cloud environment. Examples include API calls like `AWS ECS ListServices`, `Azure ListAllResources`, or `Google Cloud ListInstances`. Examples: \n\nAWS Cloud Service Enumeration: The adversary gathers details about existing ECS services to identify opportunities for privilege escalation or exfiltration.\n- Azure Resource Enumeration: The adversary collects information about virtual machines, resource groups, and other Azure assets for reconnaissance purposes.\n- Google Cloud Resource Enumeration: The attacker seeks to map the environment and find misconfigured or underutilized resources for exploitation.\n- Office 365 Service Enumeration: The attacker may look for data repositories or collaboration tools to exfiltrate sensitive information.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "AWS:CloudTrail", + "channel": "GetSecretValue" + }, + { + "name": "gcp:secrets", + "channel": "accessSecretVersion" + }, + { + "name": "azure:ad", + "channel": "SecretGet" + }, + { + "name": "AWS:CloudTrail", + "channel": "ssm:ListInventoryEntries" + }, + { + "name": "AWS:CloudTrail", + "channel": "DescribeInstances, DescribeServices, ListFunctions: High frequency enumeration calls or unusual user agents performing discovery" + }, + { + "name": "azure:audit", + "channel": "ListApplications, ListServicePrincipals: Large-scale queries against identity or application objects" + }, + { + "name": "m365:unified", + "channel": "Get-MsolServicePrincipal, ListAppRoles: Service discovery operations executed by accounts not normally performing administrative tasks" + }, + { + "name": "saas:adminapi", + "channel": "ListIntegrations, ListServices: Repeated service discovery requests from accounts without administrative responsibilities" + }, + { + "name": "AWS:CloudTrail", + "channel": "GetInstanceIdentityDocument or IMDSv2 token requests" + }, + { + "name": "AWS:CloudTrail", + "channel": "DescribeUsers / ListUsers / GetUser" + }, + { + "name": "azure:signinlogs", + "channel": "Graph API Query" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:38.498000+00:00\"}, \"root['description']\": {\"new_value\": \"Cloud service enumeration involves listing or querying available cloud services in a cloud control plane. This activity is often performed to identify resources such as virtual machines, storage buckets, compute clusters, or other services within a cloud environment. Examples include API calls like `AWS ECS ListServices`, `Azure ListAllResources`, or `Google Cloud ListInstances`. Examples: \\n\\nAWS Cloud Service Enumeration: The adversary gathers details about existing ECS services to identify opportunities for privilege escalation or exfiltration.\\n- Azure Resource Enumeration: The adversary collects information about virtual machines, resource groups, and other Azure assets for reconnaissance purposes.\\n- Google Cloud Resource Enumeration: The attacker seeks to map the environment and find misconfigured or underutilized resources for exploitation.\\n- Office 365 Service Enumeration: The attacker may look for data repositories or collaboration tools to exfiltrate sensitive information.\", \"old_value\": \"Cloud service enumeration involves listing or querying available cloud services in a cloud control plane. This activity is often performed to identify resources such as virtual machines, storage buckets, compute clusters, or other services within a cloud environment. Examples include API calls like `AWS ECS ListServices`, `Azure ListAllResources`, or `Google Cloud ListInstances`. Examples: \\n\\nAWS Cloud Service Enumeration: The adversary gathers details about existing ECS services to identify opportunities for privilege escalation or exfiltration.\\n- Azure Resource Enumeration: The adversary collects information about virtual machines, resource groups, and other Azure assets for reconnaissance purposes.\\n- Google Cloud Resource Enumeration: The attacker seeks to map the environment and find misconfigured or underutilized resources for exploitation.\\n- Office 365 Service Enumeration: The attacker may look for data repositories or collaboration tools to exfiltrate sensitive information.\\n\\nThis data component can be collected through the following measures: \\n\\nEnable Cloud Activity Logging\\n\\n- Ensure cloud service logs are enabled for API calls and resource usage.\\n- Example: Enable AWS CloudTrail, Azure Monitor, or Google Cloud Logging to track resource queries.\\n\\nCentralize Logs in a SIEM\\n\\n- Aggregate logs from cloud control planes into a centralized SIEM (e.g., Splunk, Azure Sentinel).\\n- Example: Collect AWS CloudTrail logs and set up alerts for API calls related to service enumeration.\\n\\nUse Native Cloud Security Tools\\n\\n- Leverage cloud-native security solutions like AWS GuardDuty, Azure Defender, or Google Security Command Center.\\n- Example: Use GuardDuty to detect anomalous API activity, such as ListServices being executed by an unknown user.\\n\\nImplement Network Flow Logging\\n\\n- Monitor and analyze VPC flow logs to identify lateral movement or enumeration activity.\\n- Example: Inspect flow logs for unexpected traffic between compute instances and the cloud control plane.\\n\\nAPI Access Monitoring\\n\\n- Monitor API keys and tokens used for enumeration to identify misuse or compromise.\\n- Example: Use AWS Secrets Manager or Azure Key Vault to manage and rotate keys securely.\", \"diff\": \"--- \\n+++ \\n@@ -4,30 +4,3 @@\\n - Azure Resource Enumeration: The adversary collects information about virtual machines, resource groups, and other Azure assets for reconnaissance purposes.\\n - Google Cloud Resource Enumeration: The attacker seeks to map the environment and find misconfigured or underutilized resources for exploitation.\\n - Office 365 Service Enumeration: The attacker may look for data repositories or collaboration tools to exfiltrate sensitive information.\\n-\\n-This data component can be collected through the following measures: \\n-\\n-Enable Cloud Activity Logging\\n-\\n-- Ensure cloud service logs are enabled for API calls and resource usage.\\n-- Example: Enable AWS CloudTrail, Azure Monitor, or Google Cloud Logging to track resource queries.\\n-\\n-Centralize Logs in a SIEM\\n-\\n-- Aggregate logs from cloud control planes into a centralized SIEM (e.g., Splunk, Azure Sentinel).\\n-- Example: Collect AWS CloudTrail logs and set up alerts for API calls related to service enumeration.\\n-\\n-Use Native Cloud Security Tools\\n-\\n-- Leverage cloud-native security solutions like AWS GuardDuty, Azure Defender, or Google Security Command Center.\\n-- Example: Use GuardDuty to detect anomalous API activity, such as ListServices being executed by an unknown user.\\n-\\n-Implement Network Flow Logging\\n-\\n-- Monitor and analyze VPC flow logs to identify lateral movement or enumeration activity.\\n-- Example: Inspect flow logs for unexpected traffic between compute instances and the cloud control plane.\\n-\\n-API Access Monitoring\\n-\\n-- Monitor API keys and tokens used for enumeration to identify misuse or compromise.\\n-- Example: Use AWS Secrets Manager or Azure Key Vault to manage and rotate keys securely.\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Cloud service enumeration involves listing or querying availt1Cloud service enumeration involves listing or querying avail
>able cloud services in a cloud control plane. This activity >able cloud services in a cloud control plane. This activity 
>is often performed to identify resources such as virtual mac>is often performed to identify resources such as virtual mac
>hines, storage buckets, compute clusters, or other services >hines, storage buckets, compute clusters, or other services 
>within a cloud environment. Examples include API calls like >within a cloud environment. Examples include API calls like 
>`AWS ECS ListServices`, `Azure ListAllResources`, or `Google>`AWS ECS ListServices`, `Azure ListAllResources`, or `Google
> Cloud ListInstances`. Examples:   AWS Cloud Service Enumera> Cloud ListInstances`. Examples:   AWS Cloud Service Enumera
>tion: The adversary gathers details about existing ECS servi>tion: The adversary gathers details about existing ECS servi
>ces to identify opportunities for privilege escalation or ex>ces to identify opportunities for privilege escalation or ex
>filtration. - Azure Resource Enumeration: The adversary coll>filtration. - Azure Resource Enumeration: The adversary coll
>ects information about virtual machines, resource groups, an>ects information about virtual machines, resource groups, an
>d other Azure assets for reconnaissance purposes. - Google C>d other Azure assets for reconnaissance purposes. - Google C
>loud Resource Enumeration: The attacker seeks to map the env>loud Resource Enumeration: The attacker seeks to map the env
>ironment and find misconfigured or underutilized resources f>ironment and find misconfigured or underutilized resources f
>or exploitation. - Office 365 Service Enumeration: The attac>or exploitation. - Office 365 Service Enumeration: The attac
>ker may look for data repositories or collaboration tools to>ker may look for data repositories or collaboration tools to
> exfiltrate sensitive information.  This data component can > exfiltrate sensitive information.
>be collected through the following measures:   Enable Cloud  
>Activity Logging  - Ensure cloud service logs are enabled fo 
>r API calls and resource usage. - Example: Enable AWS CloudT 
>rail, Azure Monitor, or Google Cloud Logging to track resour 
>ce queries.  Centralize Logs in a SIEM  - Aggregate logs fro 
>m cloud control planes into a centralized SIEM (e.g., Splunk 
>, Azure Sentinel). - Example: Collect AWS CloudTrail logs an 
>d set up alerts for API calls related to service enumeration 
>.  Use Native Cloud Security Tools  - Leverage cloud-native  
>security solutions like AWS GuardDuty, Azure Defender, or Go 
>ogle Security Command Center. - Example: Use GuardDuty to de 
>tect anomalous API activity, such as ListServices being exec 
>uted by an unknown user.  Implement Network Flow Logging  -  
>Monitor and analyze VPC flow logs to identify lateral moveme 
>nt or enumeration activity. - Example: Inspect flow logs for 
> unexpected traffic between compute instances and the cloud  
>control plane.  API Access Monitoring  - Monitor API keys an 
>d tokens used for enumeration to identify misuse or compromi 
>se. - Example: Use AWS Secrets Manager or Azure Key Vault to 
> manage and rotate keys securely. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--b33d36e3-d7ea-4895-8eed-19a08a8f7c4f", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.274000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0070", + "external_id": "DC0070" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Cloud Service Metadata", + "description": "Cloud service metadata refers to the contextual and descriptive information about cloud services, including their name, type, purpose, configuration, and activity around them. This metadata is essential for understanding the roles and functions of cloud services, their operational status, and their potential misuse. Examples: \n\n- Azure Service Metadata: Metadata describing a resource in Azure, such as an Azure Storage Account or a Virtual Machine.\n- AWS Cloud Service Metadata: Metadata for an AWS EC2 instance collected using the `DescribeInstances` API call.\n- Google Cloud Service Metadata: Metadata for a Google Compute Engine instance collected using `gcloud compute instances describe`.\n- Office 365 Metadata: Metadata about an Office 365 SharePoint site.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "AWS:CloudTrail", + "channel": "GetInstanceIdentityDocument" + }, + { + "name": "AWS:CloudTrail", + "channel": "rds:ExecuteStatement: Large data access via RDS or Aurora with unknown session context" + }, + { + "name": "saas:github", + "channel": "repo.download, repo.clone, oauth.authorize, repo.getContent" + }, + { + "name": "AWS:CloudWatch", + "channel": "unexpected IAM user or role assuming privileges for instance/snapshot operations" + }, + { + "name": "AWS:CloudTrail", + "channel": "GetSecretValue" + }, + { + "name": "AWS:CloudTrail", + "channel": "InvokeFunction" + }, + { + "name": "m365:sharepoint", + "channel": "Multiple file download operations on a site by a privileged account in a short time window" + }, + { + "name": "saas:github", + "channel": "CI/CD secret accessed or exported" + }, + { + "name": "m365:exchange", + "channel": "Cmdlet - New-InboxRule" + }, + { + "name": "m365:unified", + "channel": "New-InboxRule, Set-InboxRule" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:34.276000+00:00\"}, \"root['description']\": {\"new_value\": \"Cloud service metadata refers to the contextual and descriptive information about cloud services, including their name, type, purpose, configuration, and activity around them. This metadata is essential for understanding the roles and functions of cloud services, their operational status, and their potential misuse. Examples: \\n\\n- Azure Service Metadata: Metadata describing a resource in Azure, such as an Azure Storage Account or a Virtual Machine.\\n- AWS Cloud Service Metadata: Metadata for an AWS EC2 instance collected using the `DescribeInstances` API call.\\n- Google Cloud Service Metadata: Metadata for a Google Compute Engine instance collected using `gcloud compute instances describe`.\\n- Office 365 Metadata: Metadata about an Office 365 SharePoint site.\", \"old_value\": \"Cloud service metadata refers to the contextual and descriptive information about cloud services, including their name, type, purpose, configuration, and activity around them. This metadata is essential for understanding the roles and functions of cloud services, their operational status, and their potential misuse. Examples: \\n\\n- Azure Service Metadata: Metadata describing a resource in Azure, such as an Azure Storage Account or a Virtual Machine.\\n- AWS Cloud Service Metadata: Metadata for an AWS EC2 instance collected using the `DescribeInstances` API call.\\n- Google Cloud Service Metadata: Metadata for a Google Compute Engine instance collected using `gcloud compute instances describe`.\\n- Office 365 Metadata: Metadata about an Office 365 SharePoint site.\\n\\nThis data component can be collected through the following measures:\\n\\nEnable Cloud Metadata APIs\\n\\n- Leverage APIs provided by cloud providers to query metadata about services.\\n - AWS: Use AWS CLI or SDKs for `DescribeInstances`, `DescribeBuckets`, etc.\\n - Azure: Use `az resource list` or SDKs.\\n - Google Cloud: Use `gcloud compute instances describe` or related commands.\\n - Office 365: Use Microsoft Graph API.\\n\\nCentralize Metadata in a Security Platform\\n\\n- Aggregate metadata from multiple clouds into a SIEM or CSPM (Cloud Security Posture Management) tool.\\n- Example: Integrate AWS CloudTrail with Splunk or Azure Monitor with Sentinel.\\n\\nEnable Continuous Monitoring\\n\\n- Set up automated jobs or workflows to regularly query and update metadata.\\n- Example: Use AWS Config to track resource configurations and changes over time.\\n\\nConfigure Access and Logging\\n\\n- Enable logging for API queries to ensure access and usage of metadata are monitored.\\n- Example: Use AWS CloudTrail to log API activity for metadata queries.\\n\\nUse Cloud Security Tools\\n\\n- Employ CSPM tools like Prisma Cloud, Wiz, or Dome9 to gather metadata and identify misconfigurations.\\n- Example: Prisma Cloud provides consolidated views of metadata for resources across AWS, Azure, and GCP.\", \"diff\": \"--- \\n+++ \\n@@ -4,33 +4,3 @@\\n - AWS Cloud Service Metadata: Metadata for an AWS EC2 instance collected using the `DescribeInstances` API call.\\n - Google Cloud Service Metadata: Metadata for a Google Compute Engine instance collected using `gcloud compute instances describe`.\\n - Office 365 Metadata: Metadata about an Office 365 SharePoint site.\\n-\\n-This data component can be collected through the following measures:\\n-\\n-Enable Cloud Metadata APIs\\n-\\n-- Leverage APIs provided by cloud providers to query metadata about services.\\n- - AWS: Use AWS CLI or SDKs for `DescribeInstances`, `DescribeBuckets`, etc.\\n- - Azure: Use `az resource list` or SDKs.\\n- - Google Cloud: Use `gcloud compute instances describe` or related commands.\\n- - Office 365: Use Microsoft Graph API.\\n-\\n-Centralize Metadata in a Security Platform\\n-\\n-- Aggregate metadata from multiple clouds into a SIEM or CSPM (Cloud Security Posture Management) tool.\\n-- Example: Integrate AWS CloudTrail with Splunk or Azure Monitor with Sentinel.\\n-\\n-Enable Continuous Monitoring\\n-\\n-- Set up automated jobs or workflows to regularly query and update metadata.\\n-- Example: Use AWS Config to track resource configurations and changes over time.\\n-\\n-Configure Access and Logging\\n-\\n-- Enable logging for API queries to ensure access and usage of metadata are monitored.\\n-- Example: Use AWS CloudTrail to log API activity for metadata queries.\\n-\\n-Use Cloud Security Tools\\n-\\n-- Employ CSPM tools like Prisma Cloud, Wiz, or Dome9 to gather metadata and identify misconfigurations.\\n-- Example: Prisma Cloud provides consolidated views of metadata for resources across AWS, Azure, and GCP.\"}, \"root['x_mitre_log_sources'][0]['name']\": {\"new_value\": \"AWS:CloudTrail\", \"old_value\": \"CloudTrail:GetInstanceIdentityDocument\"}, \"root['x_mitre_log_sources'][4]['name']\": {\"new_value\": \"AWS:CloudTrail\", \"old_value\": \"CloudTrail:GetSecretValue\"}, \"root['x_mitre_log_sources'][4]['channel']\": {\"new_value\": \"GetSecretValue\", \"old_value\": \"API call to retrieve secret or access key\"}, \"root['x_mitre_log_sources'][5]['name']\": {\"new_value\": \"AWS:CloudTrail\", \"old_value\": \"CloudTrail:InvokeFunction\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Cloud service metadata refers to the contextual and descriptt1Cloud service metadata refers to the contextual and descript
>ive information about cloud services, including their name, >ive information about cloud services, including their name, 
>type, purpose, configuration, and activity around them. This>type, purpose, configuration, and activity around them. This
> metadata is essential for understanding the roles and funct> metadata is essential for understanding the roles and funct
>ions of cloud services, their operational status, and their >ions of cloud services, their operational status, and their 
>potential misuse. Examples:   - Azure Service Metadata: Meta>potential misuse. Examples:   - Azure Service Metadata: Meta
>data describing a resource in Azure, such as an Azure Storag>data describing a resource in Azure, such as an Azure Storag
>e Account or a Virtual Machine. - AWS Cloud Service Metadata>e Account or a Virtual Machine. - AWS Cloud Service Metadata
>: Metadata for an AWS EC2 instance collected using the `Desc>: Metadata for an AWS EC2 instance collected using the `Desc
>ribeInstances` API call. - Google Cloud Service Metadata: Me>ribeInstances` API call. - Google Cloud Service Metadata: Me
>tadata for a Google Compute Engine instance collected using >tadata for a Google Compute Engine instance collected using 
>`gcloud compute instances describe`. - Office 365 Metadata: >`gcloud compute instances describe`. - Office 365 Metadata: 
>Metadata about an Office 365 SharePoint site.  This data com>Metadata about an Office 365 SharePoint site.
>ponent can be collected through the following measures:  Ena 
>ble Cloud Metadata APIs  - Leverage APIs provided by cloud p 
>roviders to query metadata about services.     - AWS: Use AW 
>S CLI or SDKs for `DescribeInstances`, `DescribeBuckets`, et 
>c.     - Azure: Use `az resource list` or SDKs.     - Google 
> Cloud: Use `gcloud compute instances describe` or related c 
>ommands.     - Office 365: Use Microsoft Graph API.  Central 
>ize Metadata in a Security Platform  - Aggregate metadata fr 
>om multiple clouds into a SIEM or CSPM (Cloud Security Postu 
>re Management) tool. - Example: Integrate AWS CloudTrail wit 
>h Splunk or Azure Monitor with Sentinel.  Enable Continuous  
>Monitoring  - Set up automated jobs or workflows to regularl 
>y query and update metadata. - Example: Use AWS Config to tr 
>ack resource configurations and changes over time.  Configur 
>e Access and Logging  - Enable logging for API queries to en 
>sure access and usage of metadata are monitored. - Example:  
>Use AWS CloudTrail to log API activity for metadata queries. 
>  Use Cloud Security Tools  - Employ CSPM tools like Prisma  
>Cloud, Wiz, or Dome9 to gather metadata and identify misconf 
>igurations. - Example: Prisma Cloud provides consolidated vi 
>ews of metadata for resources across AWS, Azure, and GCP. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--e52d89f9-1710-4708-88a5-cbef77c4cd5e", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.274000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0069", + "external_id": "DC0069" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Cloud Service Modification", + "description": "Cloud service modification refers to changes made to the configuration, settings, or data of a cloud service. These modifications can include administrative changes such as enabling or disabling features, altering permissions, or deleting critical components. Monitoring these changes is critical to detect potential misconfigurations or malicious activity. Examples: \n\n- AWS Cloud Service Modifications: A user disables AWS CloudTrail logging (StopLogging) or deletes a CloudWatch configuration rule (DeleteConfigRule).\n- Azure Cloud Service Modifications: Changes to Azure Role-Based Access Control (RBAC) roles, such as adding a new Contributor role to a sensitive resource.\n- Google Cloud Service Modifications: Deletion of a Google Cloud Storage bucket or disabling a Google Cloud Function.\n- Office 365 Cloud Service Modifications: Altering mailbox permissions or disabling auditing in Microsoft 365.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "AWS:CloudTrail", + "channel": "CreateFunction" + }, + { + "name": "m365:unified", + "channel": "Creation of Power Automate flow triggered by OneDrive or Exchange event" + }, + { + "name": "AWS:CloudTrail", + "channel": "PutUserPolicy, PutGroupPolicy, PutRolePolicy, CreatePolicyVersion" + }, + { + "name": "AWS:CloudTrail", + "channel": "Condition block updated in IAM policy (e.g., aws:SourceIp, aws:RequestedRegion)" + }, + { + "name": "azure:activity", + "channel": "operationName: Write, Access Review, RoleAssignment" + }, + { + "name": "azure:policy", + "channel": "UpdatePolicy" + }, + { + "name": "AWS:CloudTrail", + "channel": "UpdateAccountPasswordPolicy" + }, + { + "name": "AWS:CloudTrail", + "channel": "PutIdentityPolicy" + }, + { + "name": "AWS:CloudTrail", + "channel": "LeaveOrganization: API calls severing accounts from AWS Organizations" + }, + { + "name": "AWS:CloudTrail", + "channel": "CreateAccount: API calls creating new accounts in AWS Organizations" + }, + { + "name": "azure:audit", + "channel": "Tenant subscription transfers or new management group creation" + }, + { + "name": "AWS:CloudTrail", + "channel": "UpdateIdentityPolicy or DisableMFA" + }, + { + "name": "m365:unified", + "channel": "SendMessage" + }, + { + "name": "gcp:config", + "channel": "UpdateSink request modifying log export destinations" + }, + { + "name": "azure:policy", + "channel": "DisableAuditLogs or ConditionalAccess logging changes" + }, + { + "name": "AWS:CloudTrail", + "channel": "UpdateFederationSettings or RegisterHybridConnector" + }, + { + "name": "AWS:CloudTrail", + "channel": "CreateTrafficMirrorSession / ModifyTrafficMirrorTarget" + }, + { + "name": "azure:activity", + "channel": "Microsoft.Network/networkWatchers/flowLogSettings/write" + }, + { + "name": "gcp:audit", + "channel": "compute.packetMirroring.insert" + }, + { + "name": "AWS:CloudTrail", + "channel": "CreateFunction / UpdateFunctionConfiguration: Function creation, role assignment, or configuration change events" + }, + { + "name": "m365:unified", + "channel": "AddFlow / UpdateFlow: New automation or workflow creation events" + }, + { + "name": "saas:appsscript", + "channel": "Create / Update: Deployment of scripts with event-driven triggers" + }, + { + "name": "saas:slack", + "channel": "Exported file or accessed admin API" + }, + { + "name": "AWS:CloudTrail", + "channel": "RequestServiceQuotaIncrease" + }, + { + "name": "azure:activity", + "channel": "MICROSOFT.AUTHORIZATION/POLICIES/WRITE" + }, + { + "name": "gcp:audit", + "channel": "projects.updateQuota or orgPolicies.updatePolicy" + }, + { + "name": "AWS:CloudTrail", + "channel": "Delete* / Stop*: DeleteAlarms, StopLogging, or DisableMonitoring API calls" + }, + { + "name": "AWS:CloudTrail", + "channel": "Use of temporary credentials issued from IMDS access" + }, + { + "name": "saas:github", + "channel": "Workflow triggered via pull_request_target from forked repo" + }, + { + "name": "azure:audit", + "channel": "Consent to application: OAuth application consent granted to service principal" + }, + { + "name": "saas:integration", + "channel": "New or modified third-party application integrations with elevated permissions" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:35.943000+00:00\"}, \"root['description']\": {\"new_value\": \"Cloud service modification refers to changes made to the configuration, settings, or data of a cloud service. These modifications can include administrative changes such as enabling or disabling features, altering permissions, or deleting critical components. Monitoring these changes is critical to detect potential misconfigurations or malicious activity. Examples: \\n\\n- AWS Cloud Service Modifications: A user disables AWS CloudTrail logging (StopLogging) or deletes a CloudWatch configuration rule (DeleteConfigRule).\\n- Azure Cloud Service Modifications: Changes to Azure Role-Based Access Control (RBAC) roles, such as adding a new Contributor role to a sensitive resource.\\n- Google Cloud Service Modifications: Deletion of a Google Cloud Storage bucket or disabling a Google Cloud Function.\\n- Office 365 Cloud Service Modifications: Altering mailbox permissions or disabling auditing in Microsoft 365.\", \"old_value\": \"Cloud service modification refers to changes made to the configuration, settings, or data of a cloud service. These modifications can include administrative changes such as enabling or disabling features, altering permissions, or deleting critical components. Monitoring these changes is critical to detect potential misconfigurations or malicious activity. Examples: \\n\\n- AWS Cloud Service Modifications: A user disables AWS CloudTrail logging (StopLogging) or deletes a CloudWatch configuration rule (DeleteConfigRule).\\n- Azure Cloud Service Modifications: Changes to Azure Role-Based Access Control (RBAC) roles, such as adding a new Contributor role to a sensitive resource.\\n- Google Cloud Service Modifications: Deletion of a Google Cloud Storage bucket or disabling a Google Cloud Function.\\n- Office 365 Cloud Service Modifications: Altering mailbox permissions or disabling auditing in Microsoft 365.\\n\\nThis data component can be collected through the following measures:\\n\\nEnable Cloud Audit Logging\\n\\n- AWS: Enable AWS CloudTrail for logging management events such as StopLogging or DeleteTrail.\\n- Azure: Use Azure Activity Logs to monitor resource changes and access actions.\\n- Google Cloud: Enable Google Cloud Audit Logs to track API calls, resource modifications, and policy changes.\\n- Office 365: Use Unified Audit Logs in Microsoft Purview to track administrative actions.\\n\\nCentralize Log Storage\\n\\n- Consolidate logs from all cloud providers into a SIEM or CSPM (Cloud Security Posture Management) tool.\\n- Example: Use Splunk or Elastic Stack to ingest and analyze logs from AWS, Azure, and Google Cloud.\\n\\nAutomate Alerts for Sensitive Changes\\n\\n- Configure alerts for high-risk actions, such as disabling logging or modifying IAM roles.\\n- AWS Example: Use AWS Config rules to detect and notify changes to critical services.\\n- Azure Example: Set up Azure Monitor alerts for write actions on sensitive resources.\\n\\nEnable Continuous Monitoring\\n\\n- Use tools like AWS Security Hub, Azure Defender, or Google Chronicle to continuously monitor cloud service modifications for anomalies.\", \"diff\": \"--- \\n+++ \\n@@ -4,27 +4,3 @@\\n - Azure Cloud Service Modifications: Changes to Azure Role-Based Access Control (RBAC) roles, such as adding a new Contributor role to a sensitive resource.\\n - Google Cloud Service Modifications: Deletion of a Google Cloud Storage bucket or disabling a Google Cloud Function.\\n - Office 365 Cloud Service Modifications: Altering mailbox permissions or disabling auditing in Microsoft 365.\\n-\\n-This data component can be collected through the following measures:\\n-\\n-Enable Cloud Audit Logging\\n-\\n-- AWS: Enable AWS CloudTrail for logging management events such as StopLogging or DeleteTrail.\\n-- Azure: Use Azure Activity Logs to monitor resource changes and access actions.\\n-- Google Cloud: Enable Google Cloud Audit Logs to track API calls, resource modifications, and policy changes.\\n-- Office 365: Use Unified Audit Logs in Microsoft Purview to track administrative actions.\\n-\\n-Centralize Log Storage\\n-\\n-- Consolidate logs from all cloud providers into a SIEM or CSPM (Cloud Security Posture Management) tool.\\n-- Example: Use Splunk or Elastic Stack to ingest and analyze logs from AWS, Azure, and Google Cloud.\\n-\\n-Automate Alerts for Sensitive Changes\\n-\\n-- Configure alerts for high-risk actions, such as disabling logging or modifying IAM roles.\\n-- AWS Example: Use AWS Config rules to detect and notify changes to critical services.\\n-- Azure Example: Set up Azure Monitor alerts for write actions on sensitive resources.\\n-\\n-Enable Continuous Monitoring\\n-\\n-- Use tools like AWS Security Hub, Azure Defender, or Google Chronicle to continuously monitor cloud service modifications for anomalies.\"}, \"root['x_mitre_log_sources'][9]['name']\": {\"new_value\": \"AWS:CloudTrail\", \"old_value\": \"CloudTrail:Organizations\"}, \"root['x_mitre_log_sources'][15]['name']\": {\"new_value\": \"AWS:CloudTrail\", \"old_value\": \"CloudTrail:UpdatePolicy\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Cloud service modification refers to changes made to the cont1Cloud service modification refers to changes made to the con
>figuration, settings, or data of a cloud service. These modi>figuration, settings, or data of a cloud service. These modi
>fications can include administrative changes such as enablin>fications can include administrative changes such as enablin
>g or disabling features, altering permissions, or deleting c>g or disabling features, altering permissions, or deleting c
>ritical components. Monitoring these changes is critical to >ritical components. Monitoring these changes is critical to 
>detect potential misconfigurations or malicious activity. Ex>detect potential misconfigurations or malicious activity. Ex
>amples:   - AWS Cloud Service Modifications: A user disables>amples:   - AWS Cloud Service Modifications: A user disables
> AWS CloudTrail logging (StopLogging) or deletes a CloudWatc> AWS CloudTrail logging (StopLogging) or deletes a CloudWatc
>h configuration rule (DeleteConfigRule). - Azure Cloud Servi>h configuration rule (DeleteConfigRule). - Azure Cloud Servi
>ce Modifications: Changes to Azure Role-Based Access Control>ce Modifications: Changes to Azure Role-Based Access Control
> (RBAC) roles, such as adding a new Contributor role to a se> (RBAC) roles, such as adding a new Contributor role to a se
>nsitive resource. - Google Cloud Service Modifications: Dele>nsitive resource. - Google Cloud Service Modifications: Dele
>tion of a Google Cloud Storage bucket or disabling a Google >tion of a Google Cloud Storage bucket or disabling a Google 
>Cloud Function. - Office 365 Cloud Service Modifications: Al>Cloud Function. - Office 365 Cloud Service Modifications: Al
>tering mailbox permissions or disabling auditing in Microsof>tering mailbox permissions or disabling auditing in Microsof
>t 365.  This data component can be collected through the fol>t 365.
>lowing measures:  Enable Cloud Audit Logging  - AWS: Enable  
>AWS CloudTrail for logging management events such as StopLog 
>ging or DeleteTrail. - Azure: Use Azure Activity Logs to mon 
>itor resource changes and access actions. - Google Cloud: En 
>able Google Cloud Audit Logs to track API calls, resource mo 
>difications, and policy changes. - Office 365: Use Unified A 
>udit Logs in Microsoft Purview to track administrative actio 
>ns.  Centralize Log Storage  - Consolidate logs from all clo 
>ud providers into a SIEM or CSPM (Cloud Security Posture Man 
>agement) tool. - Example: Use Splunk or Elastic Stack to ing 
>est and analyze logs from AWS, Azure, and Google Cloud.  Aut 
>omate Alerts for Sensitive Changes  - Configure alerts for h 
>igh-risk actions, such as disabling logging or modifying IAM 
> roles. - AWS Example: Use AWS Config rules to detect and no 
>tify changes to critical services. - Azure Example: Set up A 
>zure Monitor alerts for write actions on sensitive resources 
>.  Enable Continuous Monitoring  - Use tools like AWS Securi 
>ty Hub, Azure Defender, or Google Chronicle to continuously  
>monitor cloud service modifications for anomalies. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--58ef998c-f3bf-4985-b487-b1005f5c05d1", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.272000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0025", + "external_id": "DC0025" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Cloud Storage Access", + "description": "Cloud storage access refers to the retrieval or interaction with data stored in cloud infrastructure. This data component includes activities such as reading, downloading, or accessing files and objects within cloud storage systems. Common examples include API calls like GetObject in AWS S3, which retrieves objects from cloud buckets. Examples: \n\n- AWS S3 Access: An adversary uses the `GetObject` API to retrieve sensitive data from an AWS S3 bucket.\n- Azure Blob Storage Access: A user accesses a blob in Azure Storage using `Get Blob` or `Get Blob Properties`.\n- Google Cloud Storage Access: An adversary uses `storage.objects.get` to download objects from - OpenStack Swift Storage Access: A user retrieves an object from OpenStack Swift using the `GET` method.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "AWS:CloudTrail", + "channel": "GetObject, CopyObject" + }, + { + "name": "AWS:CloudTrail", + "channel": "PutObject: S3 writes with .sql/.csv extension by same identity or within 5 min of DB access" + }, + { + "name": "m365:unified", + "channel": "Accessed SharePoint files or pages" + }, + { + "name": "m365:unified", + "channel": "FileAccessed, FileDownloaded, ConsentGranted" + }, + { + "name": "gcp:workspaceaudit", + "channel": "download, authorization_grant" + }, + { + "name": "m365:sharepoint", + "channel": "AnonymousLinkCreated, FileDownloaded" + }, + { + "name": "m365:unified", + "channel": "App-only or delegated access patterns where client_id != known enterprise apps" + }, + { + "name": "saas:github", + "channel": "Artifact generated includes base64/encoded exfil payload or URL" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:36.111000+00:00\"}, \"root['description']\": {\"new_value\": \"Cloud storage access refers to the retrieval or interaction with data stored in cloud infrastructure. This data component includes activities such as reading, downloading, or accessing files and objects within cloud storage systems. Common examples include API calls like GetObject in AWS S3, which retrieves objects from cloud buckets. Examples: \\n\\n- AWS S3 Access: An adversary uses the `GetObject` API to retrieve sensitive data from an AWS S3 bucket.\\n- Azure Blob Storage Access: A user accesses a blob in Azure Storage using `Get Blob` or `Get Blob Properties`.\\n- Google Cloud Storage Access: An adversary uses `storage.objects.get` to download objects from - OpenStack Swift Storage Access: A user retrieves an object from OpenStack Swift using the `GET` method.\", \"old_value\": \"Cloud storage access refers to the retrieval or interaction with data stored in cloud infrastructure. This data component includes activities such as reading, downloading, or accessing files and objects within cloud storage systems. Common examples include API calls like GetObject in AWS S3, which retrieves objects from cloud buckets. Examples: \\n\\n- AWS S3 Access: An adversary uses the `GetObject` API to retrieve sensitive data from an AWS S3 bucket.\\n- Azure Blob Storage Access: A user accesses a blob in Azure Storage using `Get Blob` or `Get Blob Properties`.\\n- Google Cloud Storage Access: An adversary uses `storage.objects.get` to download objects from - OpenStack Swift Storage Access: A user retrieves an object from OpenStack Swift using the `GET` method.\\n\\nThis data component can be collected through the following measures:\\n\\nEnable Logging for Cloud Storage Services\\n\\n- AWS S3: Enable Server Access Logging to capture API calls like `GetObject` and store them in a designated S3 bucket.\\n- Azure Storage: Enable Azure Storage Logging to capture operations like `GetBlob` and log metadata.\\n- Google Cloud Storage: Enable Data Access audit logs for `storage.objects.get` API calls.\\n- OpenStack Swift: Configure middleware for object logging to capture GET requests.\\n\\nCentralize and Aggregate Logs\\n\\n- Use a centralized logging solution (e.g., Splunk, ELK, or a cloud-native SIEM) to ingest and analyze logs from different cloud providers.\\n - AWS Example: Use AWS CloudTrail to collect API activity logs and forward them to your SIEM.\\n - Azure Example: Use Azure Monitor and Log Analytics to analyze storage access logs.\\n\\nCorrelate with IAM Logs\\n\\n- Combine storage access logs with IAM activity logs to correlate user actions with specific permissions and identities.\", \"diff\": \"--- \\n+++ \\n@@ -3,22 +3,3 @@\\n - AWS S3 Access: An adversary uses the `GetObject` API to retrieve sensitive data from an AWS S3 bucket.\\n - Azure Blob Storage Access: A user accesses a blob in Azure Storage using `Get Blob` or `Get Blob Properties`.\\n - Google Cloud Storage Access: An adversary uses `storage.objects.get` to download objects from - OpenStack Swift Storage Access: A user retrieves an object from OpenStack Swift using the `GET` method.\\n-\\n-This data component can be collected through the following measures:\\n-\\n-Enable Logging for Cloud Storage Services\\n-\\n-- AWS S3: Enable Server Access Logging to capture API calls like `GetObject` and store them in a designated S3 bucket.\\n-- Azure Storage: Enable Azure Storage Logging to capture operations like `GetBlob` and log metadata.\\n-- Google Cloud Storage: Enable Data Access audit logs for `storage.objects.get` API calls.\\n-- OpenStack Swift: Configure middleware for object logging to capture GET requests.\\n-\\n-Centralize and Aggregate Logs\\n-\\n-- Use a centralized logging solution (e.g., Splunk, ELK, or a cloud-native SIEM) to ingest and analyze logs from different cloud providers.\\n- - AWS Example: Use AWS CloudTrail to collect API activity logs and forward them to your SIEM.\\n- - Azure Example: Use Azure Monitor and Log Analytics to analyze storage access logs.\\n-\\n-Correlate with IAM Logs\\n-\\n-- Combine storage access logs with IAM activity logs to correlate user actions with specific permissions and identities.\"}, \"root['x_mitre_log_sources'][0]['channel']\": {\"new_value\": \"GetObject, CopyObject\", \"old_value\": \"PutObject, CopyObject\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][1]\": {\"name\": \"AWS:CloudTrail\", \"channel\": \"PutObject, GetObject, CopyObject, DeleteObject\"}, \"root['x_mitre_log_sources'][2]\": {\"name\": \"AWS:CloudTrail\", \"channel\": \"GetObject\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Cloud storage access refers to the retrieval or interaction t1Cloud storage access refers to the retrieval or interaction 
>with data stored in cloud infrastructure. This data componen>with data stored in cloud infrastructure. This data componen
>t includes activities such as reading, downloading, or acces>t includes activities such as reading, downloading, or acces
>sing files and objects within cloud storage systems. Common >sing files and objects within cloud storage systems. Common 
>examples include API calls like GetObject in AWS S3, which r>examples include API calls like GetObject in AWS S3, which r
>etrieves objects from cloud buckets. Examples:   - AWS S3 Ac>etrieves objects from cloud buckets. Examples:   - AWS S3 Ac
>cess: An adversary uses the `GetObject` API to retrieve sens>cess: An adversary uses the `GetObject` API to retrieve sens
>itive data from an AWS S3 bucket. - Azure Blob Storage Acces>itive data from an AWS S3 bucket. - Azure Blob Storage Acces
>s: A user accesses a blob in Azure Storage using `Get Blob` >s: A user accesses a blob in Azure Storage using `Get Blob` 
>or `Get Blob Properties`. - Google Cloud Storage Access: An >or `Get Blob Properties`. - Google Cloud Storage Access: An 
>adversary uses `storage.objects.get` to download objects fro>adversary uses `storage.objects.get` to download objects fro
>m - OpenStack Swift Storage Access: A user retrieves an obje>m - OpenStack Swift Storage Access: A user retrieves an obje
>ct from OpenStack Swift using the `GET` method.  This data c>ct from OpenStack Swift using the `GET` method.
>omponent can be collected through the following measures:  E 
>nable Logging for Cloud Storage Services  - AWS S3: Enable S 
>erver Access Logging to capture API calls like `GetObject` a 
>nd store them in a designated S3 bucket. - Azure Storage: En 
>able Azure Storage Logging to capture operations like `GetBl 
>ob` and log metadata. - Google Cloud Storage: Enable Data Ac 
>cess audit logs for `storage.objects.get` API calls. - OpenS 
>tack Swift: Configure middleware for object logging to captu 
>re GET requests.  Centralize and Aggregate Logs  - Use a cen 
>tralized logging solution (e.g., Splunk, ELK, or a cloud-nat 
>ive SIEM) to ingest and analyze logs from different cloud pr 
>oviders.     - AWS Example: Use AWS CloudTrail to collect AP 
>I activity logs and forward them to your SIEM.     - Azure E 
>xample: Use Azure Monitor and Log Analytics to analyze stora 
>ge access logs.  Correlate with IAM Logs  - Combine storage  
>access logs with IAM activity logs to correlate user actions 
> with specific permissions and identities. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--59ec10d9-546b-4b8e-bccb-fa85f71e5055", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.272000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0024", + "external_id": "DC0024" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Cloud Storage Creation", + "description": "Cloud Storage Creation refers to the initial creation of a new cloud storage resource, such as buckets, containers, or directories, within a cloud environment. This action is critical to track as it might indicate the legitimate provisioning of resources or unauthorized actions taken by adversaries to stage, store, or exfiltrate data. Examples: \n\n- AWS S3 Bucket Creation: An AWS user creates a new S3 bucket using the `CreateBucket` API call.\n- Azure Blob Storage Container Creation: A user creates a new container in Azure Blob Storage using the `Create Container` operation.\n- Google Cloud Storage Bucket Creation: A Google Cloud user creates a new bucket using `storage.buckets.create`.\n- OpenStack Swift Container Creation: A user creates a new container in OpenStack Swift using the `PUT` method.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "AWS:CloudTrail", + "channel": "CreateBucket" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:39.305000+00:00\"}, \"root['description']\": {\"new_value\": \"Cloud Storage Creation refers to the initial creation of a new cloud storage resource, such as buckets, containers, or directories, within a cloud environment. This action is critical to track as it might indicate the legitimate provisioning of resources or unauthorized actions taken by adversaries to stage, store, or exfiltrate data. Examples: \\n\\n- AWS S3 Bucket Creation: An AWS user creates a new S3 bucket using the `CreateBucket` API call.\\n- Azure Blob Storage Container Creation: A user creates a new container in Azure Blob Storage using the `Create Container` operation.\\n- Google Cloud Storage Bucket Creation: A Google Cloud user creates a new bucket using `storage.buckets.create`.\\n- OpenStack Swift Container Creation: A user creates a new container in OpenStack Swift using the `PUT` method.\", \"old_value\": \"Cloud Storage Creation refers to the initial creation of a new cloud storage resource, such as buckets, containers, or directories, within a cloud environment. This action is critical to track as it might indicate the legitimate provisioning of resources or unauthorized actions taken by adversaries to stage, store, or exfiltrate data. Examples: \\n\\n- AWS S3 Bucket Creation: An AWS user creates a new S3 bucket using the `CreateBucket` API call.\\n- Azure Blob Storage Container Creation: A user creates a new container in Azure Blob Storage using the `Create Container` operation.\\n- Google Cloud Storage Bucket Creation: A Google Cloud user creates a new bucket using `storage.buckets.create`.\\n- OpenStack Swift Container Creation: A user creates a new container in OpenStack Swift using the `PUT` method.\\n\\nThis data component can be collected through the following measures:\\n\\nEnable Logging for Cloud Storage Services\\n\\n- AWS S3: Enable AWS CloudTrail to log CreateBucket API actions.\\n- Azure Blob Storage: Enable Azure Monitor and Diagnostic Logs for storage account activity. Use Azure Event Grid to capture Create Container operations.\\n- Google Cloud Storage: Enable Data Access logs in Cloud Audit Logs to monitor storage.buckets.create API calls.\\n- OpenStack Swift: Configure Swift logging to capture PUT requests to new containers.\\n\\nCentralized Logging and Analysis\\n\\n- Forward logs to centralized platforms like Splunk or cloud-native SIEM solutions for correlation and analysis.\", \"diff\": \"--- \\n+++ \\n@@ -4,16 +4,3 @@\\n - Azure Blob Storage Container Creation: A user creates a new container in Azure Blob Storage using the `Create Container` operation.\\n - Google Cloud Storage Bucket Creation: A Google Cloud user creates a new bucket using `storage.buckets.create`.\\n - OpenStack Swift Container Creation: A user creates a new container in OpenStack Swift using the `PUT` method.\\n-\\n-This data component can be collected through the following measures:\\n-\\n-Enable Logging for Cloud Storage Services\\n-\\n-- AWS S3: Enable AWS CloudTrail to log CreateBucket API actions.\\n-- Azure Blob Storage: Enable Azure Monitor and Diagnostic Logs for storage account activity. Use Azure Event Grid to capture Create Container operations.\\n-- Google Cloud Storage: Enable Data Access logs in Cloud Audit Logs to monitor storage.buckets.create API calls.\\n-- OpenStack Swift: Configure Swift logging to capture PUT requests to new containers.\\n-\\n-Centralized Logging and Analysis\\n-\\n-- Forward logs to centralized platforms like Splunk or cloud-native SIEM solutions for correlation and analysis.\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Cloud Storage Creation refers to the initial creation of a nt1Cloud Storage Creation refers to the initial creation of a n
>ew cloud storage resource, such as buckets, containers, or d>ew cloud storage resource, such as buckets, containers, or d
>irectories, within a cloud environment. This action is criti>irectories, within a cloud environment. This action is criti
>cal to track as it might indicate the legitimate provisionin>cal to track as it might indicate the legitimate provisionin
>g of resources or unauthorized actions taken by adversaries >g of resources or unauthorized actions taken by adversaries 
>to stage, store, or exfiltrate data. Examples:   - AWS S3 Bu>to stage, store, or exfiltrate data. Examples:   - AWS S3 Bu
>cket Creation: An AWS user creates a new S3 bucket using the>cket Creation: An AWS user creates a new S3 bucket using the
> `CreateBucket` API call. - Azure Blob Storage Container Cre> `CreateBucket` API call. - Azure Blob Storage Container Cre
>ation: A user creates a new container in Azure Blob Storage >ation: A user creates a new container in Azure Blob Storage 
>using the `Create Container` operation. - Google Cloud Stora>using the `Create Container` operation. - Google Cloud Stora
>ge Bucket Creation: A Google Cloud user creates a new bucket>ge Bucket Creation: A Google Cloud user creates a new bucket
> using `storage.buckets.create`. - OpenStack Swift Container> using `storage.buckets.create`. - OpenStack Swift Container
> Creation: A user creates a new container in OpenStack Swift> Creation: A user creates a new container in OpenStack Swift
> using the `PUT` method.  This data component can be collect> using the `PUT` method.
>ed through the following measures:  Enable Logging for Cloud 
> Storage Services  - AWS S3: Enable AWS CloudTrail to log Cr 
>eateBucket API actions. - Azure Blob Storage: Enable Azure M 
>onitor and Diagnostic Logs for storage account activity. Use 
> Azure Event Grid to capture Create Container operations. -  
>Google Cloud Storage: Enable Data Access logs in Cloud Audit 
> Logs to monitor storage.buckets.create API calls. - OpenSta 
>ck Swift: Configure Swift logging to capture PUT requests to 
> new containers.  Centralized Logging and Analysis  - Forwar 
>d logs to centralized platforms like Splunk or cloud-native  
>SIEM solutions for correlation and analysis. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--4c41e296-b8d2-4a37-b789-eb565c87c00c", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.272000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0022", + "external_id": "DC0022" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Cloud Storage Deletion", + "description": "Cloud Storage Deletion refers to the removal or destruction of cloud storage infrastructure, such as buckets, containers, or directories, within a cloud environment. Monitoring this activity is critical to detecting potential unauthorized or malicious actions, such as data destruction by adversaries or accidental deletions that may lead to data loss. Examples: \n\n- AWS S3 Bucket Deletion: An AWS user deletes an S3 bucket using the `DeleteBucket` API call.\n- Azure Blob Storage Container Deletion: A user deletes a container in Azure Blob Storage using the `Delete Container` operation.\n- Google Cloud Storage Bucket Deletion: A Google Cloud user deletes a bucket using the `storage.buckets.delete` API.\n- OpenStack Swift Container Deletion: A user deletes a container in OpenStack Swift using the `DELETE` method.\n\nThis data component can be collected through the following measures:\n\nEnable Logging for Cloud Storage Services\n\n- AWS S3: Enable AWS CloudTrail to log DeleteBucket API actions.\n- Azure Blob Storage: Enable Azure Monitor and Diagnostic Logs to capture Delete Container operations. Use Azure Event Grid to capture and trigger alerts for container deletion.\n- Google Cloud Storage: Enable Data Access logs in Cloud Audit Logs to monitor storage.buckets.delete API calls.\n- OpenStack Swift: Configure Swift logging to capture DELETE requests for containers.\n\nCentralized Logging and Analysis\n\n- Use platforms like Splunk or native SIEMs to forward and analyze logs for anomalies in cloud storage deletions.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "AWS:CloudTrail", + "channel": "DeleteBucket, DeleteDBCluster, DeleteSnapshot, TerminateInstances" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:38.644000+00:00\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][1]\": {\"name\": \"AWS:CloudTrail\", \"channel\": \"PutBackupVaultAccessPolicy\"}}}", + "previous_version": "2.0" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--fcc4811f-9cc8-4db5-8097-4d8242a380de", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.272000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0017", + "external_id": "DC0017" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Cloud Storage Enumeration", + "description": "Cloud Storage Enumeration involves retrieving a list of available cloud storage infrastructure, such as buckets, containers, or objects, within a cloud environment. This activity may be performed for legitimate administrative purposes or malicious reconnaissance by adversaries seeking to identify accessible storage resources.Examples:\n\n- AWS S3 Bucket Enumeration: An AWS user lists all buckets using the `ListBuckets` API call.\n- Azure Blob Storage Container Enumeration: A user retrieves a list of all containers within a storage account using the Azure Storage SDK or API.\n- Google Cloud Storage Bucket Enumeration: A Google Cloud user lists all buckets within a project using the `storage.buckets.list` API.\n- OpenStack Swift Container Enumeration: A user retrieves a list of containers in OpenStack Swift using the `GET` method on the storage endpoint.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "AWS:CloudTrail", + "channel": "ListBuckets" + }, + { + "name": "AWS:CloudTrail", + "channel": "ListObjectsV2" + }, + { + "name": "azure:activity", + "channel": "List Blobs" + }, + { + "name": "gcp:storage", + "channel": "storage.objects.list" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:38.903000+00:00\"}, \"root['description']\": {\"new_value\": \"Cloud Storage Enumeration involves retrieving a list of available cloud storage infrastructure, such as buckets, containers, or objects, within a cloud environment. This activity may be performed for legitimate administrative purposes or malicious reconnaissance by adversaries seeking to identify accessible storage resources.Examples:\\n\\n- AWS S3 Bucket Enumeration: An AWS user lists all buckets using the `ListBuckets` API call.\\n- Azure Blob Storage Container Enumeration: A user retrieves a list of all containers within a storage account using the Azure Storage SDK or API.\\n- Google Cloud Storage Bucket Enumeration: A Google Cloud user lists all buckets within a project using the `storage.buckets.list` API.\\n- OpenStack Swift Container Enumeration: A user retrieves a list of containers in OpenStack Swift using the `GET` method on the storage endpoint.\", \"old_value\": \"Cloud Storage Enumeration involves retrieving a list of available cloud storage infrastructure, such as buckets, containers, or objects, within a cloud environment. This activity may be performed for legitimate administrative purposes or malicious reconnaissance by adversaries seeking to identify accessible storage resources.Examples:\\n\\n- AWS S3 Bucket Enumeration: An AWS user lists all buckets using the `ListBuckets` API call.\\n- Azure Blob Storage Container Enumeration: A user retrieves a list of all containers within a storage account using the Azure Storage SDK or API.\\n- Google Cloud Storage Bucket Enumeration: A Google Cloud user lists all buckets within a project using the `storage.buckets.list` API.\\n- OpenStack Swift Container Enumeration: A user retrieves a list of containers in OpenStack Swift using the `GET` method on the storage endpoint.\\n\\nThis data component can be collected through the following measures:\\n\\nEnable Logging for Cloud Storage Enumeration\\n\\n- AWS S3: Enable AWS CloudTrail to capture ListBuckets and ListObjects API calls.\\n- Azure Blob Storage: Enable Azure Monitor and Diagnostic Logs to capture enumeration operations like List Containers. Use Azure Event Grid to trigger alerts for container enumeration.\\n- Google Cloud Storage: Enable Audit Logs in Google Cloud to track storage.buckets.list API activity.\\n- OpenStack Swift: Configure Swift logging to capture GET requests for container enumeration.\\n\\nCentralized Log Aggregation\\n\\n- Use platforms like Splunk or native SIEM solutions to collect and analyze enumeration logs.\\n\", \"diff\": \"--- \\n+++ \\n@@ -4,16 +4,3 @@\\n - Azure Blob Storage Container Enumeration: A user retrieves a list of all containers within a storage account using the Azure Storage SDK or API.\\n - Google Cloud Storage Bucket Enumeration: A Google Cloud user lists all buckets within a project using the `storage.buckets.list` API.\\n - OpenStack Swift Container Enumeration: A user retrieves a list of containers in OpenStack Swift using the `GET` method on the storage endpoint.\\n-\\n-This data component can be collected through the following measures:\\n-\\n-Enable Logging for Cloud Storage Enumeration\\n-\\n-- AWS S3: Enable AWS CloudTrail to capture ListBuckets and ListObjects API calls.\\n-- Azure Blob Storage: Enable Azure Monitor and Diagnostic Logs to capture enumeration operations like List Containers. Use Azure Event Grid to trigger alerts for container enumeration.\\n-- Google Cloud Storage: Enable Audit Logs in Google Cloud to track storage.buckets.list API activity.\\n-- OpenStack Swift: Configure Swift logging to capture GET requests for container enumeration.\\n-\\n-Centralized Log Aggregation\\n-\\n-- Use platforms like Splunk or native SIEM solutions to collect and analyze enumeration logs.\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Cloud Storage Enumeration involves retrieving a list of avait1Cloud Storage Enumeration involves retrieving a list of avai
>lable cloud storage infrastructure, such as buckets, contain>lable cloud storage infrastructure, such as buckets, contain
>ers, or objects, within a cloud environment. This activity m>ers, or objects, within a cloud environment. This activity m
>ay be performed for legitimate administrative purposes or ma>ay be performed for legitimate administrative purposes or ma
>licious reconnaissance by adversaries seeking to identify ac>licious reconnaissance by adversaries seeking to identify ac
>cessible storage resources.Examples:  - AWS S3 Bucket Enumer>cessible storage resources.Examples:  - AWS S3 Bucket Enumer
>ation: An AWS user lists all buckets using the `ListBuckets`>ation: An AWS user lists all buckets using the `ListBuckets`
> API call. - Azure Blob Storage Container Enumeration: A use> API call. - Azure Blob Storage Container Enumeration: A use
>r retrieves a list of all containers within a storage accoun>r retrieves a list of all containers within a storage accoun
>t using the Azure Storage SDK or API. - Google Cloud Storage>t using the Azure Storage SDK or API. - Google Cloud Storage
> Bucket Enumeration: A Google Cloud user lists all buckets w> Bucket Enumeration: A Google Cloud user lists all buckets w
>ithin a project using the `storage.buckets.list` API. - Open>ithin a project using the `storage.buckets.list` API. - Open
>Stack Swift Container Enumeration: A user retrieves a list o>Stack Swift Container Enumeration: A user retrieves a list o
>f containers in OpenStack Swift using the `GET` method on th>f containers in OpenStack Swift using the `GET` method on th
>e storage endpoint.  This data component can be collected th>e storage endpoint.
>rough the following measures:  Enable Logging for Cloud Stor 
>age Enumeration  - AWS S3: Enable AWS CloudTrail to capture  
>ListBuckets and ListObjects API calls. - Azure Blob Storage: 
> Enable Azure Monitor and Diagnostic Logs to capture enumera 
>tion operations like List Containers. Use Azure Event Grid t 
>o trigger alerts for container enumeration. - Google Cloud S 
>torage: Enable Audit Logs in Google Cloud to track storage.b 
>uckets.list API activity. - OpenStack Swift: Configure Swift 
> logging to capture GET requests for container enumeration.  
> Centralized Log Aggregation  - Use platforms like Splunk or 
> native SIEM solutions to collect and analyze enumeration lo 
>gs.  
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--e214eb6d-de8f-4154-9015-6d47915fbed1", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.272000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0027", + "external_id": "DC0027" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Cloud Storage Metadata", + "description": "Cloud Storage Metadata provides contextual information about cloud storage infrastructure and its associated activity. This data may include attributes such as storage name, size, owner, permissions, creation date, region, and activity metadata. It is essential for monitoring, auditing, and identifying anomalies in cloud storage environments. Examples: \n\n- AWS S3 Bucket Metadata: Metadata about an S3 bucket includes the bucket name, region, creation date, owner, storage class, and permissions.\n- Azure Blob Storage Metadata: Metadata for an Azure Blob container includes container name, access level (e.g., private or public), size, and tags.\n- Google Cloud Storage Metadata: Metadata includes bucket name, storage class, location, labels, lifecycle policies, and versioning status.\n- OpenStack Swift Metadata: Metadata for a Swift container includes name, access level, quota, and custom attributes.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "AWS:CloudTrail", + "channel": "Post-authentication metadata enumeration from GUI session" + }, + { + "name": "m365:unified", + "channel": "AnonymousLinkCreated" + }, + { + "name": "saas:box", + "channel": "collaboration.invite" + }, + { + "name": "saas:dropbox", + "channel": "Shared link created to external account" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:39.767000+00:00\"}, \"root['description']\": {\"new_value\": \"Cloud Storage Metadata provides contextual information about cloud storage infrastructure and its associated activity. This data may include attributes such as storage name, size, owner, permissions, creation date, region, and activity metadata. It is essential for monitoring, auditing, and identifying anomalies in cloud storage environments. Examples: \\n\\n- AWS S3 Bucket Metadata: Metadata about an S3 bucket includes the bucket name, region, creation date, owner, storage class, and permissions.\\n- Azure Blob Storage Metadata: Metadata for an Azure Blob container includes container name, access level (e.g., private or public), size, and tags.\\n- Google Cloud Storage Metadata: Metadata includes bucket name, storage class, location, labels, lifecycle policies, and versioning status.\\n- OpenStack Swift Metadata: Metadata for a Swift container includes name, access level, quota, and custom attributes.\", \"old_value\": \"Cloud Storage Metadata provides contextual information about cloud storage infrastructure and its associated activity. This data may include attributes such as storage name, size, owner, permissions, creation date, region, and activity metadata. It is essential for monitoring, auditing, and identifying anomalies in cloud storage environments. Examples: \\n\\n- AWS S3 Bucket Metadata: Metadata about an S3 bucket includes the bucket name, region, creation date, owner, storage class, and permissions.\\n- Azure Blob Storage Metadata: Metadata for an Azure Blob container includes container name, access level (e.g., private or public), size, and tags.\\n- Google Cloud Storage Metadata: Metadata includes bucket name, storage class, location, labels, lifecycle policies, and versioning status.\\n- OpenStack Swift Metadata: Metadata for a Swift container includes name, access level, quota, and custom attributes.\\n\\nThis data component can be collected through the following measures:\\n\\nEnable Logging for Metadata Collection\\n\\n- AWS S3: Use AWS CloudTrail to log `GetBucketAcl`, `GetBucketPolicy`, and `HeadBucket` API calls.\\n- Azure Blob Storage: Use Azure Monitor to log container metadata retrieval and updates.\\n- Google Cloud Storage: Enable Google Cloud Audit Logs to capture `storage.buckets.get` and `storage.buckets.update`.\\n- OpenStack Swift: Enable logging of `HEAD` or `GET` requests to containers.\\n\\nCentralized Log Aggregation\\n\\n- Use a SIEM solution (e.g., Splunk) to aggregate and analyze metadata retrieval and modification logs.\\n- Correlate metadata access with user actions, IP addresses, and other contextual data.\\n\\nAPI Polling\\n\\n- Use cloud SDKs or APIs to periodically query metadata for analysis:\\n - AWS CLI Example: `aws s3api get-bucket-acl --bucket company-sensitive-data`\\n - Azure CLI Example: `az storage container show --name customer-records`\\n - Google Cloud CLI Example: `gcloud storage buckets describe user-uploads`\", \"diff\": \"--- \\n+++ \\n@@ -4,24 +4,3 @@\\n - Azure Blob Storage Metadata: Metadata for an Azure Blob container includes container name, access level (e.g., private or public), size, and tags.\\n - Google Cloud Storage Metadata: Metadata includes bucket name, storage class, location, labels, lifecycle policies, and versioning status.\\n - OpenStack Swift Metadata: Metadata for a Swift container includes name, access level, quota, and custom attributes.\\n-\\n-This data component can be collected through the following measures:\\n-\\n-Enable Logging for Metadata Collection\\n-\\n-- AWS S3: Use AWS CloudTrail to log `GetBucketAcl`, `GetBucketPolicy`, and `HeadBucket` API calls.\\n-- Azure Blob Storage: Use Azure Monitor to log container metadata retrieval and updates.\\n-- Google Cloud Storage: Enable Google Cloud Audit Logs to capture `storage.buckets.get` and `storage.buckets.update`.\\n-- OpenStack Swift: Enable logging of `HEAD` or `GET` requests to containers.\\n-\\n-Centralized Log Aggregation\\n-\\n-- Use a SIEM solution (e.g., Splunk) to aggregate and analyze metadata retrieval and modification logs.\\n-- Correlate metadata access with user actions, IP addresses, and other contextual data.\\n-\\n-API Polling\\n-\\n-- Use cloud SDKs or APIs to periodically query metadata for analysis:\\n- - AWS CLI Example: `aws s3api get-bucket-acl --bucket company-sensitive-data`\\n- - Azure CLI Example: `az storage container show --name customer-records`\\n- - Google Cloud CLI Example: `gcloud storage buckets describe user-uploads`\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Cloud Storage Metadata provides contextual information aboutt1Cloud Storage Metadata provides contextual information about
> cloud storage infrastructure and its associated activity. T> cloud storage infrastructure and its associated activity. T
>his data may include attributes such as storage name, size, >his data may include attributes such as storage name, size, 
>owner, permissions, creation date, region, and activity meta>owner, permissions, creation date, region, and activity meta
>data. It is essential for monitoring, auditing, and identify>data. It is essential for monitoring, auditing, and identify
>ing anomalies in cloud storage environments. Examples:   - A>ing anomalies in cloud storage environments. Examples:   - A
>WS S3 Bucket Metadata: Metadata about an S3 bucket includes >WS S3 Bucket Metadata: Metadata about an S3 bucket includes 
>the bucket name, region, creation date, owner, storage class>the bucket name, region, creation date, owner, storage class
>, and permissions. - Azure Blob Storage Metadata: Metadata f>, and permissions. - Azure Blob Storage Metadata: Metadata f
>or an Azure Blob container includes container name, access l>or an Azure Blob container includes container name, access l
>evel (e.g., private or public), size, and tags. - Google Clo>evel (e.g., private or public), size, and tags. - Google Clo
>ud Storage Metadata: Metadata includes bucket name, storage >ud Storage Metadata: Metadata includes bucket name, storage 
>class, location, labels, lifecycle policies, and versioning >class, location, labels, lifecycle policies, and versioning 
>status. - OpenStack Swift Metadata: Metadata for a Swift con>status. - OpenStack Swift Metadata: Metadata for a Swift con
>tainer includes name, access level, quota, and custom attrib>tainer includes name, access level, quota, and custom attrib
>utes.  This data component can be collected through the foll>utes.
>owing measures:  Enable Logging for Metadata Collection  - A 
>WS S3: Use AWS CloudTrail to log `GetBucketAcl`, `GetBucketP 
>olicy`, and `HeadBucket` API calls. - Azure Blob Storage: Us 
>e Azure Monitor to log container metadata retrieval and upda 
>tes. - Google Cloud Storage: Enable Google Cloud Audit Logs  
>to capture `storage.buckets.get` and `storage.buckets.update 
>`. - OpenStack Swift: Enable logging of `HEAD` or `GET` requ 
>ests to containers.  Centralized Log Aggregation  - Use a SI 
>EM solution (e.g., Splunk) to aggregate and analyze metadata 
> retrieval and modification logs. - Correlate metadata acces 
>s with user actions, IP addresses, and other contextual data 
>.  API Polling  - Use cloud SDKs or APIs to periodically que 
>ry metadata for analysis:     - AWS CLI Example: `aws s3api  
>get-bucket-acl --bucket company-sensitive-data`     - Azure  
>CLI Example: `az storage container show --name customer-reco 
>rds`     - Google Cloud CLI Example: `gcloud storage buckets 
> describe user-uploads` 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--45977f14-1bcc-4ec4-ac14-a30fd3a11f44", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.272000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0023", + "external_id": "DC0023" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Cloud Storage Modification", + "description": "Cloud Storage Modification involves tracking changes made to cloud storage infrastructure, including updates to settings, permissions, or stored data. Examples include modifying object access control lists (ACLs), uploading new objects, or updating bucket policies. Examples: \n\nAWS S3: An object is uploaded or its ACL is modified.\n- Azure Blob Storage: A blob's metadata or permissions are updated.\n- Google Cloud Storage: An object's lifecycle policy is updated, or a bucket policy is changed.\n- OpenStack Swift: Modifications to container settings or uploading of new objects.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "AWS:CloudTrail", + "channel": "PutBucketLifecycle, PutLifecycleConfiguration, SetBucketLifecycle, storage.buckets.update" + }, + { + "name": "AWS:CloudTrail", + "channel": "PutObject (with SSE-C), UploadPart (SSE-C)" + }, + { + "name": "AWS:CloudTrail", + "channel": "PutBucketPolicy" + }, + { + "name": "m365:unified", + "channel": "SharingSet" + }, + { + "name": "saas:googledrive", + "channel": "drive.permission.add" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:36.930000+00:00\"}, \"root['description']\": {\"new_value\": \"Cloud Storage Modification involves tracking changes made to cloud storage infrastructure, including updates to settings, permissions, or stored data. Examples include modifying object access control lists (ACLs), uploading new objects, or updating bucket policies. Examples: \\n\\nAWS S3: An object is uploaded or its ACL is modified.\\n- Azure Blob Storage: A blob's metadata or permissions are updated.\\n- Google Cloud Storage: An object's lifecycle policy is updated, or a bucket policy is changed.\\n- OpenStack Swift: Modifications to container settings or uploading of new objects.\", \"old_value\": \"Cloud Storage Modification involves tracking changes made to cloud storage infrastructure, including updates to settings, permissions, or stored data. Examples include modifying object access control lists (ACLs), uploading new objects, or updating bucket policies. Examples: \\n\\nAWS S3: An object is uploaded or its ACL is modified.\\n- Azure Blob Storage: A blob's metadata or permissions are updated.\\n- Google Cloud Storage: An object's lifecycle policy is updated, or a bucket policy is changed.\\n- OpenStack Swift: Modifications to container settings or uploading of new objects.\\n\\nThis data component can be collected through the following measures:\\n\\nEnable Logging\\n\\n- AWS S3: Enable AWS CloudTrail to log API events like PutObject, PutObjectAcl, and PutBucketPolicy.\\n- Azure Blob Storage: Use Azure Monitor to log write and update operations.\\n- Google Cloud Storage: Enable Google Cloud Audit Logs to track storage.objects.update and storage.buckets.update.\\n- OpenStack Swift: Enable logging for PUT and POST requests to track object uploads and container metadata updates.\\n\\nUse Cloud Monitoring Tools\\n\\n- Integrate with tools like AWS Config, Azure Security Center, or Google Cloud Monitoring to detect configuration drift or unauthorized changes.\\n\\nCentralized Log Aggregation\\n\\n- Use a SIEM (e.g., Splunk) to aggregate logs across multiple cloud providers for unified monitoring and analysis.\\n\\nPeriodic API Queries\\n\\n- AWS CLI Example: Query recent modifications to bucket policies: `aws s3api get-bucket-policy --bucket sensitive-data`\\n- Azure CLI Example: List changes to a blob container: `az storage blob show --container-name private-docs`\\n- Google Cloud CLI Example: Check metadata updates: `gcloud storage objects describe gs://user-uploads/document.txt`\", \"diff\": \"--- \\n+++ \\n@@ -4,26 +4,3 @@\\n - Azure Blob Storage: A blob's metadata or permissions are updated.\\n - Google Cloud Storage: An object's lifecycle policy is updated, or a bucket policy is changed.\\n - OpenStack Swift: Modifications to container settings or uploading of new objects.\\n-\\n-This data component can be collected through the following measures:\\n-\\n-Enable Logging\\n-\\n-- AWS S3: Enable AWS CloudTrail to log API events like PutObject, PutObjectAcl, and PutBucketPolicy.\\n-- Azure Blob Storage: Use Azure Monitor to log write and update operations.\\n-- Google Cloud Storage: Enable Google Cloud Audit Logs to track storage.objects.update and storage.buckets.update.\\n-- OpenStack Swift: Enable logging for PUT and POST requests to track object uploads and container metadata updates.\\n-\\n-Use Cloud Monitoring Tools\\n-\\n-- Integrate with tools like AWS Config, Azure Security Center, or Google Cloud Monitoring to detect configuration drift or unauthorized changes.\\n-\\n-Centralized Log Aggregation\\n-\\n-- Use a SIEM (e.g., Splunk) to aggregate logs across multiple cloud providers for unified monitoring and analysis.\\n-\\n-Periodic API Queries\\n-\\n-- AWS CLI Example: Query recent modifications to bucket policies: `aws s3api get-bucket-policy --bucket sensitive-data`\\n-- Azure CLI Example: List changes to a blob container: `az storage blob show --container-name private-docs`\\n-- Google Cloud CLI Example: Check metadata updates: `gcloud storage objects describe gs://user-uploads/document.txt`\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Cloud Storage Modification involves tracking changes made tot1Cloud Storage Modification involves tracking changes made to
> cloud storage infrastructure, including updates to settings> cloud storage infrastructure, including updates to settings
>, permissions, or stored data. Examples include modifying ob>, permissions, or stored data. Examples include modifying ob
>ject access control lists (ACLs), uploading new objects, or >ject access control lists (ACLs), uploading new objects, or 
>updating bucket policies. Examples:   AWS S3: An object is u>updating bucket policies. Examples:   AWS S3: An object is u
>ploaded or its ACL is modified. - Azure Blob Storage: A blob>ploaded or its ACL is modified. - Azure Blob Storage: A blob
>'s metadata or permissions are updated. - Google Cloud Stora>'s metadata or permissions are updated. - Google Cloud Stora
>ge: An object's lifecycle policy is updated, or a bucket pol>ge: An object's lifecycle policy is updated, or a bucket pol
>icy is changed. - OpenStack Swift: Modifications to containe>icy is changed. - OpenStack Swift: Modifications to containe
>r settings or uploading of new objects.  This data component>r settings or uploading of new objects.
> can be collected through the following measures:  Enable Lo 
>gging  - AWS S3: Enable AWS CloudTrail to log API events lik 
>e PutObject, PutObjectAcl, and PutBucketPolicy. - Azure Blob 
> Storage: Use Azure Monitor to log write and update operatio 
>ns. - Google Cloud Storage: Enable Google Cloud Audit Logs t 
>o track storage.objects.update and storage.buckets.update. - 
> OpenStack Swift: Enable logging for PUT and POST requests t 
>o track object uploads and container metadata updates.  Use  
>Cloud Monitoring Tools  - Integrate with tools like AWS Conf 
>ig, Azure Security Center, or Google Cloud Monitoring to det 
>ect configuration drift or unauthorized changes.  Centralize 
>d Log Aggregation  - Use a SIEM (e.g., Splunk) to aggregate  
>logs across multiple cloud providers for unified monitoring  
>and analysis.  Periodic API Queries  - AWS CLI Example: Quer 
>y recent modifications to bucket policies: `aws s3api get-bu 
>cket-policy --bucket sensitive-data` - Azure CLI Example: Li 
>st changes to a blob container: `az storage blob show --cont 
>ainer-name private-docs` - Google Cloud CLI Example: Check m 
>etadata updates: `gcloud storage objects describe gs://user- 
>uploads/document.txt` 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.273000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0064", + "external_id": "DC0064" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Command Execution", + "description": "Command Execution involves monitoring and capturing the execution of textual commands (including shell commands, cmdlets, and scripts) within an operating system or application. These commands may include arguments or parameters and are typically executed through interpreters such as `cmd.exe`, `bash`, `zsh`, `PowerShell`, or programmatic execution. Examples: \n\n- Windows Command Prompt\n - dir \u2013 Lists directory contents.\n - net user \u2013 Queries or manipulates user accounts.\n - tasklist \u2013 Lists running processes.\n- PowerShell\n - Get-Process \u2013 Retrieves processes running on a system.\n - Set-ExecutionPolicy \u2013 Changes PowerShell script execution policies.\n - Invoke-WebRequest \u2013 Downloads remote resources.\n- Linux Shell\n - ls \u2013 Lists files in a directory.\n - cat /etc/passwd \u2013 Reads the user accounts file.\n - curl http://malicious-site.com \u2013 Retrieves content from a malicious URL.\n- Container Environments\n - docker exec \u2013 Executes a command inside a running container.\n - kubectl exec \u2013 Runs commands in Kubernetes pods.\n- macOS Terminal\n - open \u2013 Opens files or URLs.\n - dscl . -list /Users \u2013 Lists all users on the system.\n - osascript -e \u2013 Executes AppleScript commands.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Command", + "channel": "None" + }, + { + "name": "auditd:SYSCALL", + "channel": "execution of realmd, samba-tool, or ldapmodify with user-related arguments" + }, + { + "name": "macos:unifiedlog", + "channel": "dsconfigad or dscl with create or append options for AD-bound users" + }, + { + "name": "EDR:AMSI", + "channel": "None" + }, + { + "name": "linux:syslog", + "channel": "cron activity" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "Get-ADTrust|GetAllTrustRelationships" + }, + { + "name": "gcp:audit", + "channel": "None" + }, + { + "name": "auditd:SYSCALL", + "channel": "Execution of script interpreters by systemd timer (ExecStart)" + }, + { + "name": "AWS:CloudTrail", + "channel": "InvokeFunction" + }, + { + "name": "m365:unified", + "channel": "Automated forwarding or file sync initiated by a logic app" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "name": "linux:syslog", + "channel": "Suspicious script or command execution targeting browser folders" + }, + { + "name": "esxi:shell", + "channel": "snapshot create/copy, esxcli" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Commands like systemctl stop , service stop, or kill -9 " + }, + { + "name": "macos:unifiedlog", + "channel": "launchctl unload, kill, or pkill commands affecting daemons or background services" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of security-agent detection or enumeration commands" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream --predicate" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "Execution of Microsoft script to enumerate custom forms in Outlook mailbox" + }, + { + "name": "m365:messagetrace", + "channel": "Inbound email triggers execution of mailbox-stored custom form" + }, + { + "name": "auditd:EXECVE", + "channel": "Use of mv or cp to rename files with '.' prefix" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of chflags hidden or SetFile -a V" + }, + { + "name": "esxi:shell", + "channel": "interactive shell" + }, + { + "name": "networkdevice:cli", + "channel": "CLI command" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream" + }, + { + "name": "esxi:vmkernel", + "channel": "/var/log/vmkernel.log" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve calls to locale, timedatectl, or cat /etc/timezone" + }, + { + "name": "macos:unifiedlog", + "channel": "defaults read -g AppleLocale, systemsetup -gettimezone" + }, + { + "name": "macos:unifiedlog", + "channel": "profiles install -type=configuration" + }, + { + "name": "auditd:SYSCALL", + "channel": "sleep function usage or loops (nanosleep, usleep) in scripts" + }, + { + "name": "m365:unified", + "channel": "Search-Mailbox, Get-MessageTrace, eDiscovery requests" + }, + { + "name": "EDR:cli", + "channel": "Command Line Telemetry" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream --predicate 'eventMessage contains \"loginwindow\" or \"pfctl\"'" + }, + { + "name": "networkdevice:syslog", + "channel": "Command Audit / Configuration Change" + }, + { + "name": "WinEventLog:Microsoft-Office/OutlookAddinMonitor", + "channel": "Outlook loading add-in via unexpected load path or non-default profile context" + }, + { + "name": "macos:unifiedlog", + "channel": "exec or sudo usage with NOPASSWD context or echo modifying sudoers" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "name": "auditd:EXECVE", + "channel": "execve: Execution of update-ca-certificates or trust anchor modification commands" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of /usr/bin/security add-trusted-cert or keychain modifications to System.keychain" + }, + { + "name": "auditd:EXECVE", + "channel": "gcore, gdb, strings, hexdump execution" + }, + { + "name": "auditd:SYSCALL", + "channel": "connect, execve, write" + }, + { + "name": "esxi:hostd", + "channel": "command execution" + }, + { + "name": "auditd:EXECVE", + "channel": "Execution of auditctl, systemctl stop auditd, or kill -9 auditd" + }, + { + "name": "macos:syslog", + "channel": "system.log" + }, + { + "name": "esxi:hostd", + "channel": "/var/log/hostd.log" + }, + { + "name": "esxi:shell", + "channel": "/var/log/shell.log" + }, + { + "name": "docker:daemon", + "channel": "docker exec or docker run with unexpected command/entrypoint" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve call including 'nohup' or trailing '&'" + }, + { + "name": "macos:unifiedlog", + "channel": "nohup, disown, or osascript execution patterns" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "CommandLine=copy-item or robocopy from UNC path" + }, + { + "name": "esxi:shell", + "channel": "invoked remote scripts (esxcli)" + }, + { + "name": "auditd:EXECVE", + "channel": "execution of systemctl with subcommands start, stop, enable, disable" + }, + { + "name": "networkdevice:cli", + "channel": "Policy Update" + }, + { + "name": "auditd:SYSCALL", + "channel": "None" + }, + { + "name": "AWS:CloudTrail", + "channel": "eventName: RunInstances, CreateUser, PutRolePolicy, InvokeCommand" + }, + { + "name": "gcp:audit", + "channel": "methodName: setIamPolicy, startInstance, createServiceAccount" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Commands executed within an SSH session where no matching logon/authentication event exists" + }, + { + "name": "esxi:hostd", + "channel": "modification of config files or shell command execution" + }, + { + "name": "kubernetes:audit", + "channel": "Shell process (e.g., /bin/sh, /bin/bash) spawned in a container without an interactive session attached (i.e., automation anomaly)" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of 'profiles install -type=configuration'" + }, + { + "name": "macos:unifiedlog", + "channel": "subsystem:com.apple.Terminal" + }, + { + "name": "networkdevice:syslog", + "channel": "eventlog" + }, + { + "name": "esxi:hostd", + "channel": "shell access or job registration" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "PowerShell launched from outlook.exe or triggered without user invocation" + }, + { + "name": "m365:messagetrace", + "channel": "Inbound email matches crafted rule trigger pattern tied to persistence logic" + }, + { + "name": "linus:syslog", + "channel": "None" + }, + { + "name": "linux:syslog", + "channel": "Unusual outbound transfers from CLI tools like base64, gzip, or netcat" + }, + { + "name": "macos:unifiedlog", + "channel": "base64 or curl processes chained within short execution window" + }, + { + "name": "esxi:shell", + "channel": "base64 or gzip use within shell session" + }, + { + "name": "macos:unifiedlog", + "channel": "exec: Invocation of /usr/bin/defaults write or /usr/bin/plutil modifying plist keys" + }, + { + "name": "auditd:SYSCALL", + "channel": "chmod, execve" + }, + { + "name": "macos:unifiedlog", + "channel": "chmod command with arguments including '+s', 'u+s', or numeric values 4000\u20136777" + }, + { + "name": "macos:unifiedlog", + "channel": "command includes dscl . delete or sysadminctl --deleteUser" + }, + { + "name": "fs:fsusage", + "channel": "file system activity monitor" + }, + { + "name": "networkdevice:cli", + "channel": "ip ssh pubkey-chain" + }, + { + "name": "esxi:shell", + "channel": "scripts or binaries with misleading names" + }, + { + "name": "auditd:EXECVE", + "channel": "Execution of GUI-related binaries with suppressed window/display flags" + }, + { + "name": "linuxsyslog", + "channel": "nslcd or winbind logs" + }, + { + "name": "macos:unifiedlog", + "channel": "DS daemon log entries" + }, + { + "name": "esxi:hostd", + "channel": "logline inspection" + }, + { + "name": "macos:unifiedlog", + "channel": "diskutil eraseDisk / asr restore with destructive flags" + }, + { + "name": "networkdevice:cli", + "channel": "erase flash:, erase startup-config, format disk" + }, + { + "name": "networkdevice:syslog", + "channel": "command_exec" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: iptables, nft, firewall-cmd modifications" + }, + { + "name": "macos:unifiedlog", + "channel": "pfctl -d, socketfilterfw --setglobalstate off, or modifications to com.apple.alf" + }, + { + "name": "esxi:hostd", + "channel": "esxcli network firewall set commands" + }, + { + "name": "docker:events", + "channel": "container exec rm|container stop --force" + }, + { + "name": "esxi:hostd", + "channel": "event stream" + }, + { + "name": "networkdevice:cli", + "channel": "CLI command logs" + }, + { + "name": "esxi:shell", + "channel": "/var/log/shell.log entries containing \"esxcli system clock get\"" + }, + { + "name": "networkdevice:syslog", + "channel": "command-exec: CLI commands containing \"show clock\", \"show clock detail\", \"show timezone\" executed by suspicious user/source" + }, + { + "name": "networkdevice:cli", + "channel": "cmd: cmd=show clock detail" + }, + { + "name": "auditd:EXECVE", + "channel": "curl -X POST, wget --post-data" + }, + { + "name": "linux:syslog", + "channel": "sudo chage|grep pam_pwquality|cat /etc/login.defs" + }, + { + "name": "macos:unifiedlog", + "channel": "pwpolicy|PasswordPolicy" + }, + { + "name": "networkdevice:syslog", + "channel": "cmd='show aaa*' OR 'show running-config | include password|aaa' OR 'show aaa common-criteria policy all'" + }, + { + "name": "networkdevice:syslog", + "channel": "CLI command audit" + }, + { + "name": "networkdevice:cli", + "channel": "Execution of commands to load, copy, or replace system images (e.g., 'copy tftp flash', 'boot system')" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "Execution of PowerShell script to enumerate or remove malicious Home Page folder config" + }, + { + "name": "m365:messagetrace", + "channel": "Inbound email triggering Outlook to auto-access folder tied to malicious Home Page" + }, + { + "name": "macos:unifiedlog", + "channel": "Command line contains smbutil view //, mount_smbfs //" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Invocation of scp, rsync, curl, or sftp" + }, + { + "name": "esxi:hostd", + "channel": "scp/ssh used to move file across hosts" + }, + { + "name": "auditd:EXECVE", + "channel": "command line arguments containing lsblk, fdisk, parted" + }, + { + "name": "macos:unifiedlog", + "channel": "log messages related to disk enumeration context or Terminal session" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve calls modifying local mail filter configuration files" + }, + { + "name": "esxi:hostd", + "channel": "None" + }, + { + "name": "esxi:shell", + "channel": "None" + }, + { + "name": "networkdevice:cli", + "channel": "None" + }, + { + "name": "linux:syslog", + "channel": "sudo execution of ffmpeg/gst-launch/v4l2-ctl by non-standard user" + }, + { + "name": "docker:api", + "channel": "docker logs access or container inspect commands from non-administrative users" + }, + { + "name": "esxi:shell", + "channel": "command IN (\"esxcli vm process list\", \"vim-cmd vmsvc/getallvms\")" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: process_name IN (\"virsh\", \"VBoxManage\", \"qemu-img\") AND command IN (\"list\", \"info\")" + }, + { + "name": "esxi:shell", + "channel": "openssl|tar|dd" + }, + { + "name": "AWS:CloudTrail", + "channel": "SSM RunCommand" + }, + { + "name": "azure:activity", + "channel": "Intune PowerShell Scripts" + }, + { + "name": "m365:exchange", + "channel": "Cmdlet: Get-GlobalAddressList, Get-Recipient" + }, + { + "name": "networkdevice:cli", + "channel": "Execution of commands like 'show running-config', 'copy running-config', or 'export config'" + }, + { + "name": "esxi:syslog", + "channel": "boot logs" + }, + { + "name": "networkdevice:syslog", + "channel": "system boot logs" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: service stop syslog, systemctl stop rsyslog, kill -9 syslog" + }, + { + "name": "macos:unifiedlog", + "channel": "defaults write com.apple.system.logging or logd manipulation" + }, + { + "name": "esxi:hostd", + "channel": "esxcli system syslog config set or reload" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: openssl pkcs12, certutil, keytool" + }, + { + "name": "macos:unifiedlog", + "channel": "process calling security find-certificate, export, or import" + }, + { + "name": "networkdevice:cli", + "channel": "Execution of CLI commands altering crypto parameters (e.g., 'crypto key generate rsa modulus 512')" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Process in container namespace executes curl|wget|bash|sh|python|nc with outbound args" + }, + { + "name": "m365:exchange", + "channel": "Get-RoleGroup, Get-DistributionGroup" + }, + { + "name": "auditd:SYSCALL", + "channel": "execution of systemctl or service with enable/start parameters" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of cat, less, grep, journalctl targeting log directories (/var/log/)" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of log show, fs_usage, or cat targeting system.log" + }, + { + "name": "AWS:CloudTrail", + "channel": "GetLogEvents: High frequency log exports from CloudWatch or equivalent services" + }, + { + "name": "esxi:shell", + "channel": "Execution of cat, tail, grep targeting /var/log/vmkernel.log or /var/log/hostd.log" + }, + { + "name": "esxi:shell", + "channel": "CLI usage logs" + }, + { + "name": "macos:syslog", + "channel": "/var/log/system.log" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of launchctl load/unload/start commands" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "Exchange Cmdlets" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of python, perl, or custom binaries invoking compression libraries" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve, USER_CMD" + }, + { + "name": "auditd:USER_CMD", + "channel": "USER_CMD" + }, + { + "name": "esxi:shell", + "channel": "Command execution trace" + }, + { + "name": "auditd:SYSCALL", + "channel": "bash/zsh of base64, tar, gzip, or openssl immediately after file write" + }, + { + "name": "linux:osquery", + "channel": "Command-line includes base64 -d or openssl enc -d" + }, + { + "name": "macos:unifiedlog", + "channel": "base64 -d or osascript invoked on staged file" + }, + { + "name": "auditd:EXECVE", + "channel": "exec: Execution of dd, efibootmgr, or flashrom modifying firmware/boot partitions" + }, + { + "name": "auditd:EXECVE", + "channel": "curl -d, wget --post-data" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Processes executing sendmail/postfix with forged headers" + }, + { + "name": "macos:unifiedlog", + "channel": "diskutil partitionDisk or eraseVolume with partition scheme modifications" + }, + { + "name": "networkdevice:cli", + "channel": "format flash:, format disk, reformat commands" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of tar, gzip, bzip2, xz, zip, or openssl with compression/encryption arguments" + }, + { + "name": "auditd:PROCTITLE", + "channel": "proctitle contains chmod, chown, setfacl, or attr commands with suspicious parameters" + }, + { + "name": "esxi:shell", + "channel": "shell command execution for chmod, chown, or file permission modification on VMFS or system files" + }, + { + "name": "networkdevice:Firewall", + "channel": "Audit trail or CLI/API access indicating commands like no access-list, delete rule-set, clear config" + }, + { + "name": "auditd:EXECVE", + "channel": "grep/cat/awk on files with password fields" + }, + { + "name": "macos:unifiedlog", + "channel": "grep/cat on files matching credential patterns" + }, + { + "name": "kubernetes:audit", + "channel": "process execution involving curl, grep, or awk on secrets" + }, + { + "name": "AWS:CloudTrail", + "channel": "command-line execution invoking credential enumeration" + }, + { + "name": "auditd:SYSCALL", + "channel": "promiscuous mode transitions (ioctl or ifconfig)" + }, + { + "name": "fs:fsusage", + "channel": "access to BPF devices or interface IOCTLs" + }, + { + "name": "networkdevice:syslog", + "channel": "exec command='monitor capture'" + }, + { + "name": "WinEventLog:Microsoft-Office-Alerts", + "channel": "Unexpected DLL or component loaded at Office startup" + }, + { + "name": "m365:office", + "channel": "Startup execution includes non-default component" + }, + { + "name": "macos:unifiedlog", + "channel": "diskutil eraseDisk/zeroDisk or asr restore with destructive flags" + }, + { + "name": "networkdevice:cli", + "channel": "erase flash:, erase nvram:, format disk" + }, + { + "name": "macos:unifiedlog", + "channel": "spctl --master-disable, csrutil disable, or defaults write to disable Gatekeeper" + }, + { + "name": "esxi:shell", + "channel": "esxcli system syslog config set --loghost='' or stopping hostd service" + }, + { + "name": "networkdevice:syslog", + "channel": "no logging buffered, no aaa new-model, disable firewall" + }, + { + "name": "auditd:EXECVE", + "channel": "git push, curl -X POST" + }, + { + "name": "linux:cli", + "channel": "command logging" + }, + { + "name": "esxi:hostd", + "channel": "command log" + }, + { + "name": "networkdevice:cli", + "channel": "command logs" + }, + { + "name": "networkdevice:syslog", + "channel": "interactive shell logging" + }, + { + "name": "esxi:hostd", + "channel": "Execution of '/bin/vmx' or modifications to '/etc/rc.local.d/local.sh'" + }, + { + "name": "auditd:SYSCALL", + "channel": "chattr, rm, shred, dd run on recovery directories or partitions" + }, + { + "name": "networkdevice:syslog", + "channel": "command sequence: erase \u2192 format \u2192 reload" + }, + { + "name": "macos:unifiedlog", + "channel": "process: at, job runner" + }, + { + "name": "macos:osquery", + "channel": "Interpreter exec with suspicious arguments as above" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of curl or wget writing files to /tmp/* followed by chmod or execution" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of downgraded interpreters such as python2 or forced fallback commands" + }, + { + "name": "auditd:PROCTITLE", + "channel": "proctitle contains chmod, chown, chgrp, setfacl, or attr with suspicious parameters (777, 755, +x, -R)" + }, + { + "name": "auditd:EXECVE", + "channel": "Execution of gsettings set org.gnome.login-screen disable-user-list true" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of dscl . create with IsHidden=1" + }, + { + "name": "linux:syslog", + "channel": "sshd logs" + }, + { + "name": "esxi:shell", + "channel": "Shell Access/Command Execution" + }, + { + "name": "networkdevice:syslog", + "channel": "CLI Command Logging" + }, + { + "name": "auditd:CONFIG_CHANGE", + "channel": "udev rule reload or trigger command executed" + }, + { + "name": "linux:cli", + "channel": "Shell history logs" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream --predicate 'processImagePath contains \"zip\" OR \"base64\"'" + }, + { + "name": "networkdevice:cli", + "channel": "command logging" + }, + { + "name": "esxi:hostd", + "channel": "Command Execution" + }, + { + "name": "macos:osquery", + "channel": "launchd + process_events" + }, + { + "name": "esxi:vmkernel", + "channel": "DCUI shell start, BusyBox activity" + }, + { + "name": "esxi:hostd", + "channel": "remote CLI + vim-cmd logging" + }, + { + "name": "networkdevice:syslog", + "channel": "CLI Command Audit" + }, + { + "name": "m365:defender", + "channel": "Activity Log: Command Invocation" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "CmdletName: Get-Recipient, Get-User" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "Execution of 'Get-WmiObject Win32_Product' or similar PowerShell cmdlets" + }, + { + "name": "linux:shell", + "channel": "Manual invocation of software enumeration commands via interactive shell" + }, + { + "name": "auditd:SYSCALL", + "channel": "Command line arguments including SPApplicationsDataType" + }, + { + "name": "AWS:CloudTrail", + "channel": "ssm:GetCommandInvocation" + }, + { + "name": "esxi:shell", + "channel": "esxcli software vib list" + }, + { + "name": "auditd:EXECVE", + "channel": "execution of setfattr or getfattr commands" + }, + { + "name": "macos:unifiedlog", + "channel": "xattr utility execution with -w or -p flags" + }, + { + "name": "auditd:SYSCALL", + "channel": "Execution of spoofing tools (e.g., hping3, nping, scapy) sending UDP packets to known amplifier ports" + }, + { + "name": "auditd:SYSCALL", + "channel": "execution of tools like cat, grep, or awk on credential files" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of 'security', 'cat', or 'grep' commands accessing credential storage" + }, + { + "name": "linux:syslog", + "channel": "CLI access to 'show running-config', 'show password', or 'cat config.txt'" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of curl, rsync, wget with internal knowledge base or IPs" + }, + { + "name": "esxi:shell", + "channel": "/root/.ash_history" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of systemctl, loginctl, or systemd-inhibit commands related to sleep/hibernate" + }, + { + "name": "auditd:SYSCALL", + "channel": "Execution of xev, xdotool, or input activity emulators" + }, + { + "name": "macos:unifiedlog", + "channel": "launchctl load or boot-time plist registration" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of interpreters creating archive-like outputs without calling tar/gzip" + }, + { + "name": "networkdevice:syslog", + "channel": "command audit" + }, + { + "name": "networkdevice:cli", + "channel": "Interface commands" + }, + { + "name": "macos:unifiedlog", + "channel": "dscl -create" + }, + { + "name": "esxi:vmkernel", + "channel": "esxcli system account add" + }, + { + "name": "ebpf:syscalls", + "channel": "useradd or /etc/passwd modified inside container" + }, + { + "name": "auditd:SYSCALL", + "channel": "Execution of insmod, modprobe, or rmmod commands by non-standard users or outside expected timeframes" + }, + { + "name": "macos:unifiedlog", + "channel": "kextload execution from Terminal or suspicious paths" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "Execution of PowerShell without -NoProfile flag" + }, + { + "name": "auditd:EXECVE", + "channel": "Process execution of update-ca-certificates or openssl with suspicious arguments" + }, + { + "name": "macos:unifiedlog", + "channel": "xattr -d com.apple.quarantine or similar removal commands" + }, + { + "name": "azure:signinlogs", + "channel": "OperationName=SetDomainAuthentication OR Update-MsolFederatedDomain" + }, + { + "name": "linux:syslog", + "channel": "Sudo or root escalation followed by filesystem mount commands" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4101" + }, + { + "name": "networkdevice:cli", + "channel": "Execution of privileged commands such as 'copy tftp flash', 'boot system', or 'debug memory'" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve syscalls for discovery commands (uname, hostname, id, whoami, ps, netstat, mount) with command-line parameter analysis" + }, + { + "name": "auditd:PROCTITLE", + "channel": "process title records containing discovery command sequences and environmental assessment patterns" + }, + { + "name": "macos:unifiedlog", + "channel": "Security framework operations including keychain access, cryptographic operations, and certificate validation" + }, + { + "name": "m365:unified", + "channel": "Set-Mailbox, New-InboxRule" + }, + { + "name": "macos:unifiedlog", + "channel": "None" + }, + { + "name": "networkdevice:cli", + "channel": "Execution of commands disabling crypto hardware acceleration (e.g., 'no crypto engine enable')" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of curl, wget, or custom scripts accessing financial endpoints" + }, + { + "name": "auditd:EXECVE", + "channel": "Execution of chattr to set +i or +a attributes" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of chflags hidden or setfile -a V" + }, + { + "name": "esxi:shell", + "channel": "mv, rename, or chmod commands moving VM files into hidden directories" + }, + { + "name": "esxi:hostd", + "channel": "execution + payload hints" + }, + { + "name": "linux:osquery", + "channel": "process_events.command_line" + }, + { + "name": "macos:unifiedlog", + "channel": "process:spawn, process:exec" + }, + { + "name": "esxi:vobd", + "channel": "shell session start" + }, + { + "name": "networkdevice:cli", + "channel": "shell command" + }, + { + "name": "WinEventLog:Microsoft-Office-Alerts", + "channel": "Office application warning or alert on macro execution from template" + }, + { + "name": "m365:unified", + "channel": "Set-Mailbox, Set-MailboxPolicy, Set-TrustedLocation" + }, + { + "name": "m365:office", + "channel": "Execution of unsigned macro from template" + }, + { + "name": "linux:cli", + "channel": "Terminal Command History" + }, + { + "name": "macos:unifiedlog", + "channel": "csrutil disable" + }, + { + "name": "macos:unifiedlog", + "channel": "log show --predicate 'process == '" + }, + { + "name": "networkdevice:syslog", + "channel": "Privilege-level command execution" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of tar, gzip, bzip2, or openssl with output redirection" + }, + { + "name": "saas:PRMetadata", + "channel": "Commit message or branch name contains encoded strings or payload indicators" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of launchctl with setenv or bootout targeting TCC.db or AppleScript under Finder context" + }, + { + "name": "esxi:shell", + "channel": "`esxcli software vib install` with `--force` or `--no-sig-check` from shell history or `shell.log`" + }, + { + "name": "AWS:CloudTrail", + "channel": "SendCommand, StartSession, ExecuteCommand: Unexpected AWS Systems Manager command execution targeting EC2 instances" + }, + { + "name": "esxi:vmkernel", + "channel": "Unexpected restarts of management agents or shell access" + }, + { + "name": "auditd:EXECVE", + "channel": "curl or wget with POST/PUT options" + }, + { + "name": "networkdevice:syslog", + "channel": "Detected CLI command to export key material" + }, + { + "name": "networkdevice:config", + "channel": "PKI export or certificate manipulation commands" + }, + { + "name": "macos:unifiedlog", + "channel": "command execution triggered by emond (e.g., shell, curl, python)" + }, + { + "name": "esxi:vmkernel", + "channel": "esxcli, vim-cmd invocation" + }, + { + "name": "esxi:shell", + "channel": "CLI session activity" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve=/sbin/shutdown or /sbin/reboot" + }, + { + "name": "esxi:shell", + "channel": "esxcli system shutdown or reboot invoked" + }, + { + "name": "networkdevice:syslog", + "channel": "reload command issued" + }, + { + "name": "auditd:PROCTITLE", + "channel": "command-line execution patterns for system discovery utilities (uname, hostname, ifconfig, netstat, lsof, ps, mount)" + }, + { + "name": "esxi:shell", + "channel": "shell command execution for system discovery (vim-cmd, esxcli, vmware-cmd) targeting VM inventory and host configuration" + }, + { + "name": "vpxd.log", + "channel": "VM inventory queries and configuration enumeration through vCenter API calls" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve calls modifying HISTFILE or HISTCONTROL via unset/export" + }, + { + "name": "macos:unifiedlog", + "channel": "Set or unset HIST* variables in shell environment" + }, + { + "name": "esxi:shell", + "channel": "unset HISTFILE or HISTFILESIZE modifications" + }, + { + "name": "networkdevice:cli", + "channel": "Commands like 'no logging' or equivalents that disable session history" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve calls to /usr/bin/locale or shell execution of $LANG" + }, + { + "name": "macos:unifiedlog", + "channel": "defaults read -g AppleLocale or systemsetup -gettimezone" + }, + { + "name": "networkdevice:cli", + "channel": "Execution of commands such as 'copy tftp flash', 'boot system ', 'reload'" + }, + { + "name": "auditd:EXECVE", + "channel": "curl -T, rclone copy" + }, + { + "name": "auditd:SYSCALL", + "channel": "execution of systemctl or service with enable/start/modify" + }, + { + "name": "macos:unifiedlog", + "channel": "launchctl load/unload or plist file modification" + }, + { + "name": "networkdevice:syslog", + "channel": "syslog facility LOCAL7 or trap messages" + }, + { + "name": "linux:cli", + "channel": "/home/*/.bash_history" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of lsmod, modinfo, or cat /proc/modules" + }, + { + "name": "networkdevice:config", + "channel": "Configuration changes referencing 'boot system tftp' or modification of startup-config pointing to external TFTP servers" + }, + { + "name": "macos:unifiedlog", + "channel": "dscl . -create" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of commands like `ls -l@`, `xattr -l`, or custom tools interacting with resource forks" + }, + { + "name": "esxi:vpxd", + "channel": "vCenter Management" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "mobile-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:34.849000+00:00\"}, \"root['description']\": {\"new_value\": \"Command Execution involves monitoring and capturing the execution of textual commands (including shell commands, cmdlets, and scripts) within an operating system or application. These commands may include arguments or parameters and are typically executed through interpreters such as `cmd.exe`, `bash`, `zsh`, `PowerShell`, or programmatic execution. Examples: \\n\\n- Windows Command Prompt\\n - dir \\u2013 Lists directory contents.\\n - net user \\u2013 Queries or manipulates user accounts.\\n - tasklist \\u2013 Lists running processes.\\n- PowerShell\\n - Get-Process \\u2013 Retrieves processes running on a system.\\n - Set-ExecutionPolicy \\u2013 Changes PowerShell script execution policies.\\n - Invoke-WebRequest \\u2013 Downloads remote resources.\\n- Linux Shell\\n - ls \\u2013 Lists files in a directory.\\n - cat /etc/passwd \\u2013 Reads the user accounts file.\\n - curl http://malicious-site.com \\u2013 Retrieves content from a malicious URL.\\n- Container Environments\\n - docker exec \\u2013 Executes a command inside a running container.\\n - kubectl exec \\u2013 Runs commands in Kubernetes pods.\\n- macOS Terminal\\n - open \\u2013 Opens files or URLs.\\n - dscl . -list /Users \\u2013 Lists all users on the system.\\n - osascript -e \\u2013 Executes AppleScript commands.\", \"old_value\": \"Command Execution involves monitoring and capturing the execution of textual commands (including shell commands, cmdlets, and scripts) within an operating system or application. These commands may include arguments or parameters and are typically executed through interpreters such as `cmd.exe`, `bash`, `zsh`, `PowerShell`, or programmatic execution. Examples: \\n\\n- Windows Command Prompt\\n - dir \\u2013 Lists directory contents.\\n - net user \\u2013 Queries or manipulates user accounts.\\n - tasklist \\u2013 Lists running processes.\\n- PowerShell\\n - Get-Process \\u2013 Retrieves processes running on a system.\\n - Set-ExecutionPolicy \\u2013 Changes PowerShell script execution policies.\\n - Invoke-WebRequest \\u2013 Downloads remote resources.\\n- Linux Shell\\n - ls \\u2013 Lists files in a directory.\\n - cat /etc/passwd \\u2013 Reads the user accounts file.\\n - curl http://malicious-site.com \\u2013 Retrieves content from a malicious URL.\\n- Container Environments\\n - docker exec \\u2013 Executes a command inside a running container.\\n - kubectl exec \\u2013 Runs commands in Kubernetes pods.\\n- macOS Terminal\\n - open \\u2013 Opens files or URLs.\\n - dscl . -list /Users \\u2013 Lists all users on the system.\\n - osascript -e \\u2013 Executes AppleScript commands.\\n\\nThis data component can be collected through the following measures:\\n\\nEnable Command Logging\\n\\n- Windows:\\n - Enable PowerShell logging: `Set-ExecutionPolicy Bypass`, `Set-ItemProperty -Path \\\"HKLM:\\\\SOFTWARE\\\\Policies\\\\Microsoft\\\\Windows\\\\PowerShell\\\\ScriptBlockLogging\\\" -Name EnableScriptBlockLogging -Value 1`\\n - Enable Windows Event Logging:\\n - Event ID 4688: Tracks process creation, including command-line arguments.\\n - Event ID 4104: Logs PowerShell script block execution.\\n- Linux/macOS:\\n - Enable shell history logging in `.bashrc` or `.zshrc`: `export HISTTIMEFORMAT=\\\"%d/%m/%y %T \\\"`, `export PROMPT_COMMAND='history -a; history -w'`\\n - Use audit frameworks (e.g., `auditd`) to log command executions. Example rule to log all `execve` syscalls: `-a always,exit -F arch=b64 -S execve -k cmd_exec`\\n- Containers:\\n - Use runtime-specific tools like Docker\\u2019s --log-driver or Kubernetes Audit Logs to capture exec commands.\\n\\nIntegrate with Centralized Logging\\n\\n- Collect logs using a SIEM (e.g., Splunk) or cloud-based log aggregation tools like AWS CloudWatch or Azure Monitor. Example Splunk Search for Windows Event 4688:\\n`index=windows EventID=4688 CommandLine=*`\\n\\nUse Endpoint Detection and Response (EDR) Tools\\n\\n- Monitor command executions via EDR solutions \\n\\nDeploy Sysmon for Advanced Logging (Windows)\\n\\n- Use Sysmon's Event ID 1 to log process creation with command-line arguments\", \"diff\": \"--- \\n+++ \\n@@ -19,31 +19,3 @@\\n - open \\u2013 Opens files or URLs.\\n - dscl . -list /Users \\u2013 Lists all users on the system.\\n - osascript -e \\u2013 Executes AppleScript commands.\\n-\\n-This data component can be collected through the following measures:\\n-\\n-Enable Command Logging\\n-\\n-- Windows:\\n- - Enable PowerShell logging: `Set-ExecutionPolicy Bypass`, `Set-ItemProperty -Path \\\"HKLM:\\\\SOFTWARE\\\\Policies\\\\Microsoft\\\\Windows\\\\PowerShell\\\\ScriptBlockLogging\\\" -Name EnableScriptBlockLogging -Value 1`\\n- - Enable Windows Event Logging:\\n- - Event ID 4688: Tracks process creation, including command-line arguments.\\n- - Event ID 4104: Logs PowerShell script block execution.\\n-- Linux/macOS:\\n- - Enable shell history logging in `.bashrc` or `.zshrc`: `export HISTTIMEFORMAT=\\\"%d/%m/%y %T \\\"`, `export PROMPT_COMMAND='history -a; history -w'`\\n- - Use audit frameworks (e.g., `auditd`) to log command executions. Example rule to log all `execve` syscalls: `-a always,exit -F arch=b64 -S execve -k cmd_exec`\\n-- Containers:\\n- - Use runtime-specific tools like Docker\\u2019s --log-driver or Kubernetes Audit Logs to capture exec commands.\\n-\\n-Integrate with Centralized Logging\\n-\\n-- Collect logs using a SIEM (e.g., Splunk) or cloud-based log aggregation tools like AWS CloudWatch or Azure Monitor. Example Splunk Search for Windows Event 4688:\\n-`index=windows EventID=4688 CommandLine=*`\\n-\\n-Use Endpoint Detection and Response (EDR) Tools\\n-\\n-- Monitor command executions via EDR solutions \\n-\\n-Deploy Sysmon for Advanced Logging (Windows)\\n-\\n-- Use Sysmon's Event ID 1 to log process creation with command-line arguments\"}, \"root['x_mitre_log_sources'][4]['channel']\": {\"new_value\": \"cron activity\", \"old_value\": \"/var/log/syslog or journalctl\"}, \"root['x_mitre_log_sources'][10]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}, \"root['x_mitre_log_sources'][35]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}, \"root['x_mitre_log_sources'][226]['name']\": {\"new_value\": \"azure:signinlogs\", \"old_value\": \"azure:signinLogs\", \"new_path\": \"root['x_mitre_log_sources'][222]['name']\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][36]\": {\"name\": \"WinEventLog:Powershell\", \"channel\": \"EventCode=4104\"}, \"root['x_mitre_log_sources'][66]\": {\"name\": \"WinEventLog:PowerShell\", \"channel\": \"EventCode=4103,4104\"}, \"root['x_mitre_log_sources'][90]\": {\"name\": \"WinEventLog:PowerShell\", \"channel\": \"EventCode=4103\"}, \"root['x_mitre_log_sources'][212]\": {\"name\": \"WinEventLog:PowerShell\", \"channel\": \"EventCode=4103,4104,4105, 4106\"}, \"root['x_mitre_log_sources'][230]\": {\"name\": \"WinEventLog:PowerShell\", \"channel\": \"EventCode=4105\"}, \"root['x_mitre_log_sources'][231]\": {\"name\": \"WinEventLog:PowerShell\", \"channel\": \"EventCode=4106\"}, \"root['x_mitre_log_sources'][269]\": {\"name\": \"WinEventLog:PowerShell\", \"channel\": \"EventCode=4103, 4104\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Command Execution involves monitoring and capturing the exect1Command Execution involves monitoring and capturing the exec
>ution of textual commands (including shell commands, cmdlets>ution of textual commands (including shell commands, cmdlets
>, and scripts) within an operating system or application. Th>, and scripts) within an operating system or application. Th
>ese commands may include arguments or parameters and are typ>ese commands may include arguments or parameters and are typ
>ically executed through interpreters such as `cmd.exe`, `bas>ically executed through interpreters such as `cmd.exe`, `bas
>h`, `zsh`, `PowerShell`, or programmatic execution. Examples>h`, `zsh`, `PowerShell`, or programmatic execution. Examples
>:   - Windows Command Prompt     - dir \u2013 Lists directory con>:   - Windows Command Prompt     - dir \u2013 Lists directory con
>tents.     - net user \u2013 Queries or manipulates user accounts>tents.     - net user \u2013 Queries or manipulates user accounts
>.     - tasklist \u2013 Lists running processes. - PowerShell    >.     - tasklist \u2013 Lists running processes. - PowerShell    
> - Get-Process \u2013 Retrieves processes running on a system.   > - Get-Process \u2013 Retrieves processes running on a system.   
>  - Set-ExecutionPolicy \u2013 Changes PowerShell script executio>  - Set-ExecutionPolicy \u2013 Changes PowerShell script executio
>n policies.     - Invoke-WebRequest \u2013 Downloads remote resou>n policies.     - Invoke-WebRequest \u2013 Downloads remote resou
>rces. - Linux Shell     - ls \u2013 Lists files in a directory.  >rces. - Linux Shell     - ls \u2013 Lists files in a directory.  
>   - cat /etc/passwd \u2013 Reads the user accounts file.     - c>   - cat /etc/passwd \u2013 Reads the user accounts file.     - c
>url http://malicious-site.com \u2013 Retrieves content from a mal>url http://malicious-site.com \u2013 Retrieves content from a mal
>icious URL. - Container Environments     - docker exec \u2013 Exe>icious URL. - Container Environments     - docker exec \u2013 Exe
>cutes a command inside a running container.     - kubectl ex>cutes a command inside a running container.     - kubectl ex
>ec \u2013 Runs commands in Kubernetes pods. - macOS Terminal     >ec \u2013 Runs commands in Kubernetes pods. - macOS Terminal     
>- open \u2013 Opens files or URLs.     - dscl . -list /Users \u2013 Li>- open \u2013 Opens files or URLs.     - dscl . -list /Users \u2013 Li
>sts all users on the system.     - osascript -e \u2013 Executes A>sts all users on the system.     - osascript -e \u2013 Executes A
>ppleScript commands.  This data component can be collected t>ppleScript commands.
>hrough the following measures:  Enable Command Logging  - Wi 
>ndows:     - Enable PowerShell logging: `Set-ExecutionPolicy 
> Bypass`, `Set-ItemProperty -Path \"HKLM:\\SOFTWARE\\Policies\\M 
>icrosoft\\Windows\\PowerShell\\ScriptBlockLogging\" -Name Enable 
>ScriptBlockLogging -Value 1`     - Enable Windows Event Logg 
>ing:         - Event ID 4688: Tracks process creation, inclu 
>ding command-line arguments.         - Event ID 4104: Logs P 
>owerShell script block execution. - Linux/macOS:     - Enabl 
>e shell history logging in `.bashrc` or `.zshrc`: `export HI 
>STTIMEFORMAT=\"%d/%m/%y %T \"`, `export PROMPT_COMMAND='histor 
>y -a; history -w'`     - Use audit frameworks (e.g., `auditd 
>`) to log command executions. Example rule to log all `execv 
>e` syscalls: `-a always,exit -F arch=b64 -S execve -k cmd_ex 
>ec` - Containers:     - Use runtime-specific tools like Dock 
>er\u2019s --log-driver or Kubernetes Audit Logs to capture exec c 
>ommands.  Integrate with Centralized Logging  - Collect logs 
> using a SIEM (e.g., Splunk) or cloud-based log aggregation  
>tools like AWS CloudWatch or Azure Monitor. Example Splunk S 
>earch for Windows Event 4688: `index=windows EventID=4688 Co 
>mmandLine=*`  Use Endpoint Detection and Response (EDR) Tool 
>s  - Monitor command executions via EDR solutions   Deploy S 
>ysmon for Advanced Logging (Windows)  - Use Sysmon's Event I 
>D 1 to log process creation with command-line arguments 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--a5ae90ca-0c4b-481c-959f-0eb18a7ff953", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.274000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0072", + "external_id": "DC0072" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Container Creation", + "description": "\"Container Creation\" data component captures details about the initial construction of a container in a containerized environment. This includes events where a new container is instantiated, such as through Docker, Kubernetes, or other container orchestration platforms. Monitoring these events helps detect unauthorized or potentially malicious container creation. Examples:\n\n- Docker Example: `docker create my-container`, `docker run --name=my-container nginx:latest`\n- Kubernetes Example: `kubectl run my-pod --image=nginx`, `kubectl create deployment my-deployment --image=nginx`\n- Cloud Container Services Example\n - AWS ECS: Task or service creation (`RunTask` or `CreateService`).\n - Azure Container Instances: Deployment of a container group.\n - Google Kubernetes Engine (GKE): Creation of new pods via GCP APIs.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "kubernetes:apiserver", + "channel": "create/exec: Kubernetes API calls to exec into containers or create pods from curl, kubectl, or SDK clients" + }, + { + "name": "kubernetes:events", + "channel": "container start/stop activity via Docker, containerd, or CRI-O" + }, + { + "name": "docker:daemon", + "channel": "container create/start with privileged flag or host volume mount" + }, + { + "name": "kubernetes:audit", + "channel": "create: Pod/Container created with image tag 'latest' or mutable tag; imagePullPolicy=Always; noDigest=true" + }, + { + "name": "systemd:unit", + "channel": "container run with restart policy set to 'always' or 'unless-stopped'" + }, + { + "name": "docker:events", + "channel": "created,started: new container from untrusted registry or unexpected entrypoint" + }, + { + "name": "containerd:events", + "channel": "create" + }, + { + "name": "docker:events", + "channel": "docker run with restart=always or modifying init" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:37.681000+00:00\"}, \"root['description']\": {\"new_value\": \"\\\"Container Creation\\\" data component captures details about the initial construction of a container in a containerized environment. This includes events where a new container is instantiated, such as through Docker, Kubernetes, or other container orchestration platforms. Monitoring these events helps detect unauthorized or potentially malicious container creation. Examples:\\n\\n- Docker Example: `docker create my-container`, `docker run --name=my-container nginx:latest`\\n- Kubernetes Example: `kubectl run my-pod --image=nginx`, `kubectl create deployment my-deployment --image=nginx`\\n- Cloud Container Services Example\\n - AWS ECS: Task or service creation (`RunTask` or `CreateService`).\\n - Azure Container Instances: Deployment of a container group.\\n - Google Kubernetes Engine (GKE): Creation of new pods via GCP APIs.\", \"old_value\": \"\\\"Container Creation\\\" data component captures details about the initial construction of a container in a containerized environment. This includes events where a new container is instantiated, such as through Docker, Kubernetes, or other container orchestration platforms. Monitoring these events helps detect unauthorized or potentially malicious container creation. Examples:\\n\\n- Docker Example: `docker create my-container`, `docker run --name=my-container nginx:latest`\\n- Kubernetes Example: `kubectl run my-pod --image=nginx`, `kubectl create deployment my-deployment --image=nginx`\\n- Cloud Container Services Example\\n - AWS ECS: Task or service creation (`RunTask` or `CreateService`).\\n - Azure Container Instances: Deployment of a container group.\\n - Google Kubernetes Engine (GKE): Creation of new pods via GCP APIs.\\n\\nThis data component can be collected through the following measures:\\n\\n- Docker Audit Logging: Enable Docker daemon logging to capture `create` commands. Configure the Docker daemon to use a log driver such as `syslog` or `json-file`.\\n- Kubernetes Audit Logs: Enable Kubernetes API server audit logging:\\n- Cloud Provider Logs\\n - AWS CloudTrail: Enable logging for ECS `RunTask` or `CreateService` events.\\n - Azure Monitor: Enable activity logging for container group creation.\\n - GCP Cloud Logging: Monitor API calls such as `container.projects.zones.clusters.create`.\\n- SIEM Integration: Use a SIEM to collect logs from Docker, Kubernetes, or cloud platforms.\", \"diff\": \"--- \\n+++ \\n@@ -6,13 +6,3 @@\\n - AWS ECS: Task or service creation (`RunTask` or `CreateService`).\\n - Azure Container Instances: Deployment of a container group.\\n - Google Kubernetes Engine (GKE): Creation of new pods via GCP APIs.\\n-\\n-This data component can be collected through the following measures:\\n-\\n-- Docker Audit Logging: Enable Docker daemon logging to capture `create` commands. Configure the Docker daemon to use a log driver such as `syslog` or `json-file`.\\n-- Kubernetes Audit Logs: Enable Kubernetes API server audit logging:\\n-- Cloud Provider Logs\\n- - AWS CloudTrail: Enable logging for ECS `RunTask` or `CreateService` events.\\n- - Azure Monitor: Enable activity logging for container group creation.\\n- - GCP Cloud Logging: Monitor API calls such as `container.projects.zones.clusters.create`.\\n-- SIEM Integration: Use a SIEM to collect logs from Docker, Kubernetes, or cloud platforms.\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1\"Container Creation\" data component captures details about tt1\"Container Creation\" data component captures details about t
>he initial construction of a container in a containerized en>he initial construction of a container in a containerized en
>vironment. This includes events where a new container is ins>vironment. This includes events where a new container is ins
>tantiated, such as through Docker, Kubernetes, or other cont>tantiated, such as through Docker, Kubernetes, or other cont
>ainer orchestration platforms. Monitoring these events helps>ainer orchestration platforms. Monitoring these events helps
> detect unauthorized or potentially malicious container crea> detect unauthorized or potentially malicious container crea
>tion. Examples:  - Docker Example: `docker create my-contain>tion. Examples:  - Docker Example: `docker create my-contain
>er`, `docker run --name=my-container nginx:latest` - Kuberne>er`, `docker run --name=my-container nginx:latest` - Kuberne
>tes Example: `kubectl run my-pod --image=nginx`, `kubectl cr>tes Example: `kubectl run my-pod --image=nginx`, `kubectl cr
>eate deployment my-deployment --image=nginx` - Cloud Contain>eate deployment my-deployment --image=nginx` - Cloud Contain
>er Services Example     - AWS ECS: Task or service creation >er Services Example     - AWS ECS: Task or service creation 
>(`RunTask` or `CreateService`).     - Azure Container Instan>(`RunTask` or `CreateService`).     - Azure Container Instan
>ces: Deployment of a container group.     - Google Kubernete>ces: Deployment of a container group.     - Google Kubernete
>s Engine (GKE): Creation of new pods via GCP APIs.  This dat>s Engine (GKE): Creation of new pods via GCP APIs.
>a component can be collected through the following measures: 
>  - Docker Audit Logging: Enable Docker daemon logging to ca 
>pture `create` commands. Configure the Docker daemon to use  
>a log driver such as `syslog` or `json-file`. - Kubernetes A 
>udit Logs: Enable Kubernetes API server audit logging: - Clo 
>ud Provider Logs     - AWS CloudTrail: Enable logging for EC 
>S `RunTask` or `CreateService` events.     - Azure Monitor:  
>Enable activity logging for container group creation.     -  
>GCP Cloud Logging: Monitor API calls such as `container.proj 
>ects.zones.clusters.create`. - SIEM Integration: Use a SIEM  
>to collect logs from Docker, Kubernetes, or cloud platforms. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--91b3ed33-d1b5-4c4b-a896-76c55eb3cfd8", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.274000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0091", + "external_id": "DC0091" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Container Enumeration", + "description": "\"Container Enumeration\" data component captures events and actions related to listing and identifying active or available containers within a containerized environment. This includes information about running, stopped, or configured containers, such as their names, IDs, statuses, or associated images. Monitoring this activity is crucial for detecting unauthorized discovery or reconnaissance efforts. Examples: \n\n- Docker Example: `docker ps`, `docker ps -a`\n- Kubernetes Example: `kubectl get pods`, `kubectl get deployments`\n- Cloud Container Services Example\n - AWS ECS: API Call: ListTasks or ListContainers\n - Azure Kubernetes Service: API Call: List pod or container instances.\n - Google Kubernetes Engine (GKE): API Call: Retrieve deployments and their associated containers.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "docker:daemon", + "channel": "docker ps, docker inspect, or docker images commands" + }, + { + "name": "AWS:CloudTrail", + "channel": "DescribeCluster, ListClusters, ListNodegroups" + }, + { + "name": "containerd:runtime", + "channel": "e.g., containerd, Docker events" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:40.609000+00:00\"}, \"root['description']\": {\"new_value\": \"\\\"Container Enumeration\\\" data component captures events and actions related to listing and identifying active or available containers within a containerized environment. This includes information about running, stopped, or configured containers, such as their names, IDs, statuses, or associated images. Monitoring this activity is crucial for detecting unauthorized discovery or reconnaissance efforts. Examples: \\n\\n- Docker Example: `docker ps`, `docker ps -a`\\n- Kubernetes Example: `kubectl get pods`, `kubectl get deployments`\\n- Cloud Container Services Example\\n - AWS ECS: API Call: ListTasks or ListContainers\\n - Azure Kubernetes Service: API Call: List pod or container instances.\\n - Google Kubernetes Engine (GKE): API Call: Retrieve deployments and their associated containers.\", \"old_value\": \"\\\"Container Enumeration\\\" data component captures events and actions related to listing and identifying active or available containers within a containerized environment. This includes information about running, stopped, or configured containers, such as their names, IDs, statuses, or associated images. Monitoring this activity is crucial for detecting unauthorized discovery or reconnaissance efforts. Examples: \\n\\n- Docker Example: `docker ps`, `docker ps -a`\\n- Kubernetes Example: `kubectl get pods`, `kubectl get deployments`\\n- Cloud Container Services Example\\n - AWS ECS: API Call: ListTasks or ListContainers\\n - Azure Kubernetes Service: API Call: List pod or container instances.\\n - Google Kubernetes Engine (GKE): API Call: Retrieve deployments and their associated containers.\\n\\nThis data component can be collected through the following measures:\\n\\n- Docker Audit Logging: Enable Docker daemon logging to capture enumeration commands. Use tools like auditd to monitor terminal activity involving docker ps or similar commands.\\n- Kubernetes Audit Logs: Enable Kubernetes API server audit logging. Capture events where users query resources such as pods, deployments, or services.\\n- Cloud Provider Logs\\n - AWS CloudTrail: Enable logging for API calls like ListTasks or DescribeTasks.\\n - Azure Monitor: Enable activity logging to track container-related queries.\\n - GCP Cloud Logging: Track API events involving container enumerations or deployments.\\n- SIEM Integration: Collect logs from Docker, Kubernetes, and cloud services for centralized analysis.\", \"diff\": \"--- \\n+++ \\n@@ -6,13 +6,3 @@\\n - AWS ECS: API Call: ListTasks or ListContainers\\n - Azure Kubernetes Service: API Call: List pod or container instances.\\n - Google Kubernetes Engine (GKE): API Call: Retrieve deployments and their associated containers.\\n-\\n-This data component can be collected through the following measures:\\n-\\n-- Docker Audit Logging: Enable Docker daemon logging to capture enumeration commands. Use tools like auditd to monitor terminal activity involving docker ps or similar commands.\\n-- Kubernetes Audit Logs: Enable Kubernetes API server audit logging. Capture events where users query resources such as pods, deployments, or services.\\n-- Cloud Provider Logs\\n- - AWS CloudTrail: Enable logging for API calls like ListTasks or DescribeTasks.\\n- - Azure Monitor: Enable activity logging to track container-related queries.\\n- - GCP Cloud Logging: Track API events involving container enumerations or deployments.\\n-- SIEM Integration: Collect logs from Docker, Kubernetes, and cloud services for centralized analysis.\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1\"Container Enumeration\" data component captures events and at1\"Container Enumeration\" data component captures events and a
>ctions related to listing and identifying active or availabl>ctions related to listing and identifying active or availabl
>e containers within a containerized environment. This includ>e containers within a containerized environment. This includ
>es information about running, stopped, or configured contain>es information about running, stopped, or configured contain
>ers, such as their names, IDs, statuses, or associated image>ers, such as their names, IDs, statuses, or associated image
>s. Monitoring this activity is crucial for detecting unautho>s. Monitoring this activity is crucial for detecting unautho
>rized discovery or reconnaissance efforts. Examples:   - Doc>rized discovery or reconnaissance efforts. Examples:   - Doc
>ker Example: `docker ps`, `docker ps -a` - Kubernetes Exampl>ker Example: `docker ps`, `docker ps -a` - Kubernetes Exampl
>e: `kubectl get pods`, `kubectl get deployments` - Cloud Con>e: `kubectl get pods`, `kubectl get deployments` - Cloud Con
>tainer Services Example     - AWS ECS: API Call: ListTasks o>tainer Services Example     - AWS ECS: API Call: ListTasks o
>r ListContainers     - Azure Kubernetes Service: API Call: L>r ListContainers     - Azure Kubernetes Service: API Call: L
>ist pod or container instances.     - Google Kubernetes Engi>ist pod or container instances.     - Google Kubernetes Engi
>ne (GKE): API Call: Retrieve deployments and their associate>ne (GKE): API Call: Retrieve deployments and their associate
>d containers.  This data component can be collected through >d containers.
>the following measures:  - Docker Audit Logging: Enable Dock 
>er daemon logging to capture enumeration commands. Use tools 
> like auditd to monitor terminal activity involving docker p 
>s or similar commands. - Kubernetes Audit Logs: Enable Kuber 
>netes API server audit logging. Capture events where users q 
>uery resources such as pods, deployments, or services. - Clo 
>ud Provider Logs     - AWS CloudTrail: Enable logging for AP 
>I calls like ListTasks or DescribeTasks.     - Azure Monitor 
>: Enable activity logging to track container-related queries 
>.     - GCP Cloud Logging: Track API events involving contai 
>ner enumerations or deployments. - SIEM Integration: Collect 
> logs from Docker, Kubernetes, and cloud services for centra 
>lized analysis. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--73ff2dcc-24b1-4368-b9dc-706dd9e68354", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.273000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0054", + "external_id": "DC0054" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Drive Access", + "description": "Refers to the act of accessing a data storage device, such as a hard drive, SSD, USB, or network-mounted drive. This data component logs the opening or mounting of drives, capturing activities such as reading, writing, or executing files within an assigned drive letter (e.g., `C:\\`, `/mnt/drive`) or mount point. Examples: \n\n- Removable Drive Insertion: A USB drive is inserted, assigned the letter `F:\\`, and files are accessed.\n- Network Drive Mounting: A network share `\\\\server\\share` is mapped to the drive `Z:\\`.\n- External Hard Drive Access: An external drive is connected, mounted at `/mnt/backup`, and accessed for copying files.\n- System Volume Access: The system volume `C:\\` is accessed for modifications to critical files.\n- Cloud-Synced Drives: Cloud storage drives like OneDrive or Google Drive are accessed via local mounts.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "WinEventLog:Sysmon", + "channel": "EventCode=9" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/write syscalls on /dev/sd* or /dev/nvme*" + }, + { + "name": "auditd:SYSCALL", + "channel": "write syscalls to /dev/sd* targeting offset 0" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/write syscalls to block devices (/dev/sd*, /dev/nvme*)" + }, + { + "name": "linux:syslog", + "channel": "mount/umount or file copy logs" + }, + { + "name": "fs:fsusage", + "channel": "open/read/mount operations" + }, + { + "name": "linux:osquery", + "channel": "hardware_events" + }, + { + "name": "macos:osquery", + "channel": "usb_devices" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:38.086000+00:00\"}, \"root['description']\": {\"new_value\": \"Refers to the act of accessing a data storage device, such as a hard drive, SSD, USB, or network-mounted drive. This data component logs the opening or mounting of drives, capturing activities such as reading, writing, or executing files within an assigned drive letter (e.g., `C:\\\\`, `/mnt/drive`) or mount point. Examples: \\n\\n- Removable Drive Insertion: A USB drive is inserted, assigned the letter `F:\\\\`, and files are accessed.\\n- Network Drive Mounting: A network share `\\\\\\\\server\\\\share` is mapped to the drive `Z:\\\\`.\\n- External Hard Drive Access: An external drive is connected, mounted at `/mnt/backup`, and accessed for copying files.\\n- System Volume Access: The system volume `C:\\\\` is accessed for modifications to critical files.\\n- Cloud-Synced Drives: Cloud storage drives like OneDrive or Google Drive are accessed via local mounts.\", \"old_value\": \"Refers to the act of accessing a data storage device, such as a hard drive, SSD, USB, or network-mounted drive. This data component logs the opening or mounting of drives, capturing activities such as reading, writing, or executing files within an assigned drive letter (e.g., `C:\\\\`, `/mnt/drive`) or mount point. Examples: \\n\\n- Removable Drive Insertion: A USB drive is inserted, assigned the letter `F:\\\\`, and files are accessed.\\n- Network Drive Mounting: A network share `\\\\\\\\server\\\\share` is mapped to the drive `Z:\\\\`.\\n- External Hard Drive Access: An external drive is connected, mounted at `/mnt/backup`, and accessed for copying files.\\n- System Volume Access: The system volume `C:\\\\` is accessed for modifications to critical files.\\n- Cloud-Synced Drives: Cloud storage drives like OneDrive or Google Drive are accessed via local mounts.\\n\\nThis data component can be collected through the following measures:\\n\\nWindows Event Logs\\n- Relevant Events:\\n - Event ID 4663: Logs access to file or folder objects.\\n - Event ID 4656: Tracks a handle to an object like a drive or file.\\n- Configuration:\\n - Enable auditing for \\\"Object Access\\\" in Local Security Policy.\\n - Use Group Policy for broader deployment: `Computer Configuration > Windows Settings > Security Settings > Advanced Audit Policy Configuration > Object Access`\\n\\nLinux System Logs\\n\\n- Command-Line Monitoring: Use the `dmesg` or `journalctl` command to monitor drive mount/unmount events.\\n- Auditd Configuration: Add an audit rule for drive access: `auditctl -w /mnt/drive -p rwxa -k drive_access`\\n- Review logs via `/var/log/audit/audit.log`.\\n\\nmacOS System Logs\\n\\n- Command-Line Monitoring: Use `diskutil list` or `fs_usage` to monitor drive access and mount points.\\n- Unified Logs: Query unified logs using log show for drive-related activities: `log show --info | grep \\\"mount\\\"`\\n\\nEndpoint Detection and Response (EDR) Tools\\n\\n- Use EDR solutions to monitor drive activities and collect detailed forensic data.\\n\\nSIEM Tools\\n\\n- Ingest logs from endpoints to detect drive access patterns. Configure rules to alert on unusual or unauthorized drive access.\", \"diff\": \"--- \\n+++ \\n@@ -5,32 +5,3 @@\\n - External Hard Drive Access: An external drive is connected, mounted at `/mnt/backup`, and accessed for copying files.\\n - System Volume Access: The system volume `C:\\\\` is accessed for modifications to critical files.\\n - Cloud-Synced Drives: Cloud storage drives like OneDrive or Google Drive are accessed via local mounts.\\n-\\n-This data component can be collected through the following measures:\\n-\\n-Windows Event Logs\\n-- Relevant Events:\\n- - Event ID 4663: Logs access to file or folder objects.\\n- - Event ID 4656: Tracks a handle to an object like a drive or file.\\n-- Configuration:\\n- - Enable auditing for \\\"Object Access\\\" in Local Security Policy.\\n- - Use Group Policy for broader deployment: `Computer Configuration > Windows Settings > Security Settings > Advanced Audit Policy Configuration > Object Access`\\n-\\n-Linux System Logs\\n-\\n-- Command-Line Monitoring: Use the `dmesg` or `journalctl` command to monitor drive mount/unmount events.\\n-- Auditd Configuration: Add an audit rule for drive access: `auditctl -w /mnt/drive -p rwxa -k drive_access`\\n-- Review logs via `/var/log/audit/audit.log`.\\n-\\n-macOS System Logs\\n-\\n-- Command-Line Monitoring: Use `diskutil list` or `fs_usage` to monitor drive access and mount points.\\n-- Unified Logs: Query unified logs using log show for drive-related activities: `log show --info | grep \\\"mount\\\"`\\n-\\n-Endpoint Detection and Response (EDR) Tools\\n-\\n-- Use EDR solutions to monitor drive activities and collect detailed forensic data.\\n-\\n-SIEM Tools\\n-\\n-- Ingest logs from endpoints to detect drive access patterns. Configure rules to alert on unusual or unauthorized drive access.\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Refers to the act of accessing a data storage device, such at1Refers to the act of accessing a data storage device, such a
>s a hard drive, SSD, USB, or network-mounted drive. This dat>s a hard drive, SSD, USB, or network-mounted drive. This dat
>a component logs the opening or mounting of drives, capturin>a component logs the opening or mounting of drives, capturin
>g activities such as reading, writing, or executing files wi>g activities such as reading, writing, or executing files wi
>thin an assigned drive letter (e.g., `C:\\`, `/mnt/drive`) or>thin an assigned drive letter (e.g., `C:\\`, `/mnt/drive`) or
> mount point. Examples:   - Removable Drive Insertion: A USB> mount point. Examples:   - Removable Drive Insertion: A USB
> drive is inserted, assigned the letter `F:\\`, and files are> drive is inserted, assigned the letter `F:\\`, and files are
> accessed. - Network Drive Mounting: A network share `\\\\serv> accessed. - Network Drive Mounting: A network share `\\\\serv
>er\\share` is mapped to the drive `Z:\\`. - External Hard Driv>er\\share` is mapped to the drive `Z:\\`. - External Hard Driv
>e Access: An external drive is connected, mounted at `/mnt/b>e Access: An external drive is connected, mounted at `/mnt/b
>ackup`, and accessed for copying files. - System Volume Acce>ackup`, and accessed for copying files. - System Volume Acce
>ss: The system volume `C:\\` is accessed for modifications to>ss: The system volume `C:\\` is accessed for modifications to
> critical files. - Cloud-Synced Drives: Cloud storage drives> critical files. - Cloud-Synced Drives: Cloud storage drives
> like OneDrive or Google Drive are accessed via local mounts> like OneDrive or Google Drive are accessed via local mounts
>.  This data component can be collected through the followin>.
>g measures:  Windows Event Logs - Relevant Events:     - Eve 
>nt ID 4663: Logs access to file or folder objects.     - Eve 
>nt ID 4656: Tracks a handle to an object like a drive or fil 
>e. - Configuration:     - Enable auditing for \"Object Access 
>\" in Local Security Policy.     - Use Group Policy for broad 
>er deployment: `Computer Configuration > Windows Settings >  
>Security Settings > Advanced Audit Policy Configuration > Ob 
>ject Access`  Linux System Logs  - Command-Line Monitoring:  
>Use the `dmesg` or `journalctl` command to monitor drive mou 
>nt/unmount events. - Auditd Configuration: Add an audit rule 
> for drive access: `auditctl -w /mnt/drive -p rwxa -k drive_ 
>access` - Review logs via `/var/log/audit/audit.log`.  macOS 
> System Logs  - Command-Line Monitoring: Use `diskutil list` 
> or `fs_usage` to monitor drive access and mount points. - U 
>nified Logs: Query unified logs using log show for drive-rel 
>ated activities: `log show --info | grep \"mount\"`  Endpoint  
>Detection and Response (EDR) Tools  - Use EDR solutions to m 
>onitor drive activities and collect detailed forensic data.  
> SIEM Tools  - Ingest logs from endpoints to detect drive ac 
>cess patterns. Configure rules to alert on unusual or unauth 
>orized drive access. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--3d6e6b3b-4aa8-40e1-8c47-91db0f313d9f", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.273000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0042", + "external_id": "DC0042" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Drive Creation", + "description": "The activity of assigning a new drive letter or creating a mount point for a data storage device, such as a USB, network share, or external hard drive, enabling access to its content on a host system. Examples: \n\n- USB Drive Insertion: A USB drive is plugged in and automatically assigned the letter `E:\\` on a Windows machine.\n- Network Drive Mapping: A network share `\\\\server\\share` is mapped to the drive `Z:\\`.\n- Virtual Drive Creation: A virtual disk is mounted on `/mnt/virtualdrive` using an ISO image or a virtual hard disk (VHD).\n- Cloud Storage Mounting: Google Drive is mounted as `G:\\` on a Windows machine using a cloud sync tool.\n- External Storage Integration: An external HDD or SSD is connected and assigned `/mnt/external` on a Linux system..", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Drive", + "channel": "None" + }, + { + "name": "WinEventLog:System", + "channel": "Kernel-PnP 410/400 device install, disk added" + }, + { + "name": "auditd:SYSCALL", + "channel": "mknod,open,openat" + }, + { + "name": "macos:unifiedlog", + "channel": "mounted|appeared|DA: disk* attached" + }, + { + "name": "WinEventLog:System", + "channel": "EventCode=1006" + }, + { + "name": "auditd:SYSCALL", + "channel": "Removable media mount notification" + }, + { + "name": "macos:unifiedlog", + "channel": "com.apple.diskarbitration" + }, + { + "name": "WinEventLog:System", + "channel": "EventCode=1006, 10001" + }, + { + "name": "auditd:SYSCALL", + "channel": "device event logs" + }, + { + "name": "linux:osquery", + "channel": "mount_events" + }, + { + "name": "macos:unifiedlog", + "channel": "Volume Mount + File Read" + }, + { + "name": "WinEventLog:System", + "channel": "EventCode=2003" + }, + { + "name": "auditd:SYSCALL", + "channel": "udev events or drive enumeration involving TinyPilot paths or device classes" + }, + { + "name": "linux:syslog", + "channel": "Device attach logs containing TinyPilot/PiKVM identifiers" + }, + { + "name": "macos:unifiedlog", + "channel": "Hardware enumeration events via IOKit or USBMuxd showing TinyPilot or unknown keyboard/mouse" + }, + { + "name": "auditd:SYSCALL", + "channel": "Kernel Device Events - USB Block Devices" + }, + { + "name": "maos:osquery", + "channel": "mount_events" + }, + { + "name": "macos:unifiedlog", + "channel": "Volume Mount + Process Trace + File Read" + }, + { + "name": "journald:systemd", + "channel": "udisks2 or udevd logs" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream --predicate 'eventMessage contains \"USBMSC\"'" + }, + { + "name": "linux:syslog", + "channel": "New HID device enumeration with type 'keyboard' followed by immediate input injection" + }, + { + "name": "macos:unifiedlog", + "channel": "New IOUSB keyboard/HID device enumerated with suspicious attributes" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:37.342000+00:00\"}, \"root['description']\": {\"new_value\": \"The activity of assigning a new drive letter or creating a mount point for a data storage device, such as a USB, network share, or external hard drive, enabling access to its content on a host system. Examples: \\n\\n- USB Drive Insertion: A USB drive is plugged in and automatically assigned the letter `E:\\\\` on a Windows machine.\\n- Network Drive Mapping: A network share `\\\\\\\\server\\\\share` is mapped to the drive `Z:\\\\`.\\n- Virtual Drive Creation: A virtual disk is mounted on `/mnt/virtualdrive` using an ISO image or a virtual hard disk (VHD).\\n- Cloud Storage Mounting: Google Drive is mounted as `G:\\\\` on a Windows machine using a cloud sync tool.\\n- External Storage Integration: An external HDD or SSD is connected and assigned `/mnt/external` on a Linux system..\", \"old_value\": \"The activity of assigning a new drive letter or creating a mount point for a data storage device, such as a USB, network share, or external hard drive, enabling access to its content on a host system. Examples: \\n\\n- USB Drive Insertion: A USB drive is plugged in and automatically assigned the letter `E:\\\\` on a Windows machine.\\n- Network Drive Mapping: A network share `\\\\\\\\server\\\\share` is mapped to the drive `Z:\\\\`.\\n- Virtual Drive Creation: A virtual disk is mounted on `/mnt/virtualdrive` using an ISO image or a virtual hard disk (VHD).\\n- Cloud Storage Mounting: Google Drive is mounted as `G:\\\\` on a Windows machine using a cloud sync tool.\\n- External Storage Integration: An external HDD or SSD is connected and assigned `/mnt/external` on a Linux system.\\n\\nThis data component can be collected through the following measures:\\n\\nWindows Event Logs\\n\\n- Relevant Events:\\n - Event ID 98: Logs the creation of a volume (mount or new drive letter assignment).\\n - Event ID 1006: Logs removable storage device insertions.\\n- Configuration: Enable \\\"Removable Storage Events\\\" in the Group Policy settings:\\n`Computer Configuration > Administrative Templates > System > Removable Storage Access`\\n\\nLinux System Logs\\n\\n- Command-Line Monitoring: Use `dmesg` or `journalctl` to monitor mount events.\\n\\n- Auditd Configuration: Add audit rules to track mount points.\\n- Logs can be reviewed in /var/log/audit/audit.log.\\n\\nmacOS System Logs\\n\\n- Unified Logs: Monitor system logs for mount activity:\\n- Command-Line Tools: Use `diskutil list` to verify newly created or mounted drives.\\n\\nEndpoint Detection and Response (EDR) Tools\\n\\n- EDR solutions can log removable drive usage and network-mounted drives. Configure EDR policies to alert on suspicious drive creation events.\\n\\nSIEM Tools\\n\\n- Centralize logs from multiple platforms into a SIEM (e.g., Splunk) to correlate and alert on suspicious drive creation activities.\", \"diff\": \"--- \\n+++ \\n@@ -4,34 +4,4 @@\\n - Network Drive Mapping: A network share `\\\\\\\\server\\\\share` is mapped to the drive `Z:\\\\`.\\n - Virtual Drive Creation: A virtual disk is mounted on `/mnt/virtualdrive` using an ISO image or a virtual hard disk (VHD).\\n - Cloud Storage Mounting: Google Drive is mounted as `G:\\\\` on a Windows machine using a cloud sync tool.\\n-- External Storage Integration: An external HDD or SSD is connected and assigned `/mnt/external` on a Linux system.\\n-\\n-This data component can be collected through the following measures:\\n-\\n-Windows Event Logs\\n-\\n-- Relevant Events:\\n- - Event ID 98: Logs the creation of a volume (mount or new drive letter assignment).\\n- - Event ID 1006: Logs removable storage device insertions.\\n-- Configuration: Enable \\\"Removable Storage Events\\\" in the Group Policy settings:\\n-`Computer Configuration > Administrative Templates > System > Removable Storage Access`\\n-\\n-Linux System Logs\\n-\\n-- Command-Line Monitoring: Use `dmesg` or `journalctl` to monitor mount events.\\n-\\n-- Auditd Configuration: Add audit rules to track mount points.\\n-- Logs can be reviewed in /var/log/audit/audit.log.\\n-\\n-macOS System Logs\\n-\\n-- Unified Logs: Monitor system logs for mount activity:\\n-- Command-Line Tools: Use `diskutil list` to verify newly created or mounted drives.\\n-\\n-Endpoint Detection and Response (EDR) Tools\\n-\\n-- EDR solutions can log removable drive usage and network-mounted drives. Configure EDR policies to alert on suspicious drive creation events.\\n-\\n-SIEM Tools\\n-\\n-- Centralize logs from multiple platforms into a SIEM (e.g., Splunk) to correlate and alert on suspicious drive creation activities.\\n+- External Storage Integration: An external HDD or SSD is connected and assigned `/mnt/external` on a Linux system..\"}, \"root['x_mitre_log_sources'][4]['name']\": {\"new_value\": \"WinEventLog:System\", \"old_value\": \"WinEventLog:Microsoft-Windows-Partition/Diagnostic\"}, \"root['x_mitre_log_sources'][7]['channel']\": {\"new_value\": \"EventCode=1006, 10001\", \"old_value\": \"EventCode=1006,10001\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][11]\": {\"name\": \"WinEventLog:Microsoft-Windows-DriverFrameworks-UserMode/Operational\", \"channel\": \"EventCode=2003\"}, \"root['x_mitre_log_sources'][19]\": {\"name\": \"WinEventLog:System\", \"channel\": \"EventCode=20001/20003\"}, \"root['x_mitre_log_sources'][22]\": {\"name\": \"WinEventLog:System\", \"channel\": \"20001-20003\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1The activity of assigning a new drive letter or creating a mt1The activity of assigning a new drive letter or creating a m
>ount point for a data storage device, such as a USB, network>ount point for a data storage device, such as a USB, network
> share, or external hard drive, enabling access to its conte> share, or external hard drive, enabling access to its conte
>nt on a host system. Examples:   - USB Drive Insertion: A US>nt on a host system. Examples:   - USB Drive Insertion: A US
>B drive is plugged in and automatically assigned the letter >B drive is plugged in and automatically assigned the letter 
>`E:\\` on a Windows machine. - Network Drive Mapping: A netwo>`E:\\` on a Windows machine. - Network Drive Mapping: A netwo
>rk share `\\\\server\\share` is mapped to the drive `Z:\\`. - Vi>rk share `\\\\server\\share` is mapped to the drive `Z:\\`. - Vi
>rtual Drive Creation: A virtual disk is mounted on `/mnt/vir>rtual Drive Creation: A virtual disk is mounted on `/mnt/vir
>tualdrive` using an ISO image or a virtual hard disk (VHD). >tualdrive` using an ISO image or a virtual hard disk (VHD). 
>- Cloud Storage Mounting: Google Drive is mounted as `G:\\` o>- Cloud Storage Mounting: Google Drive is mounted as `G:\\` o
>n a Windows machine using a cloud sync tool. - External Stor>n a Windows machine using a cloud sync tool. - External Stor
>age Integration: An external HDD or SSD is connected and ass>age Integration: An external HDD or SSD is connected and ass
>igned `/mnt/external` on a Linux system.  This data componen>igned `/mnt/external` on a Linux system..
>t can be collected through the following measures:  Windows  
>Event Logs  - Relevant Events:     - Event ID 98: Logs the c 
>reation of a volume (mount or new drive letter assignment).  
>    - Event ID 1006: Logs removable storage device insertion 
>s. - Configuration: Enable \"Removable Storage Events\" in the 
> Group Policy settings: `Computer Configuration > Administra 
>tive Templates > System > Removable Storage Access`  Linux S 
>ystem Logs  - Command-Line Monitoring: Use `dmesg` or `journ 
>alctl` to monitor mount events.  - Auditd Configuration: Add 
> audit rules to track mount points. - Logs can be reviewed i 
>n /var/log/audit/audit.log.  macOS System Logs  - Unified Lo 
>gs: Monitor system logs for mount activity: - Command-Line T 
>ools: Use `diskutil list` to verify newly created or mounted 
> drives.  Endpoint Detection and Response (EDR) Tools  - EDR 
> solutions can log removable drive usage and network-mounted 
> drives. Configure EDR policies to alert on suspicious drive 
> creation events.  SIEM Tools  - Centralize logs from multip 
>le platforms into a SIEM (e.g., Splunk) to correlate and ale 
>rt on suspicious drive creation activities. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--4dcd8ba3-2075-4f8b-941e-39884ffaac08", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.273000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0046", + "external_id": "DC0046" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Drive Modification", + "description": "The alteration of a drive letter, mount point, or other attributes of a data storage device, which could involve reassignment, renaming, permissions changes, or other modifications. Examples: \n\n- Drive Letter Reassignment: A USB drive previously assigned `E:\\` is reassigned to `D:\\` on a Windows machine.\n- Mount Point Change: On a Linux system, a mounted storage device at `/mnt/external` is moved to `/mnt/storage`.\n- Drive Permission Changes: A shared drive's permissions are modified to allow write access for unauthorized users or processes.\n- Renaming of a Drive: A network drive labeled \"HR_Share\" is renamed to \"Shared_Resources.\"\n- Modification of Cloud-Integrated Drives: A cloud storage mount such as Google Drive is modified to sync only specific folders.\n\nThis data component can be collected through the following measures:\n\nWindows Event Logs\n\n- Relevant Events:\n - Event ID 98: Indicates changes to a volume (e.g., drive letter reassignment).\n - Event ID 1006: Logs permission modifications or changes to removable storage.\n- Configuration: Enable \"Storage Operational Logs\" in the Event Viewer:\n`Applications and Services Logs > Microsoft > Windows > Storage-Tiering > Operational`\n\nLinux System Logs\n\n- Auditd Configuration: Add audit rules to track changes to mounted drives: `auditctl -w /mnt/ -p w -k drive_modification`\n- Command-Line Monitoring: Use `dmesg` or `journalctl` to observe drive modifications.\n\nmacOS System Logs\n\n- Unified Logs: Collect mount or drive modification events: `log show --info | grep \"Volume modified\"`\n- Command-Line Monitoring: Use `diskutil` to track changes:\n\nEndpoint Detection and Response (EDR) Tools\n\n- Configure policies in EDR solutions to monitor and log changes to drive configurations or attributes.\n\nSIEM Tools\n\n- Aggregate logs from multiple systems into a centralized platform like Splunk to correlate events and alert on suspicious drive modification activities.\n", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Drive", + "channel": "None" + }, + { + "name": "networkdevice:runtime", + "channel": "Firmware image uploaded via TFTP/FTP/SCP" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "Raw disk write access via \\\\.\\PhysicalDrive* or \\\\.\\C:" + }, + { + "name": "macos:unifiedlog", + "channel": "IOKit disk write calls targeting raw devices" + }, + { + "name": "linux:syslog", + "channel": "Block device write errors or unusual bootloader activity" + }, + { + "name": "networkdevice:firmware", + "channel": "Unexpected firmware image upload events via TFTP/FTP/SCP" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "Raw write attempts targeting \\\\.\\PhysicalDrive0 or sector 0 (MBR/partition table)" + }, + { + "name": "macos:unifiedlog", + "channel": "IOKit raw disk write to EFI/boot partition sectors" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "Raw disk writes targeting \\\\.\\PhysicalDrive* or MBR locations" + }, + { + "name": "macos:unifiedlog", + "channel": "IOKit raw disk write activity targeting physical devices" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_data_source_ref": "", + "x_mitre_domains": [ + "enterprise-attack", + "ics-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-22 19:03:17.198000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/datacomponents/DC0046\", \"old_value\": \"https://attack.mitre.org/data-components/DC0046\"}}}", + "previous_version": "2.0" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--3551476e-14f5-4e48-a518-e82135329e03", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.274000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0079", + "external_id": "DC0079" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Driver Load", + "description": "The process of attaching a driver, which is a software component that allows the operating system and applications to interact with hardware devices, to either user-mode or kernel-mode of a system. This can include benign actions (e.g., hardware drivers) or malicious behavior (e.g., rootkits or unsigned drivers). Examples: \n\n- Legitimate Driver Loading: A new graphics driver from a vendor like NVIDIA or AMD is loaded into the system.\n- Unsigned Driver Loading: A driver without a valid digital signature is loaded into the kernel.\n- Rootkit Installation: A malicious rootkit driver is loaded to manipulate kernel-mode processes.\n- Anti-Virus or EDR Driver Loading: An Endpoint Detection and Response (EDR) solution loads its driver to monitor system activities.\n- Driver Misuse: A legitimate driver is loaded and exploited to execute malicious actions, such as using vulnerable drivers for bypassing defenses (e.g., Bring Your Own Vulnerable Driver (BYOVD) attacks).", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "WinEventLog:Sysmon", + "channel": "EventCode=6" + }, + { + "name": "linux:syslog", + "channel": "dmesg or syslog for module loads" + }, + { + "name": "linux:syslog", + "channel": "Driver load events or firmware load failures for hardware devices" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:37.274000+00:00\"}, \"root['description']\": {\"new_value\": \"The process of attaching a driver, which is a software component that allows the operating system and applications to interact with hardware devices, to either user-mode or kernel-mode of a system. This can include benign actions (e.g., hardware drivers) or malicious behavior (e.g., rootkits or unsigned drivers). Examples: \\n\\n- Legitimate Driver Loading: A new graphics driver from a vendor like NVIDIA or AMD is loaded into the system.\\n- Unsigned Driver Loading: A driver without a valid digital signature is loaded into the kernel.\\n- Rootkit Installation: A malicious rootkit driver is loaded to manipulate kernel-mode processes.\\n- Anti-Virus or EDR Driver Loading: An Endpoint Detection and Response (EDR) solution loads its driver to monitor system activities.\\n- Driver Misuse: A legitimate driver is loaded and exploited to execute malicious actions, such as using vulnerable drivers for bypassing defenses (e.g., Bring Your Own Vulnerable Driver (BYOVD) attacks).\", \"old_value\": \"The process of attaching a driver, which is a software component that allows the operating system and applications to interact with hardware devices, to either user-mode or kernel-mode of a system. This can include benign actions (e.g., hardware drivers) or malicious behavior (e.g., rootkits or unsigned drivers). Examples: \\n\\n- Legitimate Driver Loading: A new graphics driver from a vendor like NVIDIA or AMD is loaded into the system.\\n- Unsigned Driver Loading: A driver without a valid digital signature is loaded into the kernel.\\n- Rootkit Installation: A malicious rootkit driver is loaded to manipulate kernel-mode processes.\\n- Anti-Virus or EDR Driver Loading: An Endpoint Detection and Response (EDR) solution loads its driver to monitor system activities.\\n- Driver Misuse: A legitimate driver is loaded and exploited to execute malicious actions, such as using vulnerable drivers for bypassing defenses (e.g., Bring Your Own Vulnerable Driver (BYOVD) attacks).\\n\\nThis data component can be collected through the following measures:\\n\\nWindows\\n\\n- Sysmon Logs: \\n - Event ID 6: Captures driver loading activity, including file path, hashes, and signature information.\\n - Configuration: Ensure Sysmon is configured with a ruleset that monitors driver loading events\\n- Windows Event Logs: Enable \\\"Audit Kernel Object\\\" to capture kernel-related driver loading events.\\n\\nLinux\\n\\n- Auditd: Configure audit rules to capture driver loading events: `auditctl -w /lib/modules/ -p rwxa -k driver_load`\\n- Kernel Logs (dmesg): Use dmesg to monitor driver-related activities: `dmesg | grep \\\"module\\\"`\\n- Syslog or journald: Review logs for module insertion or removal activities.\\n\\nmacOS\\n\\n- Unified Logs: Use the macOS unified logging system to monitor kext (kernel extension) loads:\\n`log show --predicate 'eventMessage contains \\\"kext load\\\"'`\\n- Endpoint Security Framework: Monitor driver loading via third-party security tools that leverage Apple\\u2019s Endpoint Security Framework.\\n\\nSIEM Tools\\n\\n- Ingest driver load logs from Sysmon, Auditd, or macOS unified logs into a centralized SIEM (e.g., Splunk).\\n- Create rules to detect unsigned drivers, rootkit activity, or known vulnerable drivers.\\n\\nEDR Solutions\\n\\n- Use EDR tools to detect and alert on anomalous driver loading activity.\", \"diff\": \"--- \\n+++ \\n@@ -5,33 +5,3 @@\\n - Rootkit Installation: A malicious rootkit driver is loaded to manipulate kernel-mode processes.\\n - Anti-Virus or EDR Driver Loading: An Endpoint Detection and Response (EDR) solution loads its driver to monitor system activities.\\n - Driver Misuse: A legitimate driver is loaded and exploited to execute malicious actions, such as using vulnerable drivers for bypassing defenses (e.g., Bring Your Own Vulnerable Driver (BYOVD) attacks).\\n-\\n-This data component can be collected through the following measures:\\n-\\n-Windows\\n-\\n-- Sysmon Logs: \\n- - Event ID 6: Captures driver loading activity, including file path, hashes, and signature information.\\n- - Configuration: Ensure Sysmon is configured with a ruleset that monitors driver loading events\\n-- Windows Event Logs: Enable \\\"Audit Kernel Object\\\" to capture kernel-related driver loading events.\\n-\\n-Linux\\n-\\n-- Auditd: Configure audit rules to capture driver loading events: `auditctl -w /lib/modules/ -p rwxa -k driver_load`\\n-- Kernel Logs (dmesg): Use dmesg to monitor driver-related activities: `dmesg | grep \\\"module\\\"`\\n-- Syslog or journald: Review logs for module insertion or removal activities.\\n-\\n-macOS\\n-\\n-- Unified Logs: Use the macOS unified logging system to monitor kext (kernel extension) loads:\\n-`log show --predicate 'eventMessage contains \\\"kext load\\\"'`\\n-- Endpoint Security Framework: Monitor driver loading via third-party security tools that leverage Apple\\u2019s Endpoint Security Framework.\\n-\\n-SIEM Tools\\n-\\n-- Ingest driver load logs from Sysmon, Auditd, or macOS unified logs into a centralized SIEM (e.g., Splunk).\\n-- Create rules to detect unsigned drivers, rootkit activity, or known vulnerable drivers.\\n-\\n-EDR Solutions\\n-\\n-- Use EDR tools to detect and alert on anomalous driver loading activity.\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][1]\": {\"name\": \"WinEventLog:System\", \"channel\": \"EventCode=6\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1The process of attaching a driver, which is a software compot1The process of attaching a driver, which is a software compo
>nent that allows the operating system and applications to in>nent that allows the operating system and applications to in
>teract with hardware devices, to either user-mode or kernel->teract with hardware devices, to either user-mode or kernel-
>mode of a system. This can include benign actions (e.g., har>mode of a system. This can include benign actions (e.g., har
>dware drivers) or malicious behavior (e.g., rootkits or unsi>dware drivers) or malicious behavior (e.g., rootkits or unsi
>gned drivers). Examples:   - Legitimate Driver Loading: A ne>gned drivers). Examples:   - Legitimate Driver Loading: A ne
>w graphics driver from a vendor like NVIDIA or AMD is loaded>w graphics driver from a vendor like NVIDIA or AMD is loaded
> into the system. - Unsigned Driver Loading: A driver withou> into the system. - Unsigned Driver Loading: A driver withou
>t a valid digital signature is loaded into the kernel. - Roo>t a valid digital signature is loaded into the kernel. - Roo
>tkit Installation: A malicious rootkit driver is loaded to m>tkit Installation: A malicious rootkit driver is loaded to m
>anipulate kernel-mode processes. - Anti-Virus or EDR Driver >anipulate kernel-mode processes. - Anti-Virus or EDR Driver 
>Loading: An Endpoint Detection and Response (EDR) solution l>Loading: An Endpoint Detection and Response (EDR) solution l
>oads its driver to monitor system activities. - Driver Misus>oads its driver to monitor system activities. - Driver Misus
>e: A legitimate driver is loaded and exploited to execute ma>e: A legitimate driver is loaded and exploited to execute ma
>licious actions, such as using vulnerable drivers for bypass>licious actions, such as using vulnerable drivers for bypass
>ing defenses (e.g., Bring Your Own Vulnerable Driver (BYOVD)>ing defenses (e.g., Bring Your Own Vulnerable Driver (BYOVD)
> attacks).  This data component can be collected through the> attacks).
> following measures:  Windows  - Sysmon Logs:      - Event I 
>D 6: Captures driver loading activity, including file path,  
>hashes, and signature information.     - Configuration: Ensu 
>re Sysmon is configured with a ruleset that monitors driver  
>loading events - Windows Event Logs: Enable \"Audit Kernel Ob 
>ject\" to capture kernel-related driver loading events.  Linu 
>x  - Auditd: Configure audit rules to capture driver loading 
> events: `auditctl -w /lib/modules/ -p rwxa -k driver_load`  
>- Kernel Logs (dmesg): Use dmesg to monitor driver-related a 
>ctivities: `dmesg | grep \"module\"` - Syslog or journald: Rev 
>iew logs for module insertion or removal activities.  macOS  
> - Unified Logs: Use the macOS unified logging system to mon 
>itor kext (kernel extension) loads: `log show --predicate 'e 
>ventMessage contains \"kext load\"'` - Endpoint Security Frame 
>work: Monitor driver loading via third-party security tools  
>that leverage Apple\u2019s Endpoint Security Framework.  SIEM Too 
>ls  - Ingest driver load logs from Sysmon, Auditd, or macOS  
>unified logs into a centralized SIEM (e.g., Splunk). - Creat 
>e rules to detect unsigned drivers, rootkit activity, or kno 
>wn vulnerable drivers.  EDR Solutions  - Use EDR tools to de 
>tect and alert on anomalous driver loading activity. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.273000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0055", + "external_id": "DC0055" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "File Access", + "description": "To events where a file is opened or accessed, making its contents available to the requester. This includes reading, executing, or interacting with files by authorized or unauthorized entities. Examples include logging file access events (e.g., Windows Event ID 4663), monitoring file reads, and detecting unusual file access patterns. Examples: \n\n- File Read Operations: A user opens a sensitive document (e.g., financial_report.xlsx) on a shared drive.\n- File Execution: A script or executable file is accessed and executed (e.g., malware.exe is run from a temporary directory).\n- Unauthorized File Access: An unauthorized user attempts to access a protected configuration file (e.g., `/etc/passwd` on Linux or `System32` files on Windows).\n- File Access Patterns: Bulk access to multiple files in a short time (e.g., mass access to documents on a file server).\n- File Access via Network: Files on a network share are accessed remotely (e.g., logs of SMB file access).", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "File", + "channel": "None" + }, + { + "name": "m365:unified", + "channel": "FileAccessed, MailboxAccessed" + }, + { + "name": "auditd:SYSCALL", + "channel": "open, read, or stat of browser config files" + }, + { + "name": "macos:unifiedlog", + "channel": "Access to ~/Library/*/Safari or Chrome directories by non-browser processes" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "name": "macos:unifiedlog", + "channel": "file events" + }, + { + "name": "gcp:audit", + "channel": "Write operations to storage" + }, + { + "name": "esxi:vmkernel", + "channel": "VMFS access logs" + }, + { + "name": "macos:endpointsecurity", + "channel": "ES_EVENT_TYPE_NOTIFY_OPEN: Open of .dylib/.so in user-writable locations" + }, + { + "name": "auditd:SYSCALL", + "channel": "open: File access attempt on /tmp/krb5cc_* or /tmp/krb5.ccache" + }, + { + "name": "macos:unifiedlog", + "channel": "Kerberos framework calls to API:{uuid} cache outside normal process lineage" + }, + { + "name": "auditd:SYSCALL", + "channel": "openat" + }, + { + "name": "auditd:FILE", + "channel": "/home/*/.mozilla/firefox/*/logins.json OR /home/*/.config/google-chrome/*/Login Data" + }, + { + "name": "macos:unifiedlog", + "channel": "~/Library/Application Support/Google/Chrome/*/Login Data OR ~/Library/Application Support/Firefox/*/logins.json" + }, + { + "name": "auditd:SYSCALL", + "channel": "open" + }, + { + "name": "auditd:FILE", + "channel": "/proc/*/mem read attempt" + }, + { + "name": "auditd:PATH", + "channel": "Read access to known backup software configuration files (e.g., /etc/rsnapshot.conf, /opt/veeam/config.ini)" + }, + { + "name": "macos:unifiedlog", + "channel": "Read access to Time Machine plist files or CCC configurations in ~/Library/Preferences/" + }, + { + "name": "auditd:SYSCALL", + "channel": "open, read" + }, + { + "name": "linux:syslog", + "channel": "auth.log or custom tool logs" + }, + { + "name": "fs:fsusage", + "channel": "file" + }, + { + "name": "linux:syslog", + "channel": "/var/log/syslog" + }, + { + "name": "macos:osquery", + "channel": "file_events" + }, + { + "name": "auditd:SYSCALL", + "channel": "open, flock, fcntl, unlink" + }, + { + "name": "fs:fsusage", + "channel": "File Access Monitor" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream - file subsystem" + }, + { + "name": "auditd:SYSCALL", + "channel": "read/open of sensitive files" + }, + { + "name": "macos:unifiedlog", + "channel": "file read of sensitive directories" + }, + { + "name": "esxi:hostd", + "channel": "datastore file access" + }, + { + "name": "auditd:SYSCALL", + "channel": "Unusual processes accessing or modifying cookie databases" + }, + { + "name": "macos:unifiedlog", + "channel": "Abnormal process access to Safari or Chrome cookie storage" + }, + { + "name": "auditd:SYSCALL", + "channel": "PATH records referencing /dev/video*" + }, + { + "name": "macos:endpointsecurity", + "channel": "open: Process opens AppleCamera/IOUSB device nodes or AVFoundation frameworks" + }, + { + "name": "ebpf:syscalls", + "channel": "container_file_activity" + }, + { + "name": "fs:fsusage", + "channel": "Disk Activity Tracing" + }, + { + "name": "macos:keychain", + "channel": "Access to Keychain DB or system.keychain" + }, + { + "name": "auditd:SYSCALL", + "channel": "open, read: /etc/ssl/, /etc/pki/, ~/.pki/nssdb/" + }, + { + "name": "macos:keychain", + "channel": "~/Library/Keychains, /Library/Keychains" + }, + { + "name": "m365:unified", + "channel": "Bulk downloads or API extractions from Microsoft-hosted data repositories (e.g., Dynamics 365)" + }, + { + "name": "auditd:PATH", + "channel": "open: Access to sensitive log files (/var/log/auth.log, /var/log/secure, /var/log/syslog)" + }, + { + "name": "macos:unifiedlog", + "channel": "open: Access to /var/log/system.log or related security event logs" + }, + { + "name": "azure:activity", + "channel": "CollectGuestLogs: Unexpected collection of guest logs by Azure VM Agent outside normal maintenance windows" + }, + { + "name": "esxi:hostd", + "channel": "read: Access to sensitive log files by non-admin users" + }, + { + "name": "auditd:SYSCALL", + "channel": "Processes reading credential or token cache files" + }, + { + "name": "auditd:SYSCALL", + "channel": "read/open of sensitive file directories" + }, + { + "name": "esxi:hostd", + "channel": "datastore/log file access" + }, + { + "name": "fs:fsusage", + "channel": "filesystem activity" + }, + { + "name": "WinEventLog:Microsoft-Windows-Windows Defender/Operational", + "channel": "Suspicious file execution on removable media path" + }, + { + "name": "auditd:PATH", + "channel": "PATH" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/read of sensitive config or secret files" + }, + { + "name": "macos:unifiedlog", + "channel": "open/read of *.plist or .env files" + }, + { + "name": "ebpf:syscalls", + "channel": "open/read on secret mount paths" + }, + { + "name": "CloudTrail:GetObject", + "channel": "sensitive credential files in buckets or local image storage" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/read of sensitive directories" + }, + { + "name": "macos:unifiedlog", + "channel": "read of user document directories" + }, + { + "name": "esxi:syslog", + "channel": "guest OS outbound transfer logs" + }, + { + "name": "fs:fsusage", + "channel": "Filesystem Call Monitoring" + }, + { + "name": "esxi:hostd", + "channel": "vSphere File API Access" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/read: Access to /proc/self/status with focus on TracerPID field" + }, + { + "name": "fs:fsusage", + "channel": "read/write" + }, + { + "name": "esxis:vmkernel", + "channel": "Datastore Access" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/read access to ~/.bash_history" + }, + { + "name": "macos:endpointsecurity", + "channel": "open or read syscall to ~/.bash_history" + }, + { + "name": "macos:unifiedlog", + "channel": "read access to ~/Library/Keychains/login.keychain-db" + }, + { + "name": "auditd:SYSCALL", + "channel": "open,read" + }, + { + "name": "macos:unifiedlog", + "channel": "filesystem and process events" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/read system calls to ~/.bash_history or /etc/shadow" + }, + { + "name": "macos:unifiedlog", + "channel": "read access to ~/Library/Keychains or history files by terminal processes" + }, + { + "name": "auditd:SYSCALL", + "channel": "read of /run/secrets or docker volumes by non-entrypoint process" + }, + { + "name": "macos:unifiedlog", + "channel": "access to /Volumes/SharePoint or network mount" + }, + { + "name": "auditd:SYSCALL", + "channel": "Reads of ~/.bash_history, ~/.mozilla, or access to /dev/input" + }, + { + "name": "macos:unifiedlog", + "channel": "Access to ~/Library/Safari/Bookmarks.plist or recent files" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/read" + }, + { + "name": "macos:unifiedlog", + "channel": "access to keychain database" + }, + { + "name": "auditd:PATH", + "channel": "file read" + }, + { + "name": "linux:syslog", + "channel": "kernel messages related to cryptographic operations, module loading, and filesystem access patterns" + }, + { + "name": "fs:fsevents", + "channel": "file system events indicating access to system configuration files and environmental information sources" + }, + { + "name": "macos:endpointsecurity", + "channel": "es_event_open, es_event_exec" + }, + { + "name": "auditd:SYSCALL", + "channel": "open: Access to named pipes or FIFO in /tmp or /dev/shm by unexpected processes" + }, + { + "name": "auditd:SYSCALL", + "channel": "open or read to browser cookie storage" + }, + { + "name": "fs:fsusage", + "channel": "file open for known browser cookie paths" + }, + { + "name": "auditd:SYSCALL", + "channel": "open, read, mount" + }, + { + "name": "fs:fsusage", + "channel": "file reads/writes from /Volumes/" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream - file provider subsystem" + }, + { + "name": "auditd:SYSCALL", + "channel": "file" + }, + { + "name": "kubernetes:audit", + "channel": "GET or LIST requests to /var/run/secrets/kubernetes.io/serviceaccount/ followed by access to the Kubernetes API server" + }, + { + "name": "auditd:SYSCALL", + "channel": "Access to /var/lib/sss/secrets/secrets.ldb or .secrets.mkey" + }, + { + "name": "fs:quarantine", + "channel": "/var/log/quarantine.log" + }, + { + "name": "desktop:file_manager", + "channel": "nautilus, dolphin, or gvfs logs" + }, + { + "name": "linux:osquery", + "channel": "/proc/*/maps access" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/read of sensitive directories (/etc, /home/*)" + }, + { + "name": "macos:unifiedlog", + "channel": "read/write of user documents prior to upload" + }, + { + "name": "esxi:hostd", + "channel": "file copy or datastore upload via HTTPS" + }, + { + "name": "macos:unifiedlog", + "channel": "open/read access to private key files (id_rsa, *.pem, *.p12)" + }, + { + "name": "linux:osquery", + "channel": "None" + }, + { + "name": "macos:osquery", + "channel": "None" + }, + { + "name": "fs:fileevents", + "channel": "File system access events with kFSEventStreamEventFlagItemRemoved, kFSEventStreamEventFlagItemRenamed flags for environmental artifact collection (/System/Library, /usr/sbin, plist files)" + }, + { + "name": "auditd:FS", + "channel": "read: File access to /proc/modules or /sys/module/" + }, + { + "name": "macos:unifiedlog", + "channel": "read: File access to /System/Library/Extensions/ or related kernel extension paths" + }, + { + "name": "auditd:SYSCALL", + "channel": "PATH" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/read on ~/.local/share/keepassxc/* OR ~/.password-store/*" + }, + { + "name": "macos:unifiedlog", + "channel": "*.opvault OR *.ldb OR *.kdbx" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:35.674000+00:00\"}, \"root['description']\": {\"new_value\": \"To events where a file is opened or accessed, making its contents available to the requester. This includes reading, executing, or interacting with files by authorized or unauthorized entities. Examples include logging file access events (e.g., Windows Event ID 4663), monitoring file reads, and detecting unusual file access patterns. Examples: \\n\\n- File Read Operations: A user opens a sensitive document (e.g., financial_report.xlsx) on a shared drive.\\n- File Execution: A script or executable file is accessed and executed (e.g., malware.exe is run from a temporary directory).\\n- Unauthorized File Access: An unauthorized user attempts to access a protected configuration file (e.g., `/etc/passwd` on Linux or `System32` files on Windows).\\n- File Access Patterns: Bulk access to multiple files in a short time (e.g., mass access to documents on a file server).\\n- File Access via Network: Files on a network share are accessed remotely (e.g., logs of SMB file access).\", \"old_value\": \"To events where a file is opened or accessed, making its contents available to the requester. This includes reading, executing, or interacting with files by authorized or unauthorized entities. Examples include logging file access events (e.g., Windows Event ID 4663), monitoring file reads, and detecting unusual file access patterns. Examples: \\n\\n- File Read Operations: A user opens a sensitive document (e.g., financial_report.xlsx) on a shared drive.\\n- File Execution: A script or executable file is accessed and executed (e.g., malware.exe is run from a temporary directory).\\n- Unauthorized File Access: An unauthorized user attempts to access a protected configuration file (e.g., `/etc/passwd` on Linux or `System32` files on Windows).\\n- File Access Patterns: Bulk access to multiple files in a short time (e.g., mass access to documents on a file server).\\n- File Access via Network: Files on a network share are accessed remotely (e.g., logs of SMB file access).\\n\\nThis data component can be collected through the following measures:\\n\\nWindows\\n\\n- Windows Event Logs: Event ID 4663: Captures file system auditing details, including who accessed the file, access type, and file name.\\n- Sysmon:\\n - Event ID 11: Logs file creation time changes.\\n - Event ID 1 (process creation): Can provide insight into files executed.\\n- PowerShell: Commands to monitor file access in real-time: `Get-WinEvent -FilterHashtable @{LogName='Security'; ID=4663}`\\n\\nLinux\\n\\n- Auditd: Monitor file access events using audit rules: `auditctl -w /path/to/file -p rwxa -k file_access`\\n- View logs: `ausearch -k file_access`\\n- Inotify: Use inotify to track file access on Linux: `inotifywait -m /path/to/watch -e access`\\n\\nmacOS\\n\\n- Unified Logs: Monitor file access using the macOS Unified Logging System.\\n- FSEvents: File System Events can track file accesses: `fs_usage | grep open`\\n\\nNetwork Devices\\n\\n- SMB/CIFS Logs: Monitor file access over network shares using logs from SMB or CIFS protocol.\\n- NAS Logs: Collect logs from network-attached storage systems for file access events.\\n\\nSIEM Integration\\n\\n- Collect file access logs from all platforms (Windows, Linux, macOS) and centralize in a SIEM for correlation and analysis.\", \"diff\": \"--- \\n+++ \\n@@ -5,33 +5,3 @@\\n - Unauthorized File Access: An unauthorized user attempts to access a protected configuration file (e.g., `/etc/passwd` on Linux or `System32` files on Windows).\\n - File Access Patterns: Bulk access to multiple files in a short time (e.g., mass access to documents on a file server).\\n - File Access via Network: Files on a network share are accessed remotely (e.g., logs of SMB file access).\\n-\\n-This data component can be collected through the following measures:\\n-\\n-Windows\\n-\\n-- Windows Event Logs: Event ID 4663: Captures file system auditing details, including who accessed the file, access type, and file name.\\n-- Sysmon:\\n- - Event ID 11: Logs file creation time changes.\\n- - Event ID 1 (process creation): Can provide insight into files executed.\\n-- PowerShell: Commands to monitor file access in real-time: `Get-WinEvent -FilterHashtable @{LogName='Security'; ID=4663}`\\n-\\n-Linux\\n-\\n-- Auditd: Monitor file access events using audit rules: `auditctl -w /path/to/file -p rwxa -k file_access`\\n-- View logs: `ausearch -k file_access`\\n-- Inotify: Use inotify to track file access on Linux: `inotifywait -m /path/to/watch -e access`\\n-\\n-macOS\\n-\\n-- Unified Logs: Monitor file access using the macOS Unified Logging System.\\n-- FSEvents: File System Events can track file accesses: `fs_usage | grep open`\\n-\\n-Network Devices\\n-\\n-- SMB/CIFS Logs: Monitor file access over network shares using logs from SMB or CIFS protocol.\\n-- NAS Logs: Collect logs from network-attached storage systems for file access events.\\n-\\n-SIEM Integration\\n-\\n-- Collect file access logs from all platforms (Windows, Linux, macOS) and centralize in a SIEM for correlation and analysis.\"}, \"root['x_mitre_log_sources'][4]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][12]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4656, 4663\"}, \"root['x_mitre_log_sources'][17]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4656,4663\"}, \"root['x_mitre_log_sources'][18]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4670, 4663\"}, \"root['x_mitre_log_sources'][21]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4656\"}, \"root['x_mitre_log_sources'][23]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=5145, 4663\"}, \"root['x_mitre_log_sources'][53]\": {\"name\": \"auditd:PATH\", \"channel\": \"path\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1To events where a file is opened or accessed, making its cont1To events where a file is opened or accessed, making its con
>tents available to the requester. This includes reading, exe>tents available to the requester. This includes reading, exe
>cuting, or interacting with files by authorized or unauthori>cuting, or interacting with files by authorized or unauthori
>zed entities. Examples include logging file access events (e>zed entities. Examples include logging file access events (e
>.g., Windows Event ID 4663), monitoring file reads, and dete>.g., Windows Event ID 4663), monitoring file reads, and dete
>cting unusual file access patterns. Examples:   - File Read >cting unusual file access patterns. Examples:   - File Read 
>Operations: A user opens a sensitive document (e.g., financi>Operations: A user opens a sensitive document (e.g., financi
>al_report.xlsx) on a shared drive. - File Execution: A scrip>al_report.xlsx) on a shared drive. - File Execution: A scrip
>t or executable file is accessed and executed (e.g., malware>t or executable file is accessed and executed (e.g., malware
>.exe is run from a temporary directory). - Unauthorized File>.exe is run from a temporary directory). - Unauthorized File
> Access: An unauthorized user attempts to access a protected> Access: An unauthorized user attempts to access a protected
> configuration file (e.g., `/etc/passwd` on Linux or `System> configuration file (e.g., `/etc/passwd` on Linux or `System
>32` files on Windows). - File Access Patterns: Bulk access t>32` files on Windows). - File Access Patterns: Bulk access t
>o multiple files in a short time (e.g., mass access to docum>o multiple files in a short time (e.g., mass access to docum
>ents on a file server). - File Access via Network: Files on >ents on a file server). - File Access via Network: Files on 
>a network share are accessed remotely (e.g., logs of SMB fil>a network share are accessed remotely (e.g., logs of SMB fil
>e access).  This data component can be collected through the>e access).
> following measures:  Windows  - Windows Event Logs: Event I 
>D 4663: Captures file system auditing details, including who 
> accessed the file, access type, and file name. - Sysmon:    
>  - Event ID 11: Logs file creation time changes.     - Even 
>t ID 1 (process creation): Can provide insight into files ex 
>ecuted. - PowerShell: Commands to monitor file access in rea 
>l-time: `Get-WinEvent -FilterHashtable @{LogName='Security'; 
> ID=4663}`  Linux  - Auditd: Monitor file access events usin 
>g audit rules: `auditctl -w /path/to/file -p rwxa -k file_ac 
>cess` - View logs: `ausearch -k file_access` - Inotify: Use  
>inotify to track file access on Linux: `inotifywait -m /path 
>/to/watch -e access`  macOS  - Unified Logs: Monitor file ac 
>cess using the macOS Unified Logging System. - FSEvents: Fil 
>e System Events can track file accesses: `fs_usage | grep op 
>en`  Network Devices  - SMB/CIFS Logs: Monitor file access o 
>ver network shares using logs from SMB or CIFS protocol. - N 
>AS Logs: Collect logs from network-attached storage systems  
>for file access events.  SIEM Integration  - Collect file ac 
>cess logs from all platforms (Windows, Linux, macOS) and cen 
>tralize in a SIEM for correlation and analysis. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.273000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0039", + "external_id": "DC0039" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "File Creation", + "description": "A new file is created on a system or network storage. This action often signifies an operation such as saving a document, writing data, or deploying a file. Logging these events helps identify legitimate or potentially malicious file creation activities. Examples include logging file creation events (e.g., Sysmon Event ID 11 or Linux auditd logs). ", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "File", + "channel": "None" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "name": "auditd:SYSCALL", + "channel": "creat" + }, + { + "name": "macos:unifiedlog", + "channel": "file write" + }, + { + "name": "macos:osquery", + "channel": "CREATE/MODIFY: Modification of app.asar inside .app bundle" + }, + { + "name": "auditd:FILE", + "channel": "File creation with name starting with '.'" + }, + { + "name": "macos:unifiedlog", + "channel": "Creation or modification of browser extension .plist files" + }, + { + "name": "auditd:SYSCALL", + "channel": "open or creat syscalls targeting excluded paths" + }, + { + "name": "macos:unifiedlog", + "channel": "file creation in AV exclusion directories" + }, + { + "name": "auditd:SYSCALL", + "channel": "file creation/modification" + }, + { + "name": "macos:unifiedlog", + "channel": "file write/create" + }, + { + "name": "esxi:vmkernel", + "channel": "file write" + }, + { + "name": "snmp:syslog", + "channel": "firmware write/log event" + }, + { + "name": "auditd:SYSCALL", + "channel": "open,creat,rename: Writes in $HOME/Downloads, /tmp, ~/.cache with exe/script/archive/office extensions" + }, + { + "name": "fs:fsevents", + "channel": "Create in /Users/*/Downloads or /private/var/folders/* with quarantine attribute" + }, + { + "name": "macos:unifiedlog", + "channel": "file events" + }, + { + "name": "esxi:vmkernel", + "channel": "VMFS file creation" + }, + { + "name": "auditd:SYSCALL", + "channel": "write/open, FIM audit" + }, + { + "name": "fs:fsusage", + "channel": "open/write/exec calls" + }, + { + "name": "macos:unifiedlog", + "channel": "Creation of .plist under /Library/Managed Preferences/" + }, + { + "name": "fs:fileevents", + "channel": "creat" + }, + { + "name": "fs:fsusage", + "channel": "disk activity on /Library/LaunchAgents or LaunchDaemons" + }, + { + "name": "macos:osquery", + "channel": "file_events" + }, + { + "name": "auditd:SYSCALL", + "channel": "open: Write to ~/.vscode-cli/code_tunnel.json" + }, + { + "name": "macos:unifiedlog", + "channel": "creation of ~/.vscode-cli/code_tunnel.json" + }, + { + "name": "macos:unifiedlog", + "channel": "create/modify dylib files in monitored directories" + }, + { + "name": "auditd:SYSCALL", + "channel": "write" + }, + { + "name": "linux:Sysmon", + "channel": "New files in /tmp, /var/tmp, $HOME/.cache, executed within TimeWindow after browser HTTP fetch" + }, + { + "name": "macos:unifiedlog", + "channel": "New files written to /var/folders, /tmp, ~/Library/Caches, or ~/Downloads by browser context or its children" + }, + { + "name": "auditd:FILE", + "channel": "create: New file created in system binaries or temp directories" + }, + { + "name": "macos:unifiedlog", + "channel": "File created in ~/Library/LaunchAgents or executable directories" + }, + { + "name": "auditd:SYSCALL", + "channel": "open, unlink, rename: File creation or deletion involving critical stored data" + }, + { + "name": "macos:unifiedlog", + "channel": "Process wrote large .mov/.mp4 in user temp/hidden dirs" + }, + { + "name": "macos:unifiedlog", + "channel": "logd:file write" + }, + { + "name": "fs:fsusage", + "channel": "File IO" + }, + { + "name": "auditd:SYSCALL", + "channel": "creat, open, write on /etc/systemd/system and /usr/lib/systemd/system" + }, + { + "name": "macos:unifiedlog", + "channel": "File creation" + }, + { + "name": "macos:unifiedlog", + "channel": "Attachment files written to ~/Downloads or temporary folders" + }, + { + "name": "fs:fsusage", + "channel": "file activity" + }, + { + "name": "CloudTrail:PutObject", + "channel": "PutObject" + }, + { + "name": "auditd:PATH", + "channel": "Creation of files with extensions .sql, .csv, .sqlite, especially in user directories" + }, + { + "name": "macos:unifiedlog", + "channel": "Writes of .sql/.csv/.xlsx files to user documents/downloads" + }, + { + "name": "auditd:PATH", + "channel": "New .py/.js/.sh files written to ~/.local/, ~/.cache/, or /tmp/ within 5 min of package install" + }, + { + "name": "auditd:SYSCALL", + "channel": "write, open, or rename to /etc/systemd/system/*.service" + }, + { + "name": "auditd:FILE", + "channel": "create: Creation of .zip, .gz, .bz2 files in /tmp, /var/tmp, or /home directories" + }, + { + "name": "macos:unifiedlog", + "channel": "Creation of .zip, .gz, .dmg archives in /Users, /tmp, or application directories" + }, + { + "name": "fs:fsusage", + "channel": "file open/write" + }, + { + "name": "macos:endpointsecurity", + "channel": "ES_EVENT_TYPE_NOTIFY_CREATE: path under /Users/*/(Downloads|Desktop|Library/*/Containers|Library/Group Containers) AND extension in SuspiciousExtensions" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/create/rename: name in (/home/*/Downloads/*|/tmp/*|/run/user/*|/media/*) AND ext in SuspiciousExtensions" + }, + { + "name": "auditd:FILE", + "channel": "create: Creation of archive files in /tmp, /var/tmp, or user home directories" + }, + { + "name": "macos:unifiedlog", + "channel": "Creation of .zip, .dmg, .tar.gz files in /Users, /tmp, or application directories" + }, + { + "name": "linux:osquery", + "channel": "file_events" + }, + { + "name": "macos:unifiedlog", + "channel": "File Events" + }, + { + "name": "auditd:SYSCALL", + "channel": "File creations of *.qcow2, *.vdi, *.vmdk outside standard VM directories" + }, + { + "name": "macos:unifiedlog", + "channel": "Creation or modification of postinstall scripts within .pkg or .mpkg contents" + }, + { + "name": "auditd:SYSCALL", + "channel": "open: File creation under /tmp, /var/tmp, ~/.cache with executable bit or shell shebang" + }, + { + "name": "macos:unifiedlog", + "channel": "create: New files in /tmp or ~/Library/Application Support/* with executable or script extensions" + }, + { + "name": "auditd:SYSCALL", + "channel": "open, write, unlink" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "File creation of suspicious scripts/binaries in temporary directories" + }, + { + "name": "macos:unifiedlog", + "channel": "File creation of unsigned binaries/scripts in user cache or download directories" + }, + { + "name": "auditd:SYSCALL", + "channel": "File creation events in /var/mail or /var/spool/mail exceeding baseline thresholds" + }, + { + "name": "fs:fsusage", + "channel": "create: Attachment file creation in ~/Library/Mail directories" + }, + { + "name": "WinEventLog:Microsoft-Windows-Shell-Core", + "channel": "New startup folder shortcut or binary placed in Startup directory" + }, + { + "name": "auditd:SYSCALL", + "channel": "write or create file after .bash_history access" + }, + { + "name": "auditd:SYSCALL", + "channel": "new file created in /var/www/html, /srv/http, or similar web root" + }, + { + "name": "fs:launchdaemons", + "channel": "file_create" + }, + { + "name": "auditd:PATH", + "channel": "mount target path within /proc/*" + }, + { + "name": "macos:fsevents", + "channel": "/Library/StartupItems/, ~/Library/LaunchAgents/" + }, + { + "name": "fs:fsusage", + "channel": "write or chmod to ~/Library/LaunchAgents/*.plist" + }, + { + "name": "auditd:PATH", + "channel": "creation of .so files in non-standard directories (e.g., /tmp, /home/*)" + }, + { + "name": "auditd:FILE", + "channel": "create: Creation of files with anomalous headers and entropy levels in /tmp or user directories" + }, + { + "name": "macos:unifiedlog", + "channel": "Creation of files with anomalous headers and entropy values" + }, + { + "name": "auditd:SYSCALL", + "channel": "Access or modification to /lib/modules or creation of .ko files" + }, + { + "name": "fs:fsevents", + "channel": "Directory events (kFSEventStreamEventFlagItemCreated)" + }, + { + "name": "gcp:workspaceaudit", + "channel": "drive.activity logs" + }, + { + "name": "fs:fileevents", + "channel": "create/write/rename in user-writable paths" + }, + { + "name": "auditd:PATH", + "channel": "WRITE: Drop of binaries/scripts in ~/.local, /tmp, or /opt tool dirs" + }, + { + "name": "macos:osquery", + "channel": "CREATE/MODIFY: Creation of LaunchAgents/Daemons plists in user/system locations" + }, + { + "name": "auditd:SYSCALL", + "channel": "open,create" + }, + { + "name": "auditd:FILE", + "channel": "Creation of hidden files (.*) in sensitive directories (/etc, /var, /usr/bin)" + }, + { + "name": "macos:unifiedlog", + "channel": "Creation of LaunchAgents/LaunchDaemons in hidden or non-standard directories" + }, + { + "name": "auditd:FILE", + "channel": "create: Creation of files ending in .tar, .gz, .bz2, .zip in /tmp or /var/tmp" + }, + { + "name": "macos:unifiedlog", + "channel": "Creation of .zip or .dmg files in user-accessible or temporary directories" + }, + { + "name": "fs:fsusage", + "channel": "file write" + }, + { + "name": "macos:endpointsecurity", + "channel": "es_event_open" + }, + { + "name": "macos:unifiedlog", + "channel": "file create or modify in /etc/emond.d/rules or /private/var/db/emondClients" + }, + { + "name": "auditd:SYSCALL", + "channel": "open,creat,rename,write" + }, + { + "name": "macos:unifiedlog", + "channel": "Writes under ~/Library/Application Support/Code*/extensions or JetBrains plugins" + }, + { + "name": "AWS:CloudTrail", + "channel": "PutObject" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_data_source_ref": "", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 19:32:14.744000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/datacomponents/DC0039\", \"old_value\": \"https://attack.mitre.org/data-components/DC0039\"}, \"root['description']\": {\"new_value\": \"A new file is created on a system or network storage. This action often signifies an operation such as saving a document, writing data, or deploying a file. Logging these events helps identify legitimate or potentially malicious file creation activities. Examples include logging file creation events (e.g., Sysmon Event ID 11 or Linux auditd logs). \", \"old_value\": \"A new file is created on a system or network storage. This action often signifies an operation such as saving a document, writing data, or deploying a file. Logging these events helps identify legitimate or potentially malicious file creation activities. Examples include logging file creation events (e.g., Sysmon Event ID 11 or Linux auditd logs). \\n\\nThis data component can be collected through the following measures:\\n\\nWindows\\n\\n- Sysmon: Event ID 11: Logs file creation events, capturing details like the file path, hash, and creation time.\\n- Windows Event Log: Enable \\\"Object Access\\\" auditing in Group Policy to track file creation under Event ID 4663.\\n- PowerShell: Real-time monitoring of file creation:`Get-WinEvent -FilterHashtable @{LogName='Security'; ID=4663}`\\n\\nLinux\\n\\n- Auditd: Use audit rules to monitor file creation: `auditctl -w /path/to/directory -p w -k file_creation`\\n- View logs: `ausearch -k file_creation`\\n- Inotify: Monitor file creation with inotifywait: `inotifywait -m /path/to/watch -e create`\\n\\nmacOS\\n\\n- Unified Logs: Use the macOS Unified Logging System to capture file creation events.\\n- FSEvents: Use File System Events to monitor file creation: `fs_usage | grep create`\\n\\nNetwork Devices\\n\\n- NAS Logs: Monitor file creation events on network-attached storage devices.\\n- SMB Logs: Collect logs of file creation activities over SMB/CIFS protocols.\\n\\nSIEM Integration\\n\\n- Forward logs from all platforms (Windows, Linux, macOS) to a SIEM for central analysis and alerting.\", \"diff\": \"--- \\n+++ \\n@@ -1,29 +1 @@\\n A new file is created on a system or network storage. This action often signifies an operation such as saving a document, writing data, or deploying a file. Logging these events helps identify legitimate or potentially malicious file creation activities. Examples include logging file creation events (e.g., Sysmon Event ID 11 or Linux auditd logs). \\n-\\n-This data component can be collected through the following measures:\\n-\\n-Windows\\n-\\n-- Sysmon: Event ID 11: Logs file creation events, capturing details like the file path, hash, and creation time.\\n-- Windows Event Log: Enable \\\"Object Access\\\" auditing in Group Policy to track file creation under Event ID 4663.\\n-- PowerShell: Real-time monitoring of file creation:`Get-WinEvent -FilterHashtable @{LogName='Security'; ID=4663}`\\n-\\n-Linux\\n-\\n-- Auditd: Use audit rules to monitor file creation: `auditctl -w /path/to/directory -p w -k file_creation`\\n-- View logs: `ausearch -k file_creation`\\n-- Inotify: Monitor file creation with inotifywait: `inotifywait -m /path/to/watch -e create`\\n-\\n-macOS\\n-\\n-- Unified Logs: Use the macOS Unified Logging System to capture file creation events.\\n-- FSEvents: Use File System Events to monitor file creation: `fs_usage | grep create`\\n-\\n-Network Devices\\n-\\n-- NAS Logs: Monitor file creation events on network-attached storage devices.\\n-- SMB Logs: Collect logs of file creation activities over SMB/CIFS protocols.\\n-\\n-SIEM Integration\\n-\\n-- Forward logs from all platforms (Windows, Linux, macOS) to a SIEM for central analysis and alerting.\"}, \"root['x_mitre_log_sources'][37]['name']\": {\"new_value\": \"macos:unifiedlog\", \"old_value\": \"macos:unified\", \"new_path\": \"root['x_mitre_log_sources'][36]['name']\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][4]\": {\"name\": \"WinEventLog:Sysmon\", \"channel\": \"Modification of .asar in /opt or ~/.config directories\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1A new file is created on a system or network storage. This at1A new file is created on a system or network storage. This a
>ction often signifies an operation such as saving a document>ction often signifies an operation such as saving a document
>, writing data, or deploying a file. Logging these events he>, writing data, or deploying a file. Logging these events he
>lps identify legitimate or potentially malicious file creati>lps identify legitimate or potentially malicious file creati
>on activities. Examples include logging file creation events>on activities. Examples include logging file creation events
> (e.g., Sysmon Event ID 11 or Linux auditd logs).   This dat> (e.g., Sysmon Event ID 11 or Linux auditd logs). 
>a component can be collected through the following measures: 
>  Windows  - Sysmon: Event ID 11: Logs file creation events, 
> capturing details like the file path, hash, and creation ti 
>me. - Windows Event Log: Enable \"Object Access\" auditing in  
>Group Policy to track file creation under Event ID 4663. - P 
>owerShell: Real-time monitoring of file creation:`Get-WinEve 
>nt -FilterHashtable @{LogName='Security'; ID=4663}`  Linux   
>- Auditd: Use audit rules to monitor file creation: `auditct 
>l -w /path/to/directory -p w -k file_creation` - View logs:  
>`ausearch -k file_creation` - Inotify: Monitor file creation 
> with inotifywait: `inotifywait -m /path/to/watch -e create` 
>  macOS  - Unified Logs: Use the macOS Unified Logging Syste 
>m to capture file creation events. - FSEvents: Use File Syst 
>em Events to monitor file creation: `fs_usage | grep create` 
>  Network Devices  - NAS Logs: Monitor file creation events  
>on network-attached storage devices. - SMB Logs: Collect log 
>s of file creation activities over SMB/CIFS protocols.  SIEM 
> Integration  - Forward logs from all platforms (Windows, Li 
>nux, macOS) to a SIEM for central analysis and alerting. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--e905dad2-00d6-477c-97e8-800427abd0e8", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.273000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0040", + "external_id": "DC0040" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "File Deletion", + "description": "Refers to events where files are removed from a system or storage device. These events can indicate legitimate housekeeping activities or malicious actions such as attackers attempting to cover their tracks. Monitoring file deletions helps organizations identify unauthorized or suspicious activities.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "File", + "channel": "None" + }, + { + "name": "auditd:SYSCALL", + "channel": "unlink/unlinkat on service binaries or data targets" + }, + { + "name": "auditd:SYSCALL", + "channel": "file deletion" + }, + { + "name": "macos:osquery", + "channel": "file_events" + }, + { + "name": "esxi:shell", + "channel": "shell history" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "EventCode=23" + }, + { + "name": "auditd:SYSCALL", + "channel": "PATH" + }, + { + "name": "esxi:shell", + "channel": "/var/log/shell.log" + }, + { + "name": "esxi:hostd", + "channel": "delete action" + }, + { + "name": "auditd:SYSCALL", + "channel": "unlink, unlinkat, openat, write" + }, + { + "name": "macos:unifiedlog", + "channel": "exec rm -rf|dd if=/dev|srm|file unlink" + }, + { + "name": "auditd:SYSCALL", + "channel": "unlink, unlinkat, rmdir" + }, + { + "name": "auditd:SYSCALL", + "channel": "unlink, rename, open" + }, + { + "name": "linux:Sysmon", + "channel": "EventCode=23" + }, + { + "name": "fs:fsusage", + "channel": "unlink, fs_delete" + }, + { + "name": "docker:daemon", + "channel": "container file operations" + }, + { + "name": "esxi:hostd", + "channel": "rm, clearlogs, logrotate" + }, + { + "name": "esxi:hostd", + "channel": "Datastore file operations" + }, + { + "name": "macos:osquery", + "channel": "CREATE, DELETE, WRITE: Stored data manipulation attempts by unauthorized processes" + }, + { + "name": "auditd:SYSCALL", + "channel": "unlink/unlinkat" + }, + { + "name": "WinEventLog:Microsoft-Windows-Backup", + "channel": "Windows Backup Catalog deletion or catalog corruption" + }, + { + "name": "auditd:CONFIG_CHANGE", + "channel": "/etc/fstab, /etc/systemd/*" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:36.450000+00:00\"}, \"root['description']\": {\"new_value\": \"Refers to events where files are removed from a system or storage device. These events can indicate legitimate housekeeping activities or malicious actions such as attackers attempting to cover their tracks. Monitoring file deletions helps organizations identify unauthorized or suspicious activities.\", \"old_value\": \"Refers to events where files are removed from a system or storage device. These events can indicate legitimate housekeeping activities or malicious actions such as attackers attempting to cover their tracks. Monitoring file deletions helps organizations identify unauthorized or suspicious activities.\\n\\nThis data component can be collected through the following measures:\\n\\nWindows\\n\\n- Sysmon: Event ID 23: Logs file deletion events, including details such as file paths and responsible processes.\\n- Windows Event Log: Enable \\\"Object Access\\\" auditing to monitor file deletions.\\n- PowerShell: `Get-WinEvent -FilterHashtable @{LogName='Security'; ID=4663} | Where-Object {$_.Message -like '*DELETE*'}`\\n\\nLinux\\n\\n- Auditd: Use audit rules to capture file deletion events: `auditctl -a always,exit -F arch=b64 -S unlink -S rename -S rmdir -k file_deletion`\\n- Query logs: `ausearch -k file_deletion`\\n- Inotify: Use inotifywait to monitor file deletions: `inotifywait -m /path/to/watch -e delete`\\n\\nmacOS\\n\\n- Endpoint Security Framework (ESF): Monitor events like ES_EVENT_TYPE_AUTH_UNLINK to capture file deletion activities.\\n- FSEvents: Track file deletion activities in real-time: `fs_usage | grep unlink`\\n\\nSIEM Integration\\n\\n- Forward file deletion logs to a SIEM for centralized monitoring and correlation with other events.\\n\", \"diff\": \"--- \\n+++ \\n@@ -1,24 +1 @@\\n Refers to events where files are removed from a system or storage device. These events can indicate legitimate housekeeping activities or malicious actions such as attackers attempting to cover their tracks. Monitoring file deletions helps organizations identify unauthorized or suspicious activities.\\n-\\n-This data component can be collected through the following measures:\\n-\\n-Windows\\n-\\n-- Sysmon: Event ID 23: Logs file deletion events, including details such as file paths and responsible processes.\\n-- Windows Event Log: Enable \\\"Object Access\\\" auditing to monitor file deletions.\\n-- PowerShell: `Get-WinEvent -FilterHashtable @{LogName='Security'; ID=4663} | Where-Object {$_.Message -like '*DELETE*'}`\\n-\\n-Linux\\n-\\n-- Auditd: Use audit rules to capture file deletion events: `auditctl -a always,exit -F arch=b64 -S unlink -S rename -S rmdir -k file_deletion`\\n-- Query logs: `ausearch -k file_deletion`\\n-- Inotify: Use inotifywait to monitor file deletions: `inotifywait -m /path/to/watch -e delete`\\n-\\n-macOS\\n-\\n-- Endpoint Security Framework (ESF): Monitor events like ES_EVENT_TYPE_AUTH_UNLINK to capture file deletion activities.\\n-- FSEvents: Track file deletion activities in real-time: `fs_usage | grep unlink`\\n-\\n-SIEM Integration\\n-\\n-- Forward file deletion logs to a SIEM for centralized monitoring and correlation with other events.\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Refers to events where files are removed from a system or stt1Refers to events where files are removed from a system or st
>orage device. These events can indicate legitimate housekeep>orage device. These events can indicate legitimate housekeep
>ing activities or malicious actions such as attackers attemp>ing activities or malicious actions such as attackers attemp
>ting to cover their tracks. Monitoring file deletions helps >ting to cover their tracks. Monitoring file deletions helps 
>organizations identify unauthorized or suspicious activities>organizations identify unauthorized or suspicious activities
>.  This data component can be collected through the followin>.
>g measures:  Windows  - Sysmon: Event ID 23: Logs file delet 
>ion events, including details such as file paths and respons 
>ible processes. - Windows Event Log: Enable \"Object Access\"  
>auditing to monitor file deletions. - PowerShell: `Get-WinEv 
>ent -FilterHashtable @{LogName='Security'; ID=4663} | Where- 
>Object {$_.Message -like '*DELETE*'}`  Linux  - Auditd: Use  
>audit rules to capture file deletion events: `auditctl -a al 
>ways,exit -F arch=b64 -S unlink -S rename -S rmdir -k file_d 
>eletion` - Query logs: `ausearch -k file_deletion` - Inotify 
>: Use inotifywait to monitor file deletions: `inotifywait -m 
> /path/to/watch -e delete`  macOS  - Endpoint Security Frame 
>work (ESF): Monitor events like ES_EVENT_TYPE_AUTH_UNLINK to 
> capture file deletion activities. - FSEvents: Track file de 
>letion activities in real-time: `fs_usage | grep unlink`  SI 
>EM Integration  - Forward file deletion logs to a SIEM for c 
>entralized monitoring and correlation with other events.  
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--639e87f3-acb6-448a-9645-258f20da4bc5", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.273000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0059", + "external_id": "DC0059" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "File Metadata", + "description": "contextual information about a file, including attributes such as the file's name, size, type, content (e.g., signatures, headers, media), user/owner, permissions, timestamps, and other related properties. File metadata provides insights into a file's characteristics and can be used to detect malicious activity, unauthorized modifications, or other anomalies. Examples: \n\n- File Ownership and Permissions: Checking the owner and permissions of a critical configuration file like /etc/passwd on Linux or C:\\Windows\\System32\\config\\SAM on Windows.\n- Timestamps: Analyzing the creation, modification, and access timestamps of a file.\n- File Content and Signatures: Extracting the headers of an executable file to verify its signature or detect packing/obfuscation.\n- File Attributes: Analyzing attributes like hidden, system, or read-only flags in Windows.\n- File Hashes: Generating MD5, SHA-1, or SHA-256 hashes of files to compare against threat intelligence feeds.\n- File Location: Monitoring files located in unusual directories or paths, such as temporary or user folders.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "File", + "channel": "None" + }, + { + "name": "linux:osquery", + "channel": "event-based" + }, + { + "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational", + "channel": "Invalid/Unsigned image when developer tool launches newly installed binaries" + }, + { + "name": "journald:package", + "channel": "dpkg/apt or yum/dnf transaction logs (install/update of build tools)" + }, + { + "name": "linux:osquery", + "channel": "file_events, hash" + }, + { + "name": "macos:unifiedlog", + "channel": "softwareupdated/homebrew/install logs, pkginstalld events" + }, + { + "name": "macos:unifiedlog", + "channel": "AMFI or Gatekeeper signature/notarization failures for newly installed dev components" + }, + { + "name": "auditd:SYSCALL", + "channel": "Inotify watch creation or auditctl changes on /etc/cron* or /lib/systemd/system/" + }, + { + "name": "linux:syslog", + "channel": "Discrepancies in _VBA_PROJECT p-code vs source code extracted with oletools/pcodedmp" + }, + { + "name": "macos:unifiedlog", + "channel": "Detection of altered _VBA_PROJECT or PerformanceCache streams" + }, + { + "name": "EDR:file", + "channel": "File Metadata Inspection (Low String Entropy, Missing PDB)" + }, + { + "name": "linux:osquery", + "channel": "hash, elf_info, file_metadata" + }, + { + "name": "macos:osquery", + "channel": "code_signing, file_metadata" + }, + { + "name": "WinEventLog:Windows Defender", + "channel": "Operational log" + }, + { + "name": "macos:unifiedlog", + "channel": "subsystem:syspolicyd" + }, + { + "name": "macos:unifiedlog", + "channel": "File metadata updated with UF_HIDDEN flag" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "EventCode=15" + }, + { + "name": "auditd:PATH", + "channel": "file path matches exclusion directories" + }, + { + "name": "auditd:SYSCALL", + "channel": "PATH" + }, + { + "name": "auditd:PATH", + "channel": "PATH" + }, + { + "name": "macos:endpointsecurity", + "channel": "es_event_file_rename_t or es_event_file_write_t" + }, + { + "name": "linux:osquery", + "channel": "file_events" + }, + { + "name": "fs:fileevents", + "channel": "/var/log/install.log" + }, + { + "name": "auditd:SYSCALL", + "channel": "file write after sleep delay" + }, + { + "name": "esxi:vmkernel", + "channel": "Upload of file to datastore" + }, + { + "name": "ebpf:syscalls", + "channel": "Unexpected container volume unmount + file deletion" + }, + { + "name": "macos:osquery", + "channel": "file_events" + }, + { + "name": "EDR:file", + "channel": "File Metadata Analysis (PE overlays, entropy)" + }, + { + "name": "linux:osquery", + "channel": "elf_info, hash, yara_matches" + }, + { + "name": "macos:osquery", + "channel": "mach_o_info, file_metadata" + }, + { + "name": "macos:unifiedlog", + "channel": "Code signature validation fails or is absent post-binary modification" + }, + { + "name": "fs:filesystem", + "channel": "Binary file hash changes outside of update/patch cycles" + }, + { + "name": "linux:osquery", + "channel": "Read headers and detect MIME type mismatch" + }, + { + "name": "macos:unifiedlog", + "channel": "Code signing verification failures or bypassed trust decisions" + }, + { + "name": "NSM:Flow", + "channel": "Observed File Transfers" + }, + { + "name": "esxi:vmkernel", + "channel": "Storage access and file ops" + }, + { + "name": "macos:unifiedlog", + "channel": "Creation of new LaunchAgent or LoginItem plist files in ~/Library/LaunchAgents/" + }, + { + "name": "auditd:CONFIG_CHANGE", + "channel": "chmod or chown of hook files indicating privilege escalation or execution permission change" + }, + { + "name": "macos:unifiedlog", + "channel": "filesystem events" + }, + { + "name": "macos:unifiedlog", + "channel": "xattr -d com.apple.quarantine or similar attribute removal commands" + }, + { + "name": "macos:unifiedlog", + "channel": "Gatekeeper quarantine policy decision anomalies recorded in com.apple.LaunchServices.QuarantineEventsV2" + }, + { + "name": "linux:syslog", + "channel": "application or system execution logs" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "name": "auditd:SYSCALL", + "channel": "syscall in (chmod, fchmod, fchmodat, chown, fchown, fchownat, setxattr, lsetxattr, fsetxattr)" + }, + { + "name": "linux:syslog", + "channel": "file permission modification events in kernel messages" + }, + { + "name": "fs:fsevents", + "channel": "file system events indicating permission or attribute changes" + }, + { + "name": "OpenBSM:AuditTrail", + "channel": "BSM audit events for file permission modifications" + }, + { + "name": "esxi:hostd", + "channel": "host daemon events related to file or VM permission changes" + }, + { + "name": "esxi:vmkernel", + "channel": "VMware kernel events for file system permission modifications" + }, + { + "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational", + "channel": "Unsigned or invalid image for newly installed/updated binaries" + }, + { + "name": "journald:package", + "channel": "dpkg/apt/yum/dnf transaction logs; vendor updaters in systemd journals" + }, + { + "name": "macos:unifiedlog", + "channel": "pkginstalld/softwareupdated/Homebrew install transactions" + }, + { + "name": "macos:unifiedlog", + "channel": "AMFI/Gatekeeper code signature or notarization failures" + }, + { + "name": "EDR:detection", + "channel": "App reputation telemetry" + }, + { + "name": "gatekeeper/quarantine database", + "channel": "LaunchServices quarantine" + }, + { + "name": "linux:osquery", + "channel": "file_events.path" + }, + { + "name": "auditd:SYSCALL", + "channel": "setuid or setgid bit changes" + }, + { + "name": "linux:osquery", + "channel": "Filesystem modifications to trusted paths" + }, + { + "name": "fs:fsusage", + "channel": "filesystem monitoring of exec/open" + }, + { + "name": "auditd:SYSCALL", + "channel": "syscall in (chmod, fchmod, fchmodat, chown, fchown, fchownat, lchown, setxattr, lsetxattr, fsetxattr, removexattr, lremovexattr, fremovexattr)" + }, + { + "name": "auditd:PATH", + "channel": "file path modifications on critical system directories (/etc, /usr/bin, /usr/sbin, /var, /opt)" + }, + { + "name": "linux:syslog", + "channel": "kernel messages related to file system permission changes and security violations" + }, + { + "name": "OpenBSM:AuditTrail", + "channel": "BSM audit events for file permission, ownership, and attribute modifications with user context" + }, + { + "name": "macos:unifiedlog", + "channel": "kernel extension and system extension logs related to file system security violations or SIP bypass attempts" + }, + { + "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational", + "channel": "Code integrity violations in boot-start drivers or firmware" + }, + { + "name": "fwupd:logs", + "channel": "Firmware updates applied or failed" + }, + { + "name": "macos:endpointsecurity", + "channel": "es_event_authentication" + }, + { + "name": "esxi:vmkernel", + "channel": "Datastore modification events" + }, + { + "name": "linux:osquery", + "channel": "Write or modify .desktop file in XDG autostart path" + }, + { + "name": "macos:unifiedlog", + "channel": "Unexpected application binary modifications or altered signing status" + }, + { + "name": "auditd:SYSCALL", + "channel": "setxattr or getxattr system call" + }, + { + "name": "macos:unifiedlog", + "channel": "extended attribute write or modification" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4656, 4658" + }, + { + "name": "auditd:SYSCALL", + "channel": "chmod, chown, setxattr, or file writes to /etc/ssl/* or /usr/local/share/ca-certificates/*" + }, + { + "name": "macos:unifiedlog", + "channel": "New certificate trust settings added by unexpected process" + }, + { + "name": "esxi:syslog", + "channel": "Datastore file hidden or renamed unexpectedly" + }, + { + "name": "WinEventLog:Windows Defender", + "channel": "Operational" + }, + { + "name": "macos:unifiedlog", + "channel": "subsystem=com.apple.lsd" + }, + { + "name": "saas:RepoEvents", + "channel": "New file added or modified in PR targeting CI/CD or build config (e.g., `gitlab-ci.yml`, `build.gradle`, `pom.xml`, `.github/workflows/*.yml`)" + }, + { + "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational", + "channel": "CodeIntegrity reports 'Invalid image hash' or 'Unsigned image' for new/updated binaries" + }, + { + "name": "WinEventLog:Microsoft-Windows-Windows Defender/Operational", + "channel": "SmartScreen or ASR blocks on newly downloaded installer/updater" + }, + { + "name": "WinEventLog:Setup", + "channel": "MSI/Product install, repair or update events" + }, + { + "name": "journald:package", + "channel": "dpkg/apt install, remove, upgrade events" + }, + { + "name": "journald:package", + "channel": "yum/dnf install or update transactions" + }, + { + "name": "linux:osquery", + "channel": "hash, rpm_packages, deb_packages, file_events" + }, + { + "name": "macos:unifiedlog", + "channel": "installer or system_installd 'PackageKit: install succeeded/failed' with non-notarized or unknown signer" + }, + { + "name": "macos:unifiedlog", + "channel": "Gatekeeper/AMFI 'code signature invalid' / 'not notarized' messages" + }, + { + "name": "networkdevice:syslog", + "channel": "OS version query results inconsistent with expected or approved version list" + }, + { + "name": "macos:unifiedlog", + "channel": "File creation or modification with com.apple.ResourceFork extended attribute" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:35.397000+00:00\"}, \"root['description']\": {\"new_value\": \"contextual information about a file, including attributes such as the file's name, size, type, content (e.g., signatures, headers, media), user/owner, permissions, timestamps, and other related properties. File metadata provides insights into a file's characteristics and can be used to detect malicious activity, unauthorized modifications, or other anomalies. Examples: \\n\\n- File Ownership and Permissions: Checking the owner and permissions of a critical configuration file like /etc/passwd on Linux or C:\\\\Windows\\\\System32\\\\config\\\\SAM on Windows.\\n- Timestamps: Analyzing the creation, modification, and access timestamps of a file.\\n- File Content and Signatures: Extracting the headers of an executable file to verify its signature or detect packing/obfuscation.\\n- File Attributes: Analyzing attributes like hidden, system, or read-only flags in Windows.\\n- File Hashes: Generating MD5, SHA-1, or SHA-256 hashes of files to compare against threat intelligence feeds.\\n- File Location: Monitoring files located in unusual directories or paths, such as temporary or user folders.\", \"old_value\": \"contextual information about a file, including attributes such as the file's name, size, type, content (e.g., signatures, headers, media), user/owner, permissions, timestamps, and other related properties. File metadata provides insights into a file's characteristics and can be used to detect malicious activity, unauthorized modifications, or other anomalies. Examples: \\n\\n- File Ownership and Permissions: Checking the owner and permissions of a critical configuration file like /etc/passwd on Linux or C:\\\\Windows\\\\System32\\\\config\\\\SAM on Windows.\\n- Timestamps: Analyzing the creation, modification, and access timestamps of a file.\\n- File Content and Signatures: Extracting the headers of an executable file to verify its signature or detect packing/obfuscation.\\n- File Attributes: Analyzing attributes like hidden, system, or read-only flags in Windows.\\n- File Hashes: Generating MD5, SHA-1, or SHA-256 hashes of files to compare against threat intelligence feeds.\\n- File Location: Monitoring files located in unusual directories or paths, such as temporary or user folders.\\n\\nThis data component can be collected through the following measures:\\n\\nWindows\\n\\n- Sysinternals Tools: Use `AccessEnum` or `PSFile` to retrieve metadata about file access and permissions.\\n- Windows Event Logs: Enable object access auditing and monitor events like 4663 (Object Access) and 5140 (A network share object was accessed).\\n- PowerShell: Use Get-Item or Get-ChildItem cmdlets: `Get-ChildItem -Path \\\"C:\\\\Path\\\\To\\\\Directory\\\" -Recurse | Select-Object Name, Length, LastWriteTime, Attributes`\\n\\nLinux\\n\\n- File System Commands: Use `ls -l` or stat to retrieve file metadata: `stat /path/to/file`\\n- Auditd: Configure audit rules to log metadata access: `auditctl -w /path/to/file -p wa -k file_metadata`\\n- Filesystem Integrity Tools: Tools like tripwire or AIDE (Advanced Intrusion Detection Environment) can monitor file metadata changes.\\n\\nmacOS\\n\\n- FSEvents: Use FSEvents to track file metadata changes.\\n- Endpoint Security Framework (ESF): Capture metadata-related events via ESF APIs.\\n- Command-Line Tools: Use ls -l or xattr for file attributes: `ls -l@ /path/to/file`\\n\\nSIEM Integration\\n\\n- Forward file metadata logs from endpoint or network devices to a SIEM for centralized analysis.\", \"diff\": \"--- \\n+++ \\n@@ -6,27 +6,3 @@\\n - File Attributes: Analyzing attributes like hidden, system, or read-only flags in Windows.\\n - File Hashes: Generating MD5, SHA-1, or SHA-256 hashes of files to compare against threat intelligence feeds.\\n - File Location: Monitoring files located in unusual directories or paths, such as temporary or user folders.\\n-\\n-This data component can be collected through the following measures:\\n-\\n-Windows\\n-\\n-- Sysinternals Tools: Use `AccessEnum` or `PSFile` to retrieve metadata about file access and permissions.\\n-- Windows Event Logs: Enable object access auditing and monitor events like 4663 (Object Access) and 5140 (A network share object was accessed).\\n-- PowerShell: Use Get-Item or Get-ChildItem cmdlets: `Get-ChildItem -Path \\\"C:\\\\Path\\\\To\\\\Directory\\\" -Recurse | Select-Object Name, Length, LastWriteTime, Attributes`\\n-\\n-Linux\\n-\\n-- File System Commands: Use `ls -l` or stat to retrieve file metadata: `stat /path/to/file`\\n-- Auditd: Configure audit rules to log metadata access: `auditctl -w /path/to/file -p wa -k file_metadata`\\n-- Filesystem Integrity Tools: Tools like tripwire or AIDE (Advanced Intrusion Detection Environment) can monitor file metadata changes.\\n-\\n-macOS\\n-\\n-- FSEvents: Use FSEvents to track file metadata changes.\\n-- Endpoint Security Framework (ESF): Capture metadata-related events via ESF APIs.\\n-- Command-Line Tools: Use ls -l or xattr for file attributes: `ls -l@ /path/to/file`\\n-\\n-SIEM Integration\\n-\\n-- Forward file metadata logs from endpoint or network devices to a SIEM for centralized analysis.\"}, \"root['x_mitre_log_sources'][18]['channel']\": {\"new_value\": \"PATH\", \"old_value\": \"path\"}, \"root['x_mitre_log_sources'][42]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4670\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][73]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4663\"}, \"root['x_mitre_log_sources'][90]\": {\"name\": \"WinEventLog:Sysmon\", \"channel\": \"EventCode=15 \"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1contextual information about a file, including attributes sut1contextual information about a file, including attributes su
>ch as the file's name, size, type, content (e.g., signatures>ch as the file's name, size, type, content (e.g., signatures
>, headers, media), user/owner, permissions, timestamps, and >, headers, media), user/owner, permissions, timestamps, and 
>other related properties. File metadata provides insights in>other related properties. File metadata provides insights in
>to a file's characteristics and can be used to detect malici>to a file's characteristics and can be used to detect malici
>ous activity, unauthorized modifications, or other anomalies>ous activity, unauthorized modifications, or other anomalies
>. Examples:   - File Ownership and Permissions: Checking the>. Examples:   - File Ownership and Permissions: Checking the
> owner and permissions of a critical configuration file like> owner and permissions of a critical configuration file like
> /etc/passwd on Linux or C:\\Windows\\System32\\config\\SAM on W> /etc/passwd on Linux or C:\\Windows\\System32\\config\\SAM on W
>indows. - Timestamps: Analyzing the creation, modification, >indows. - Timestamps: Analyzing the creation, modification, 
>and access timestamps of a file. - File Content and Signatur>and access timestamps of a file. - File Content and Signatur
>es: Extracting the headers of an executable file to verify i>es: Extracting the headers of an executable file to verify i
>ts signature or detect packing/obfuscation. - File Attribute>ts signature or detect packing/obfuscation. - File Attribute
>s: Analyzing attributes like hidden, system, or read-only fl>s: Analyzing attributes like hidden, system, or read-only fl
>ags in Windows. - File Hashes: Generating MD5, SHA-1, or SHA>ags in Windows. - File Hashes: Generating MD5, SHA-1, or SHA
>-256 hashes of files to compare against threat intelligence >-256 hashes of files to compare against threat intelligence 
>feeds. - File Location: Monitoring files located in unusual >feeds. - File Location: Monitoring files located in unusual 
>directories or paths, such as temporary or user folders.  Th>directories or paths, such as temporary or user folders.
>is data component can be collected through the following mea 
>sures:  Windows  - Sysinternals Tools: Use `AccessEnum` or ` 
>PSFile` to retrieve metadata about file access and permissio 
>ns. - Windows Event Logs: Enable object access auditing and  
>monitor events like 4663 (Object Access) and 5140 (A network 
> share object was accessed). - PowerShell: Use Get-Item or G 
>et-ChildItem cmdlets: `Get-ChildItem -Path \"C:\\Path\\To\\Direc 
>tory\" -Recurse | Select-Object Name, Length, LastWriteTime,  
>Attributes`  Linux  - File System Commands: Use `ls -l` or s 
>tat to retrieve file metadata: `stat /path/to/file` - Auditd 
>: Configure audit rules to log metadata access: `auditctl -w 
> /path/to/file -p wa -k file_metadata` - Filesystem Integrit 
>y Tools: Tools like tripwire or AIDE (Advanced Intrusion Det 
>ection Environment) can monitor file metadata changes.  macO 
>S  - FSEvents: Use FSEvents to track file metadata changes.  
>- Endpoint Security Framework (ESF): Capture metadata-relate 
>d events via ESF APIs. - Command-Line Tools: Use ls -l or xa 
>ttr for file attributes: `ls -l@ /path/to/file`  SIEM Integr 
>ation  - Forward file metadata logs from endpoint or network 
> devices to a SIEM for centralized analysis. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.273000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0061", + "external_id": "DC0061" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "File Modification", + "description": "Changes made to a file, including updates to its contents, metadata, access permissions, or attributes. These modifications may indicate legitimate activity (e.g., software updates) or unauthorized changes (e.g., tampering, ransomware, or adversarial modifications). Examples: \n\n- Content Modifications: Changes to the content of a configuration file, such as modifying `/etc/ssh/sshd_config` on Linux or `C:\\Windows\\System32\\drivers\\etc\\hosts` on Windows.\n- Permission Changes: Altering file permissions to allow broader access, such as changing a file from `644` to `777` on Linux or modifying NTFS permissions on Windows.\n- Attribute Modifications: Changing a file's attributes to hidden, read-only, or system on Windows.\n- Timestamp Manipulation: Adjusting a file's creation or modification timestamp using tools like `touch` in Linux or timestomping tools on Windows.\n- Software or System File Changes: Modifying system files such as `boot.ini`, kernel modules, or application binaries.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "File", + "channel": "None" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/write calls modifying ~/.bashrc, ~/.profile, or /etc/paths.d" + }, + { + "name": "macos:unifiedlog", + "channel": "File modification in /etc/paths.d or user shell rc files" + }, + { + "name": "fs:fileevents", + "channel": "/var/log/quarantine.log" + }, + { + "name": "macos:unifiedlog", + "channel": "Modification of ~/Library/LaunchAgents or /Library/LaunchDaemons plist" + }, + { + "name": "auditd:SYSCALL", + "channel": "open, write" + }, + { + "name": "auditd:SYSCALL", + "channel": "AUDIT_SYSCALL (open, write, rename, unlink)" + }, + { + "name": "macos:endpointsecurity", + "channel": "ES_EVENT_TYPE_NOTIFY_WRITE, targeting .zshrc, .zlogin, .zprofile" + }, + { + "name": "fs:fileevents", + "channel": "/var/log/install.log" + }, + { + "name": "auditd:SYSCALL", + "channel": "PATH" + }, + { + "name": "macos:osquery", + "channel": "file_events" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "EventCode=2" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve call for modification of /etc/sudoers or writing to /var/db/sudo" + }, + { + "name": "auditd:SYSCALL", + "channel": "open, write: File modifications under /etc/ssl/certs, /usr/local/share/ca-certificates, or /etc/pki/ca-trust/source/anchors" + }, + { + "name": "macos:osquery", + "channel": "query: Enumeration of root certificates showing unexpected additions" + }, + { + "name": "auditd:SYSCALL", + "channel": "open, unlink, rename: Suspicious file access, deletion, or modification of sensitive paths" + }, + { + "name": "macos:unifiedlog", + "channel": "Anomalous plist modifications or sensitive file overwrites by non-standard processes" + }, + { + "name": "auditd:FILE", + "channel": "Modification or deletion of /etc/audit/audit.rules or /etc/audit/audit.conf" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/write of .service unit files" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/write/unlink" + }, + { + "name": "macos:unifiedlog", + "channel": "loginwindow or desktopservices modified settings or files" + }, + { + "name": "ESXiLogs:messages", + "channel": "changes to /etc/motd or /etc/vmware/welcome" + }, + { + "name": "auditd:SYSCALL", + "channel": "write, rename" + }, + { + "name": "containerd:runtime", + "channel": "file change monitoring within /etc/cron.*, /tmp, or mounted volumes" + }, + { + "name": "esxi:cron", + "channel": "manual edits to /etc/rc.local.d/local.sh or cron.d" + }, + { + "name": "auditd:PATH", + "channel": "/etc/passwd or /etc/group file write" + }, + { + "name": "auditd:SYSCALL", + "channel": "write" + }, + { + "name": "macos:unifiedlog", + "channel": "SecurityAgentPlugins modification" + }, + { + "name": "macos:unifiedlog", + "channel": "write: File modifications to *.plist within LaunchAgents, LaunchDaemons, Application Support, or Preferences directories" + }, + { + "name": "linux:osquery", + "channel": "file_events" + }, + { + "name": "esxi:hostd", + "channel": "boot" + }, + { + "name": "networkdevice:syslog", + "channel": "config" + }, + { + "name": "macos:unifiedlog", + "channel": "Modification of backgrounditems.btm or creation of LoginItems subdirectory in .app bundle" + }, + { + "name": "fs:filesystem", + "channel": "Modification or creation of files matching 'com.apple.loginwindow.*.plist' in ~/Library/Preferences/ByHost" + }, + { + "name": "auditd:SYSCALL", + "channel": "write | PATH=/home/*/.ssh/authorized_keys" + }, + { + "name": "macos:auth", + "channel": "~/.ssh/authorized_keys" + }, + { + "name": "gcp:audit", + "channel": "compute.instances.setMetadata" + }, + { + "name": "azure:resource", + "channel": "PATCH vm/authorized_keys" + }, + { + "name": "esxi:shell", + "channel": "file write or edit" + }, + { + "name": "linux:syslog", + "channel": "rename" + }, + { + "name": "ebpf:syscalls", + "channel": "file_write" + }, + { + "name": "macos:unifiedlog", + "channel": "Modification of plist with apple.awt.UIElement set to TRUE" + }, + { + "name": "fs:fsusage", + "channel": "unlink, write" + }, + { + "name": "auditd:SYSCALL", + "channel": "open, write: Write operations targeting /dev/sda, /dev/nvme0n1, or EFI partition mounts" + }, + { + "name": "auditd:PATH", + "channel": "write: Modification of /boot/grub/*, /boot/efi/EFI/*, or initramfs images" + }, + { + "name": "networkdevice:config", + "channel": "config-change: timezone or ntp server configuration change after a time query command" + }, + { + "name": "macos:unifiedlog", + "channel": "replace existing dylibs" + }, + { + "name": "networkdevice:config", + "channel": "Configuration changes to boot variables, startup image paths, or checksum verification failures" + }, + { + "name": "firmware:update", + "channel": "Unexpected or unscheduled firmware updates, image overwrites, or failed signature validation" + }, + { + "name": "IntegrityCheck:ImageValidation", + "channel": "Checksum or hash mismatch between running image and known-good vendor-provided image" + }, + { + "name": "macos:osquery", + "channel": "File modifications in ~/Library/Preferences/" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/write to /etc/pam.d/*" + }, + { + "name": "macos:unifiedlog", + "channel": "Modification of /Library/Security/SecurityAgentPlugins" + }, + { + "name": "macos:unifiedlog", + "channel": "Modifications to Mail.app plist files controlling message rules" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "name": "auditd:SYSCALL", + "channel": "write: Modification of structured stored data by suspicious processes" + }, + { + "name": "linux:syslog", + "channel": "Unexpected log entries or malformed SQL operations in databases" + }, + { + "name": "macos:unifiedlog", + "channel": "Unexpected creation or modification of stored data files in protected directories" + }, + { + "name": "auditd:SYSCALL", + "channel": "openat, write, rename, unlink" + }, + { + "name": "macos:unifiedlog", + "channel": "file encrypted|new file with .encrypted extension|disk write burst" + }, + { + "name": "esxi:vmkernel", + "channel": "rename .vmdk to .*.locked|datastore write spike" + }, + { + "name": "macos:unifiedlog", + "channel": "Mach-O binary modified or LC_LOAD_DYLIB segment inserted" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/write syscalls targeting /etc/ld.so.preload or binaries in /usr/bin" + }, + { + "name": "macos:unifiedlog", + "channel": "Modified application plist or binary replacement in /Applications" + }, + { + "name": "esxi:shell", + "channel": "admin command usage" + }, + { + "name": "networkdevice:syslog", + "channel": "startup-config" + }, + { + "name": "macos:unifiedlog", + "channel": "File creation or overwrite in common web-hosting folders" + }, + { + "name": "esxi:vmkernel", + "channel": "Unauthorized file modifications within datastore volumes via shell access or vCLI" + }, + { + "name": "networkdevice:config", + "channel": "Configuration changes referencing 'crypto', 'key length', 'cipher', or downgrade of encryption settings" + }, + { + "name": "FirmwareLogs:Update", + "channel": "Unexpected firmware or image updates modifying cryptographic modules" + }, + { + "name": "fs:plist", + "channel": "/var/root/Library/Preferences/com.apple.loginwindow.plist" + }, + { + "name": "auditd:SYSCALL", + "channel": "modification of existing .service file" + }, + { + "name": "auditd:PATH", + "channel": "write or create events on *.pth, sitecustomize.py, usercustomize.py in site-packages or dist-packages" + }, + { + "name": "macos:unifiedlog", + "channel": "write of plist files in /Library/LaunchAgents or /Library/LaunchDaemons" + }, + { + "name": "WinEventLog:System", + "channel": "Unexpected modification to lsass.exe or cryptdll.dll" + }, + { + "name": "networkconfig", + "channel": "unexpected OS image file upload or modification events" + }, + { + "name": "network:runtime", + "channel": "checksum or runtime memory verification failures" + }, + { + "name": "macos:unifiedlog", + "channel": "write" + }, + { + "name": "auditd:SYSCALL", + "channel": "open, write: Modification of /boot/grub/* or /boot/efi/*" + }, + { + "name": "macos:unifiedlog", + "channel": "Modification of /System/Library/CoreServices/boot.efi" + }, + { + "name": "macos:unifiedlog", + "channel": "Modification of LaunchAgents or LaunchDaemons plist files" + }, + { + "name": "auditd:SYSCALL", + "channel": "chmod" + }, + { + "name": "auditd:SYSCALL", + "channel": "rename,chmod" + }, + { + "name": "fs:fsevents", + "channel": "create/write/rename under user-writable paths" + }, + { + "name": "macos:osquery", + "channel": "Changes to LSFileQuarantineEnabled field in Info.plist" + }, + { + "name": "fs:fsusage", + "channel": "file access to /usr/lib/cron/tabs/ and cron output files" + }, + { + "name": "esxi:hostd", + "channel": "modification of crontab or local.sh entries" + }, + { + "name": "networkdevice:config", + "channel": "Configuration file modified or replaced on network device" + }, + { + "name": "macos:unifiedlog", + "channel": "Plist modifications containing virtualization run configurations" + }, + { + "name": "fs:fsusage", + "channel": "file access to /usr/lib/cron/at and job execution path" + }, + { + "name": "macos:unifiedlog", + "channel": "binary modified or replaced" + }, + { + "name": "esxi:hostd", + "channel": "binary or module replacement event" + }, + { + "name": "networkdevice:config", + "channel": "Configuration change events referencing encryption, TLS/SSL, or IPSec settings" + }, + { + "name": "networkdevice:firmware", + "channel": "Unexpected firmware update or image modification affecting crypto modules" + }, + { + "name": "fs:fsevents", + "channel": "file system events indicating permission, ownership, or extended attribute changes on critical paths. File system modification events with kFSEventStreamEventFlagItemChangeOwner, kFSEventStreamEventFlagItemXattrMod flags" + }, + { + "name": "auditd:FILE", + "channel": "Modification of Display Manager configuration files (/etc/gdm3/*, /etc/lightdm/*)" + }, + { + "name": "macos:unifiedlog", + "channel": "Modification of /Library/Preferences/com.apple.loginwindow plist" + }, + { + "name": "auditd:SYSCALL", + "channel": "Modification of user shell profile or trap registration via echo/redirection (e.g., echo \"trap 'malicious_cmd' INT\" >> ~/.bashrc)" + }, + { + "name": "macos:unifiedlog", + "channel": "File write or append to .zshrc, .bash_profile, .zprofile, etc." + }, + { + "name": "auditd:SYSCALL", + "channel": "chmod, write, create, open" + }, + { + "name": "fs:fsevents", + "channel": "Extensions" + }, + { + "name": "auditd:SYSCALL", + "channel": "open, write: File writes to application binaries or libraries at runtime" + }, + { + "name": "macos:osquery", + "channel": "CALCULATE: Mismatch in file integrity of critical macOS applications" + }, + { + "name": "auditd:SYSCALL", + "channel": "file write operations in /Library/WebServer/Documents" + }, + { + "name": "fs:launchdaemons", + "channel": "file_modify" + }, + { + "name": "auditd:PATH", + "channel": "write: File modifications to /etc/systemd/sleep.conf or related power configuration files" + }, + { + "name": "macos:unifiedlog", + "channel": "write: File modification to com.apple.PowerManagement.plist or related system preference files" + }, + { + "name": "fs:fsusage", + "channel": "modification of existing LaunchAgents plist" + }, + { + "name": "macos:unifiedlog", + "channel": "create/modify dylib in monitored directories" + }, + { + "name": "WinEventLog:CodeIntegrity", + "channel": "EventCode=3033" + }, + { + "name": "auditd:SYSCALL", + "channel": "write operation on /etc/passwd or /etc/shadow" + }, + { + "name": "macos:unifiedlog", + "channel": "modification to /var/db/dslocal/nodes/Default/users/" + }, + { + "name": "linux:osquery", + "channel": "New or modified kernel object files (.ko) within /lib/modules directory" + }, + { + "name": "macos:osquery", + "channel": "Modifications to /var/db/SystemPolicyConfiguration/KextPolicy or kext_policy table" + }, + { + "name": "networkdevice:audit", + "channel": "SNMP configuration changes, such as enabling read/write access or modifying community strings" + }, + { + "name": "macos:osquery", + "channel": "write" + }, + { + "name": "auditd:SYSCALL", + "channel": "mount or losetup commands creating hidden or encrypted FS" + }, + { + "name": "macos:unifiedlog", + "channel": "Hidden volume attachment or modification events" + }, + { + "name": "macos:unifiedlog", + "channel": "Suspicious plist edits for volume mounting behavior" + }, + { + "name": "networkdevice:config", + "channel": "Configuration changes to startup image paths, boot loader parameters, or debug flags" + }, + { + "name": "networkdevice:syslog", + "channel": "Checksum/hash mismatch between device OS image and baseline known-good version" + }, + { + "name": "macos:unifiedlog", + "channel": "file writes" + }, + { + "name": "m365:defender", + "channel": "OfficeTelemetry or DLP" + }, + { + "name": "fs:fsusage", + "channel": "Filesystem Access Logging" + }, + { + "name": "networkdevice:config", + "channel": "Configuration changes referencing cryptographic hardware modules or disabling hardware acceleration" + }, + { + "name": "FirmwareLogs:Update", + "channel": "Unexpected firmware updates that alter encryption libraries or disable hardware crypto modules" + }, + { + "name": "m365:office", + "channel": "Anomalous editing of invoice or payment document templates" + }, + { + "name": "fs:fsusage", + "channel": "truncate, unlink, write" + }, + { + "name": "macos:unifiedlog", + "channel": "Modification or replacement of /Library/Application Support/com.apple.TCC/TCC.db or ~/Library/Application Support/com.apple.TCC/TCC.db" + }, + { + "name": "linux:fim", + "channel": "Changes to /etc/rc.local.d/local.sh or creation of unexpected startup files in persistent partitions (/etc/init.d, /store, /locker)" + }, + { + "name": "macos:endpointsecurity", + "channel": "write, rename" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/write to /proc/*/mem or /proc/*/maps" + }, + { + "name": "sysdig:file", + "channel": "evt.type=write" + }, + { + "name": "macos:unifiedlog", + "channel": "rule definitions written to emond rule plists" + }, + { + "name": "networkdevice:config", + "channel": "Configuration changes referencing older image versions or unexpected boot parameters" + }, + { + "name": "FileIntegrity:ImageValidation", + "channel": "Hash/checksum mismatch against baseline vendor-provided OS image versions" + }, + { + "name": "auditd:SYSCALL", + "channel": "write or rename to /etc/systemd/system or /etc/init.d" + }, + { + "name": "fs:fsusage", + "channel": "file write to launchd plist paths" + }, + { + "name": "auditd:SYSCALL", + "channel": "modification of entrypoint scripts or init containers" + }, + { + "name": "fs:plist_monitoring", + "channel": "/Users/*/Library/Mail/V*/MailData/RulesActiveState.plist" + }, + { + "name": "auditd:SYSCALL", + "channel": "chmod/chown to /etc/passwd or /etc/shadow" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/write syscalls targeting web directory files" + }, + { + "name": "macos:unifiedlog", + "channel": "Terminal/Editor processes modifying web folder" + }, + { + "name": "esxi:vmkernel", + "channel": "/var/log/vmkernel.log" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:35.239000+00:00\"}, \"root['description']\": {\"new_value\": \"Changes made to a file, including updates to its contents, metadata, access permissions, or attributes. These modifications may indicate legitimate activity (e.g., software updates) or unauthorized changes (e.g., tampering, ransomware, or adversarial modifications). Examples: \\n\\n- Content Modifications: Changes to the content of a configuration file, such as modifying `/etc/ssh/sshd_config` on Linux or `C:\\\\Windows\\\\System32\\\\drivers\\\\etc\\\\hosts` on Windows.\\n- Permission Changes: Altering file permissions to allow broader access, such as changing a file from `644` to `777` on Linux or modifying NTFS permissions on Windows.\\n- Attribute Modifications: Changing a file's attributes to hidden, read-only, or system on Windows.\\n- Timestamp Manipulation: Adjusting a file's creation or modification timestamp using tools like `touch` in Linux or timestomping tools on Windows.\\n- Software or System File Changes: Modifying system files such as `boot.ini`, kernel modules, or application binaries.\", \"old_value\": \"Changes made to a file, including updates to its contents, metadata, access permissions, or attributes. These modifications may indicate legitimate activity (e.g., software updates) or unauthorized changes (e.g., tampering, ransomware, or adversarial modifications). Examples: \\n\\n- Content Modifications: Changes to the content of a configuration file, such as modifying `/etc/ssh/sshd_config` on Linux or `C:\\\\Windows\\\\System32\\\\drivers\\\\etc\\\\hosts` on Windows.\\n- Permission Changes: Altering file permissions to allow broader access, such as changing a file from `644` to `777` on Linux or modifying NTFS permissions on Windows.\\n- Attribute Modifications: Changing a file's attributes to hidden, read-only, or system on Windows.\\n- Timestamp Manipulation: Adjusting a file's creation or modification timestamp using tools like `touch` in Linux or timestomping tools on Windows.\\n- Software or System File Changes: Modifying system files such as `boot.ini`, kernel modules, or application binaries.\\n\\nThis data component can be collected through the following measures:\\n\\nWindows\\n\\n- Event Logs: Enable file system auditing to monitor file modifications using Security Event ID 4670 (File System Audit) or Sysmon Event ID 2 (File creation time changed).\\n- PowerShell: Use Get-ItemProperty or Get-Acl cmdlets to monitor file properties: `Get-Item -Path \\\"C:\\\\path\\\\to\\\\file\\\" | Select-Object Name, Attributes, LastWriteTime`\\n\\nLinux\\n\\n- File System Monitoring: Use tools like auditd with rules to monitor file modifications: `auditctl -w /path/to/file -p wa -k file_modification`\\n- Inotify: Use inotifywait to watch for real-time changes to files or directories: `inotifywait -m /path/to/file`\\n\\nmacOS\\n\\n- Endpoint Security Framework (ESF): Monitor file modification events using ESF APIs.\\n- Audit Framework: Configure audit rules to track file changes.\\n- Command-Line Tools: Use fs_usage to monitor file activities: `fs_usage -w /path/to/file`\\n\\nSIEM Tools\\n\\n- Collect logs from endpoint agents (e.g., Sysmon, Auditd) and file servers to centralize file modification event data.\", \"diff\": \"--- \\n+++ \\n@@ -5,25 +5,3 @@\\n - Attribute Modifications: Changing a file's attributes to hidden, read-only, or system on Windows.\\n - Timestamp Manipulation: Adjusting a file's creation or modification timestamp using tools like `touch` in Linux or timestomping tools on Windows.\\n - Software or System File Changes: Modifying system files such as `boot.ini`, kernel modules, or application binaries.\\n-\\n-This data component can be collected through the following measures:\\n-\\n-Windows\\n-\\n-- Event Logs: Enable file system auditing to monitor file modifications using Security Event ID 4670 (File System Audit) or Sysmon Event ID 2 (File creation time changed).\\n-- PowerShell: Use Get-ItemProperty or Get-Acl cmdlets to monitor file properties: `Get-Item -Path \\\"C:\\\\path\\\\to\\\\file\\\" | Select-Object Name, Attributes, LastWriteTime`\\n-\\n-Linux\\n-\\n-- File System Monitoring: Use tools like auditd with rules to monitor file modifications: `auditctl -w /path/to/file -p wa -k file_modification`\\n-- Inotify: Use inotifywait to watch for real-time changes to files or directories: `inotifywait -m /path/to/file`\\n-\\n-macOS\\n-\\n-- Endpoint Security Framework (ESF): Monitor file modification events using ESF APIs.\\n-- Audit Framework: Configure audit rules to track file changes.\\n-- Command-Line Tools: Use fs_usage to monitor file activities: `fs_usage -w /path/to/file`\\n-\\n-SIEM Tools\\n-\\n-- Collect logs from endpoint agents (e.g., Sysmon, Auditd) and file servers to centralize file modification event data.\"}, \"root['x_mitre_log_sources'][8]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\", \"new_path\": \"root['x_mitre_log_sources'][54]['channel']\"}, \"root['x_mitre_log_sources'][59]['name']\": {\"new_value\": \"WinEventLog:CodeIntegrity\", \"old_value\": \"WinEventLog:Sysmon\", \"new_path\": \"root['x_mitre_log_sources'][109]['name']\"}, \"root['x_mitre_log_sources'][59]['channel']\": {\"new_value\": \"EventCode=3033\", \"old_value\": \"EvenCode=2\", \"new_path\": \"root['x_mitre_log_sources'][109]['channel']\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][55]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4656,4663\"}, \"root['x_mitre_log_sources'][76]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4670\"}, \"root['x_mitre_log_sources'][112]\": {\"name\": \"WinEventLog:Application\", \"channel\": \"81,3033\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Changes made to a file, including updates to its contents, mt1Changes made to a file, including updates to its contents, m
>etadata, access permissions, or attributes. These modificati>etadata, access permissions, or attributes. These modificati
>ons may indicate legitimate activity (e.g., software updates>ons may indicate legitimate activity (e.g., software updates
>) or unauthorized changes (e.g., tampering, ransomware, or a>) or unauthorized changes (e.g., tampering, ransomware, or a
>dversarial modifications). Examples:   - Content Modificatio>dversarial modifications). Examples:   - Content Modificatio
>ns: Changes to the content of a configuration file, such as >ns: Changes to the content of a configuration file, such as 
>modifying `/etc/ssh/sshd_config` on Linux or `C:\\Windows\\Sys>modifying `/etc/ssh/sshd_config` on Linux or `C:\\Windows\\Sys
>tem32\\drivers\\etc\\hosts` on Windows. - Permission Changes: A>tem32\\drivers\\etc\\hosts` on Windows. - Permission Changes: A
>ltering file permissions to allow broader access, such as ch>ltering file permissions to allow broader access, such as ch
>anging a file from `644` to `777` on Linux or modifying NTFS>anging a file from `644` to `777` on Linux or modifying NTFS
> permissions on Windows. - Attribute Modifications: Changing> permissions on Windows. - Attribute Modifications: Changing
> a file's attributes to hidden, read-only, or system on Wind> a file's attributes to hidden, read-only, or system on Wind
>ows. - Timestamp Manipulation: Adjusting a file's creation o>ows. - Timestamp Manipulation: Adjusting a file's creation o
>r modification timestamp using tools like `touch` in Linux o>r modification timestamp using tools like `touch` in Linux o
>r timestomping tools on Windows. - Software or System File C>r timestomping tools on Windows. - Software or System File C
>hanges: Modifying system files such as `boot.ini`, kernel mo>hanges: Modifying system files such as `boot.ini`, kernel mo
>dules, or application binaries.  This data component can be >dules, or application binaries.
>collected through the following measures:  Windows  - Event  
>Logs: Enable file system auditing to monitor file modificati 
>ons using Security Event ID 4670 (File System Audit) or Sysm 
>on Event ID 2 (File creation time changed). - PowerShell: Us 
>e Get-ItemProperty or Get-Acl cmdlets to monitor file proper 
>ties: `Get-Item -Path \"C:\\path\\to\\file\" | Select-Object Name 
>, Attributes, LastWriteTime`  Linux  - File System Monitorin 
>g: Use tools like auditd with rules to monitor file modifica 
>tions: `auditctl -w /path/to/file -p wa -k file_modification 
>` - Inotify: Use inotifywait to watch for real-time changes  
>to files or directories: `inotifywait -m /path/to/file`  mac 
>OS  - Endpoint Security Framework (ESF): Monitor file modifi 
>cation events using ESF APIs. - Audit Framework: Configure a 
>udit rules to track file changes. - Command-Line Tools: Use  
>fs_usage to monitor file activities: `fs_usage -w /path/to/f 
>ile`  SIEM Tools  - Collect logs from endpoint agents (e.g., 
> Sysmon, Auditd) and file servers to centralize file modific 
>ation event data. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--bf91faa8-0049-4870-810a-4df55e0b77ee", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.273000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0044", + "external_id": "DC0044" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Firewall Enumeration", + "description": "Querying and extracting a list of available firewalls or their associated configurations and rules. This activity can occur across host systems and cloud control planes, providing insight into the state and configuration of firewalls that protect the environment. Examples: \n\n- Querying Host-Based Firewalls: Using Windows PowerShell commands like `Get-NetFirewallRule` or Linux commands such as `iptables -L` or `firewalld --list-all`.\n- Cloud Firewall Rule Listing: Running commands like `az network firewall list` for Azure or `aws ec2 describe-security-groups` for AWS.\n- Using Management APIs: Leveraging APIs like Google Cloud Firewall's `list` API method or AWS's DescribeSecurityGroups API.\nIdentifying Misconfigurations: Extracting firewall rules to identify \u201callow all\u201d policies or rules that lack logging.\n- Enumerating with CLI Tools: Using CLI commands like `gcloud compute firewall-rules list` to extract firewall settings in Google Cloud.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['description']\": {\"new_value\": \"Querying and extracting a list of available firewalls or their associated configurations and rules. This activity can occur across host systems and cloud control planes, providing insight into the state and configuration of firewalls that protect the environment. Examples: \\n\\n- Querying Host-Based Firewalls: Using Windows PowerShell commands like `Get-NetFirewallRule` or Linux commands such as `iptables -L` or `firewalld --list-all`.\\n- Cloud Firewall Rule Listing: Running commands like `az network firewall list` for Azure or `aws ec2 describe-security-groups` for AWS.\\n- Using Management APIs: Leveraging APIs like Google Cloud Firewall's `list` API method or AWS's DescribeSecurityGroups API.\\nIdentifying Misconfigurations: Extracting firewall rules to identify \\u201callow all\\u201d policies or rules that lack logging.\\n- Enumerating with CLI Tools: Using CLI commands like `gcloud compute firewall-rules list` to extract firewall settings in Google Cloud.\", \"old_value\": \"Querying and extracting a list of available firewalls or their associated configurations and rules. This activity can occur across host systems and cloud control planes, providing insight into the state and configuration of firewalls that protect the environment. Examples: \\n\\n- Querying Host-Based Firewalls: Using Windows PowerShell commands like `Get-NetFirewallRule` or Linux commands such as `iptables -L` or `firewalld --list-all`.\\n- Cloud Firewall Rule Listing: Running commands like `az network firewall list` for Azure or `aws ec2 describe-security-groups` for AWS.\\n- Using Management APIs: Leveraging APIs like Google Cloud Firewall's `list` API method or AWS's DescribeSecurityGroups API.\\nIdentifying Misconfigurations: Extracting firewall rules to identify \\u201callow all\\u201d policies or rules that lack logging.\\n- Enumerating with CLI Tools: Using CLI commands like `gcloud compute firewall-rules list` to extract firewall settings in Google Cloud.\\n\\nThis data component can be collected through the following measures:\\n\\nCloud Control Plane\\n\\n- Azure Activity Logs:Collect logs from Azure Firewall to monitor rule listing commands. Enable logging for `az network firewall` commands.\\n- AWS CloudTrail: Monitor calls to `DescribeSecurityGroups` or `DescribeNetworkAcls` APIs.\\nGoogle Cloud Operations Suite: Collect logs for `gcloud compute firewall-rules list` or API calls to `firewalls.list`.\\n\\nHost-Based Firewalls\\n\\n- Windows Event Logs: Use PowerShell transcription logs to capture commands like `Get-NetFirewallRule`.\\n- Linux Auditd: Track executions of commands like `iptables -L` or `ufw status` using auditd: `auditctl -a always,exit -F arch=b64 -S execve -k firewall_enum`\\n- macOS: Monitor logs for firewall-related queries via the Console app or log monitoring tools.\\n\\nSIEM Integration\\n\\n- Collect logs from endpoints and cloud platforms to centralize data and detect enumeration activity.\\n\\nEndpoint Detection and Response (EDR)\\n\\n- Use EDR tools to track enumeration commands or API calls performed on managed devices.\\n\\nCSPM Tools\\n\\n- Deploy Cloud Security Posture Management tools to monitor for unauthorized enumeration of firewall rules or configurations.\", \"diff\": \"--- \\n+++ \\n@@ -5,29 +5,3 @@\\n - Using Management APIs: Leveraging APIs like Google Cloud Firewall's `list` API method or AWS's DescribeSecurityGroups API.\\n Identifying Misconfigurations: Extracting firewall rules to identify \\u201callow all\\u201d policies or rules that lack logging.\\n - Enumerating with CLI Tools: Using CLI commands like `gcloud compute firewall-rules list` to extract firewall settings in Google Cloud.\\n-\\n-This data component can be collected through the following measures:\\n-\\n-Cloud Control Plane\\n-\\n-- Azure Activity Logs:Collect logs from Azure Firewall to monitor rule listing commands. Enable logging for `az network firewall` commands.\\n-- AWS CloudTrail: Monitor calls to `DescribeSecurityGroups` or `DescribeNetworkAcls` APIs.\\n-Google Cloud Operations Suite: Collect logs for `gcloud compute firewall-rules list` or API calls to `firewalls.list`.\\n-\\n-Host-Based Firewalls\\n-\\n-- Windows Event Logs: Use PowerShell transcription logs to capture commands like `Get-NetFirewallRule`.\\n-- Linux Auditd: Track executions of commands like `iptables -L` or `ufw status` using auditd: `auditctl -a always,exit -F arch=b64 -S execve -k firewall_enum`\\n-- macOS: Monitor logs for firewall-related queries via the Console app or log monitoring tools.\\n-\\n-SIEM Integration\\n-\\n-- Collect logs from endpoints and cloud platforms to centralize data and detect enumeration activity.\\n-\\n-Endpoint Detection and Response (EDR)\\n-\\n-- Use EDR tools to track enumeration commands or API calls performed on managed devices.\\n-\\n-CSPM Tools\\n-\\n-- Deploy Cloud Security Posture Management tools to monitor for unauthorized enumeration of firewall rules or configurations.\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Querying and extracting a list of available firewalls or thet1Querying and extracting a list of available firewalls or the
>ir associated configurations and rules. This activity can oc>ir associated configurations and rules. This activity can oc
>cur across host systems and cloud control planes, providing >cur across host systems and cloud control planes, providing 
>insight into the state and configuration of firewalls that p>insight into the state and configuration of firewalls that p
>rotect the environment. Examples:   - Querying Host-Based Fi>rotect the environment. Examples:   - Querying Host-Based Fi
>rewalls: Using Windows PowerShell commands like `Get-NetFire>rewalls: Using Windows PowerShell commands like `Get-NetFire
>wallRule` or Linux commands such as `iptables -L` or `firewa>wallRule` or Linux commands such as `iptables -L` or `firewa
>lld --list-all`. - Cloud Firewall Rule Listing: Running comm>lld --list-all`. - Cloud Firewall Rule Listing: Running comm
>ands like `az network firewall list` for Azure or `aws ec2 d>ands like `az network firewall list` for Azure or `aws ec2 d
>escribe-security-groups` for AWS. - Using Management APIs: L>escribe-security-groups` for AWS. - Using Management APIs: L
>everaging APIs like Google Cloud Firewall's `list` API metho>everaging APIs like Google Cloud Firewall's `list` API metho
>d or AWS's DescribeSecurityGroups API. Identifying Misconfig>d or AWS's DescribeSecurityGroups API. Identifying Misconfig
>urations: Extracting firewall rules to identify \u201callow all\u201d >urations: Extracting firewall rules to identify \u201callow all\u201d 
>policies or rules that lack logging. - Enumerating with CLI >policies or rules that lack logging. - Enumerating with CLI 
>Tools: Using CLI commands like `gcloud compute firewall-rule>Tools: Using CLI commands like `gcloud compute firewall-rule
>s list` to extract firewall settings in Google Cloud.  This >s list` to extract firewall settings in Google Cloud.
>data component can be collected through the following measur 
>es:  Cloud Control Plane  - Azure Activity Logs:Collect logs 
> from Azure Firewall to monitor rule listing commands. Enabl 
>e logging for `az network firewall` commands. - AWS CloudTra 
>il: Monitor calls to `DescribeSecurityGroups` or `DescribeNe 
>tworkAcls` APIs. Google Cloud Operations Suite: Collect logs 
> for `gcloud compute firewall-rules list` or API calls to `f 
>irewalls.list`.  Host-Based Firewalls  - Windows Event Logs: 
> Use PowerShell transcription logs to capture commands like  
>`Get-NetFirewallRule`. - Linux Auditd: Track executions of c 
>ommands like `iptables -L` or `ufw status` using auditd: `au 
>ditctl -a always,exit -F arch=b64 -S execve -k firewall_enum 
>` - macOS: Monitor logs for firewall-related queries via the 
> Console app or log monitoring tools.  SIEM Integration  - C 
>ollect logs from endpoints and cloud platforms to centralize 
> data and detect enumeration activity.  Endpoint Detection a 
>nd Response (EDR)  - Use EDR tools to track enumeration comm 
>ands or API calls performed on managed devices.  CSPM Tools  
> - Deploy Cloud Security Posture Management tools to monitor 
> for unauthorized enumeration of firewall rules or configura 
>tions. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.272000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0018", + "external_id": "DC0018" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Host Status", + "description": "Logging, messaging, and other artifacts that highlight the health and operational state of host-based security sensors, such as Endpoint Detection and Response (EDR) agents, antivirus software, logging services, and system monitoring tools. Monitoring sensor health is essential for detecting misconfigurations, sensor failures, tampering, or deliberate security control evasion by adversaries.\n\n*Data Collection Measures:*\n\n- Windows Event Logs:\n - Event ID 1074 (System Shutdown): Detects unexpected system reboots/shutdowns.\n - Event ID 6006 (Event Log Stopped): Logs when Windows event logging is stopped.\n - Event ID 16 (Sysmon): Detects configuration state changes that may indicate log tampering.\n - Event ID 12 (Windows Defender Status Change) \u2013 Detects changes in Windows Defender state.\n- Linux/macOS Monitoring:\n - `/var/log/syslog`, `/var/log/auth.log`, `/var/log/kern.log`\n - Journald (journalctl) for kernel and system alerts.\n- Endpoint Detection and Response (EDR) Tools:\n - Monitor agent health status, detect sensor tampering, and alert on missing telemetry.\n- Mobile Threat Intelligence Logs:\n - Samsung Knox, SafetyNet, iOS Secure Enclave provide sensor health status for mobile endpoints.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Sensor Health", + "channel": "None" + }, + { + "name": "macos:osquery", + "channel": "interface_details " + }, + { + "name": "Windows:perfmon", + "channel": "Sustained CPU/memory exhaustion by service process (e.g., w3wp.exe)" + }, + { + "name": "macos:unifiedlog", + "channel": "Web service process (e.g., httpd) entering crash loop or consuming excessive CPU" + }, + { + "name": "AWS:CloudWatch", + "channel": "Sustained spike in CPU usage on EC2 instance with web service role" + }, + { + "name": "WinEventLog:System", + "channel": "System shutdowns due to bugcheck (Event ID 1001) or watchdog timer expirations" + }, + { + "name": "linux:syslog", + "channel": "Out of memory killer invoked or kernel panic entries" + }, + { + "name": "macos:unifiedlog", + "channel": "Spike in CPU or memory use from non-user-initiated processes" + }, + { + "name": "AWS:CloudWatch", + "channel": "StatusCheckFailed or StatusCheckFailed_System for burstable instances (t2/t3)" + }, + { + "name": "kubernetes:events", + "channel": "CrashLoopBackOff, OOMKilled, container restart count exceeds threshold" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "EventCode=16" + }, + { + "name": "Windows:perfmon", + "channel": "High sustained CPU usage by a single process" + }, + { + "name": "linux:procfs", + "channel": "Sustained high /proc/[pid]/stat usage" + }, + { + "name": "AWS:CloudWatch", + "channel": "Sustained EC2 CPU usage above normal baseline" + }, + { + "name": "prometheus:metrics", + "channel": "Container CPU/Memory usage exceeding threshold" + }, + { + "name": "linux:syslog", + "channel": "Service stop or disable messages for security tools not reflected in SIEM alerts" + }, + { + "name": "macos:unifiedlog", + "channel": "Termination or disabling of XProtect, Gatekeeper, or third-party AV daemons" + }, + { + "name": "AWS:CloudWatch", + "channel": "NetworkOut spike beyond baseline" + }, + { + "name": "WinEventLog:Microsoft-Windows-TCPIP", + "channel": "Connection queue overflow or failure to allocate TCP state object" + }, + { + "name": "NSM:Flow", + "channel": "TCP: possible SYN flood or backlog limit exceeded" + }, + { + "name": "macos:unifiedlog", + "channel": "network stack resource exhaustion, tcp_accept queue overflow, repeated resets" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=1166, 7045" + }, + { + "name": "auditd:SYSCALL", + "channel": "firmware_update, kexec_load" + }, + { + "name": "journald:boot", + "channel": "Secure Boot failure, firmware version change" + }, + { + "name": "macos:unifiedlog", + "channel": "EFI firmware integrity check failed" + }, + { + "name": "macos:syslog", + "channel": "Hardware UUID or device list drift" + }, + { + "name": "Windows:perfmon", + "channel": "Sudden spike in outbound throughput without corresponding inbound traffic" + }, + { + "name": "sar:network", + "channel": "Outbound network saturation with minimal process activity" + }, + { + "name": "AWS:CloudWatch", + "channel": "Sudden spike in network output without a corresponding inbound request ratio" + }, + { + "name": "Windows:perfmon", + "channel": "Sudden spikes in CPU/Memory usage linked to specific application processes" + }, + { + "name": "AWS:CloudMetrics", + "channel": "Autoscaling, memory/cpu alarms, or instance unhealthiness" + }, + { + "name": "macos:unifiedlog", + "channel": "System Integrity Protection (SIP) state reported as disabled" + }, + { + "name": "AWS:CloudWatch", + "channel": "Unusual CPU burst or metric anomalies" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=1074" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=6006" + }, + { + "name": "linux:syslog", + "channel": "system is powering down" + }, + { + "name": "macos:unifiedlog", + "channel": "System shutdown or reboot requested" + }, + { + "name": "esxi:hostd", + "channel": "Powering off or restarting host" + }, + { + "name": "networkdevice:syslog", + "channel": "System reboot scheduled or performed" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "mobile-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:37.544000+00:00\"}, \"root['x_mitre_log_sources'][13]['name']\": {\"new_value\": \"AWS:CloudWatch\", \"old_value\": \"CloudWatch:Metrics\"}, \"root['x_mitre_log_sources'][17]['name']\": {\"new_value\": \"AWS:CloudWatch\", \"old_value\": \"CloudWatch:InstanceMetrics\"}, \"root['x_mitre_log_sources'][30]['name']\": {\"new_value\": \"AWS:CloudMetrics\", \"old_value\": \"CloudMetrics:InstanceHealth\"}}}", + "previous_version": "2.0" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--b008766d-f34f-4ded-b712-659f59aaed6e", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.271000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0015", + "external_id": "DC0015" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Image Creation", + "description": "Initial construction of a virtual machine image within a cloud environment. Virtual machine images are templates containing an operating system and installed applications, which can be deployed to create new virtual machines. Monitoring the creation of these images is important because adversaries may create custom images to include malicious software or misconfigurations for later exploitation. Examples: \n\n- Azure Compute Service Image Creation\n - Example: Creating a virtual machine image in Azure using Azure CLI: `az image create --resource-group MyResourceGroup --name MyImage --source MyVM`\n- AWS EC2 AMI (Amazon Machine Image) Creation\n - Example: Creating an AMI from an EC2 instance: `aws ec2 create-image --instance-id i-1234567890abcdef0 --name \"MyAMI\" --description \"An AMI for my app\"`\n- Google Cloud Compute Engine Image Creation\n - Example: Creating a custom image using gcloud: `gcloud compute images create my-custom-image --source-disk my-disk --source-disk-zone us-central1-a`\n- VMware vSphere\n - Example: Exporting a VM to create an OVF (Open Virtualization Format) template: This could later be imported into other environments with potential tampering.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "containerd:events", + "channel": "Image pull from untrusted registry (name NOT IN allowlist) or new digest never seen before" + }, + { + "name": "docker:daemon", + "channel": "docker build or docker commit commands followed by docker push to internal registry" + }, + { + "name": "kubernetes:audit", + "channel": "create" + }, + { + "name": "AWS:CloudTrail", + "channel": "RegisterImage" + }, + { + "name": "docker:daemon", + "channel": "docker build or POST /build API request" + }, + { + "name": "kubernetes:apiserver", + "channel": "Pod spec triggering build or custom controller activity invoking image builds" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:39.369000+00:00\"}, \"root['description']\": {\"new_value\": \"Initial construction of a virtual machine image within a cloud environment. Virtual machine images are templates containing an operating system and installed applications, which can be deployed to create new virtual machines. Monitoring the creation of these images is important because adversaries may create custom images to include malicious software or misconfigurations for later exploitation. Examples: \\n\\n- Azure Compute Service Image Creation\\n - Example: Creating a virtual machine image in Azure using Azure CLI: `az image create --resource-group MyResourceGroup --name MyImage --source MyVM`\\n- AWS EC2 AMI (Amazon Machine Image) Creation\\n - Example: Creating an AMI from an EC2 instance: `aws ec2 create-image --instance-id i-1234567890abcdef0 --name \\\"MyAMI\\\" --description \\\"An AMI for my app\\\"`\\n- Google Cloud Compute Engine Image Creation\\n - Example: Creating a custom image using gcloud: `gcloud compute images create my-custom-image --source-disk my-disk --source-disk-zone us-central1-a`\\n- VMware vSphere\\n - Example: Exporting a VM to create an OVF (Open Virtualization Format) template: This could later be imported into other environments with potential tampering.\", \"old_value\": \"Initial construction of a virtual machine image within a cloud environment. Virtual machine images are templates containing an operating system and installed applications, which can be deployed to create new virtual machines. Monitoring the creation of these images is important because adversaries may create custom images to include malicious software or misconfigurations for later exploitation. Examples: \\n\\n- Azure Compute Service Image Creation\\n - Example: Creating a virtual machine image in Azure using Azure CLI: `az image create --resource-group MyResourceGroup --name MyImage --source MyVM`\\n- AWS EC2 AMI (Amazon Machine Image) Creation\\n - Example: Creating an AMI from an EC2 instance: `aws ec2 create-image --instance-id i-1234567890abcdef0 --name \\\"MyAMI\\\" --description \\\"An AMI for my app\\\"`\\n- Google Cloud Compute Engine Image Creation\\n - Example: Creating a custom image using gcloud: `gcloud compute images create my-custom-image --source-disk my-disk --source-disk-zone us-central1-a`\\n- VMware vSphere\\n - Example: Exporting a VM to create an OVF (Open Virtualization Format) template: This could later be imported into other environments with potential tampering.\\n\\nThis data component can be collected through the following measures:\\n\\nEnable Cloud Platform Logging\\n\\n- Azure: Enable \\\"Activity Logs\\\" to capture image-related events such as PUT requests to `Microsoft.Compute/images`.\\n- AWS: Use AWS CloudTrail to monitor `CreateImage` API calls.\\n- Google Cloud: Enable \\\"Cloud Audit Logs\\\" to track custom image creation events under `compute.googleapis.com/images`.\\n\\nAPI Monitoring\\n\\n- Monitor API activity to track the creation of new images using:\\n - AWS SDK/CLI `CreateImage`.\\n - Azure REST API for image creation.\\n - Google Cloud Compute Engine APIs.\\n\\nCloud SIEM Integration\\n\\n- Ingest cloud platform logs into a centralized SIEM for real-time monitoring and alerting.\\n\", \"diff\": \"--- \\n+++ \\n@@ -8,22 +8,3 @@\\n - Example: Creating a custom image using gcloud: `gcloud compute images create my-custom-image --source-disk my-disk --source-disk-zone us-central1-a`\\n - VMware vSphere\\n - Example: Exporting a VM to create an OVF (Open Virtualization Format) template: This could later be imported into other environments with potential tampering.\\n-\\n-This data component can be collected through the following measures:\\n-\\n-Enable Cloud Platform Logging\\n-\\n-- Azure: Enable \\\"Activity Logs\\\" to capture image-related events such as PUT requests to `Microsoft.Compute/images`.\\n-- AWS: Use AWS CloudTrail to monitor `CreateImage` API calls.\\n-- Google Cloud: Enable \\\"Cloud Audit Logs\\\" to track custom image creation events under `compute.googleapis.com/images`.\\n-\\n-API Monitoring\\n-\\n-- Monitor API activity to track the creation of new images using:\\n- - AWS SDK/CLI `CreateImage`.\\n- - Azure REST API for image creation.\\n- - Google Cloud Compute Engine APIs.\\n-\\n-Cloud SIEM Integration\\n-\\n-- Ingest cloud platform logs into a centralized SIEM for real-time monitoring and alerting.\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Initial construction of a virtual machine image within a clot1Initial construction of a virtual machine image within a clo
>ud environment. Virtual machine images are templates contain>ud environment. Virtual machine images are templates contain
>ing an operating system and installed applications, which ca>ing an operating system and installed applications, which ca
>n be deployed to create new virtual machines. Monitoring the>n be deployed to create new virtual machines. Monitoring the
> creation of these images is important because adversaries m> creation of these images is important because adversaries m
>ay create custom images to include malicious software or mis>ay create custom images to include malicious software or mis
>configurations for later exploitation. Examples:   - Azure C>configurations for later exploitation. Examples:   - Azure C
>ompute Service Image Creation     - Example: Creating a virt>ompute Service Image Creation     - Example: Creating a virt
>ual machine image in Azure using Azure CLI: `az image create>ual machine image in Azure using Azure CLI: `az image create
> --resource-group MyResourceGroup --name MyImage --source My> --resource-group MyResourceGroup --name MyImage --source My
>VM` - AWS EC2 AMI (Amazon Machine Image) Creation     - Exam>VM` - AWS EC2 AMI (Amazon Machine Image) Creation     - Exam
>ple: Creating an AMI from an EC2 instance: `aws ec2 create-i>ple: Creating an AMI from an EC2 instance: `aws ec2 create-i
>mage --instance-id i-1234567890abcdef0 --name \"MyAMI\" --desc>mage --instance-id i-1234567890abcdef0 --name \"MyAMI\" --desc
>ription \"An AMI for my app\"` - Google Cloud Compute Engine I>ription \"An AMI for my app\"` - Google Cloud Compute Engine I
>mage Creation     - Example: Creating a custom image using g>mage Creation     - Example: Creating a custom image using g
>cloud: `gcloud compute images create my-custom-image --sourc>cloud: `gcloud compute images create my-custom-image --sourc
>e-disk my-disk --source-disk-zone us-central1-a` - VMware vS>e-disk my-disk --source-disk-zone us-central1-a` - VMware vS
>phere     - Example: Exporting a VM to create an OVF (Open V>phere     - Example: Exporting a VM to create an OVF (Open V
>irtualization Format) template: This could later be imported>irtualization Format) template: This could later be imported
> into other environments with potential tampering.  This dat> into other environments with potential tampering.
>a component can be collected through the following measures: 
>  Enable Cloud Platform Logging  - Azure: Enable \"Activity L 
>ogs\" to capture image-related events such as PUT requests to 
> `Microsoft.Compute/images`. - AWS: Use AWS CloudTrail to mo 
>nitor `CreateImage` API calls. - Google Cloud: Enable \"Cloud 
> Audit Logs\" to track custom image creation events under `co 
>mpute.googleapis.com/images`.  API Monitoring  - Monitor API 
> activity to track the creation of new images using:     - A 
>WS SDK/CLI `CreateImage`.     - Azure REST API for image cre 
>ation.     - Google Cloud Compute Engine APIs.  Cloud SIEM I 
>ntegration  - Ingest cloud platform logs into a centralized  
>SIEM for real-time monitoring and alerting.  
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--b597a220-6510-4397-b0d8-342cd2c58827", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.272000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0028", + "external_id": "DC0028" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Image Metadata", + "description": "contextual information associated with a virtual machine image, such as its name, resource group, status (active or inactive), type (custom or prebuilt), size, creation date, and permissions. This metadata is critical for understanding the state and configuration of virtual machine images in cloud environments. Examples: \n\n- Azure Compute Service Image Metadata Example:\n - Name: MyCustomImage\n - Resource Group: MyResourceGroup\n - State: Available\n - Type: Managed Image\n- AWS EC2 AMI Metadata Example:\n - Image ID: ami-1234567890abcdef0\n - Name: ProdImage\n - State: Available\n - Platform: Windows\n- Google Cloud Compute Engine Image Metadata Example:\n - Image Name: webserver-image\n - Project: my-project-id\n - Family: webserver\n - Source Disk: my-disk-id\n- VMware vSphere Template Metadata Example:\n - Name: LinuxTemplate\n - Disk Size: 40GB\n - Network Adapter: VM Network", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "docker:events", + "channel": "docker.events.json" + }, + { + "name": "esxi:vmkernel", + "channel": "VMX startup messages without associated vCenter inventory records" + }, + { + "name": "kubernetes:apiserver", + "channel": "Resource creation and update logs" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:38.423000+00:00\"}, \"root['description']\": {\"new_value\": \"contextual information associated with a virtual machine image, such as its name, resource group, status (active or inactive), type (custom or prebuilt), size, creation date, and permissions. This metadata is critical for understanding the state and configuration of virtual machine images in cloud environments. Examples: \\n\\n- Azure Compute Service Image Metadata Example:\\n - Name: MyCustomImage\\n - Resource Group: MyResourceGroup\\n - State: Available\\n - Type: Managed Image\\n- AWS EC2 AMI Metadata Example:\\n - Image ID: ami-1234567890abcdef0\\n - Name: ProdImage\\n - State: Available\\n - Platform: Windows\\n- Google Cloud Compute Engine Image Metadata Example:\\n - Image Name: webserver-image\\n - Project: my-project-id\\n - Family: webserver\\n - Source Disk: my-disk-id\\n- VMware vSphere Template Metadata Example:\\n - Name: LinuxTemplate\\n - Disk Size: 40GB\\n - Network Adapter: VM Network\", \"old_value\": \"contextual information associated with a virtual machine image, such as its name, resource group, status (active or inactive), type (custom or prebuilt), size, creation date, and permissions. This metadata is critical for understanding the state and configuration of virtual machine images in cloud environments. Examples: \\n\\n- Azure Compute Service Image Metadata Example:\\n - Name: MyCustomImage\\n - Resource Group: MyResourceGroup\\n - State: Available\\n - Type: Managed Image\\n- AWS EC2 AMI Metadata Example:\\n - Image ID: ami-1234567890abcdef0\\n - Name: ProdImage\\n - State: Available\\n - Platform: Windows\\n- Google Cloud Compute Engine Image Metadata Example:\\n - Image Name: webserver-image\\n - Project: my-project-id\\n - Family: webserver\\n - Source Disk: my-disk-id\\n- VMware vSphere Template Metadata Example:\\n - Name: LinuxTemplate\\n - Disk Size: 40GB\\n - Network Adapter: VM Network\\n\\nThis data component can be collected through the following measures:\\n\\nCloud Platform-Specific Tools\\n\\n- Azure:\\n - Use Azure CLI to query metadata: `az image show --name MyCustomImage --resource-group MyResourceGroup`\\n- AWS:\\n - Use AWS CLI to describe AMI metadata: `aws ec2 describe-images --image-ids ami-1234567890abcdef0`\\n- Google Cloud:\\n - Use Google Cloud SDK to retrieve image metadata: `gcloud compute images describe webserver-image` \\n\\nAPIs\\n\\n- Azure: `GET /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/images/{imageName}`\\n- AWS: `DescribeImages` API.\\n- Google Cloud: `GET https://compute.googleapis.com/compute/v1/projects/{project}/global/images/{image}.`\\n\\nCloud Management Portals\\n\\n- View metadata directly from the cloud provider's management console or dashboard.\\n\\nSIEM Integration\\n\\n- Aggregate metadata into SIEM platforms for centralized monitoring:\\n\", \"diff\": \"--- \\n+++ \\n@@ -19,28 +19,3 @@\\n - Name: LinuxTemplate\\n - Disk Size: 40GB\\n - Network Adapter: VM Network\\n-\\n-This data component can be collected through the following measures:\\n-\\n-Cloud Platform-Specific Tools\\n-\\n-- Azure:\\n- - Use Azure CLI to query metadata: `az image show --name MyCustomImage --resource-group MyResourceGroup`\\n-- AWS:\\n- - Use AWS CLI to describe AMI metadata: `aws ec2 describe-images --image-ids ami-1234567890abcdef0`\\n-- Google Cloud:\\n- - Use Google Cloud SDK to retrieve image metadata: `gcloud compute images describe webserver-image` \\n-\\n-APIs\\n-\\n-- Azure: `GET /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Compute/images/{imageName}`\\n-- AWS: `DescribeImages` API.\\n-- Google Cloud: `GET https://compute.googleapis.com/compute/v1/projects/{project}/global/images/{image}.`\\n-\\n-Cloud Management Portals\\n-\\n-- View metadata directly from the cloud provider's management console or dashboard.\\n-\\n-SIEM Integration\\n-\\n-- Aggregate metadata into SIEM platforms for centralized monitoring:\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1contextual information associated with a virtual machine imat1contextual information associated with a virtual machine ima
>ge, such as its name, resource group, status (active or inac>ge, such as its name, resource group, status (active or inac
>tive), type (custom or prebuilt), size, creation date, and p>tive), type (custom or prebuilt), size, creation date, and p
>ermissions. This metadata is critical for understanding the >ermissions. This metadata is critical for understanding the 
>state and configuration of virtual machine images in cloud e>state and configuration of virtual machine images in cloud e
>nvironments. Examples:   - Azure Compute Service Image Metad>nvironments. Examples:   - Azure Compute Service Image Metad
>ata Example:     - Name: MyCustomImage     - Resource Group:>ata Example:     - Name: MyCustomImage     - Resource Group:
> MyResourceGroup     - State: Available     - Type: Managed > MyResourceGroup     - State: Available     - Type: Managed 
>Image - AWS EC2 AMI Metadata Example:     - Image ID: ami-12>Image - AWS EC2 AMI Metadata Example:     - Image ID: ami-12
>34567890abcdef0     - Name: ProdImage     - State: Available>34567890abcdef0     - Name: ProdImage     - State: Available
>     - Platform: Windows - Google Cloud Compute Engine Image>     - Platform: Windows - Google Cloud Compute Engine Image
> Metadata Example:     - Image Name: webserver-image     - P> Metadata Example:     - Image Name: webserver-image     - P
>roject: my-project-id     - Family: webserver     - Source D>roject: my-project-id     - Family: webserver     - Source D
>isk: my-disk-id - VMware vSphere Template Metadata Example: >isk: my-disk-id - VMware vSphere Template Metadata Example: 
>    - Name: LinuxTemplate     - Disk Size: 40GB     - Networ>    - Name: LinuxTemplate     - Disk Size: 40GB     - Networ
>k Adapter: VM Network  This data component can be collected >k Adapter: VM Network
>through the following measures:  Cloud Platform-Specific Too 
>ls  - Azure:     - Use Azure CLI to query metadata: `az imag 
>e show --name MyCustomImage --resource-group MyResourceGroup 
>` - AWS:     - Use AWS CLI to describe AMI metadata: `aws ec 
>2 describe-images --image-ids ami-1234567890abcdef0` - Googl 
>e Cloud:     - Use Google Cloud SDK to retrieve image metada 
>ta: `gcloud compute images describe webserver-image`   APIs  
> - Azure: `GET /subscriptions/{subscriptionId}/resourceGroup 
>s/{resourceGroupName}/providers/Microsoft.Compute/images/{im 
>ageName}` - AWS: `DescribeImages` API. - Google Cloud: `GET  
>https://compute.googleapis.com/compute/v1/projects/{project} 
>/global/images/{image}.`  Cloud Management Portals  - View m 
>etadata directly from the cloud provider's management consol 
>e or dashboard.  SIEM Integration  - Aggregate metadata into 
> SIEM platforms for centralized monitoring:  
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--b5b0e8ae-7436-4951-950a-7b83c4dd3f2c", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.274000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0076", + "external_id": "DC0076" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Instance Creation", + "description": "The initial provisioning and construction of a virtual machine (VM) or compute instance within a cloud infrastructure environment. This activity involves defining and allocating resources such as CPU, memory, storage, and networking to spin up a new compute instance. Examples:\n\n- AWS: creating an EC2 instance using RunInstances API calls.\n- Azure, creating a VM through the Azure Resource Manager (ARM).\n- GCP, an `instance.insert` action recorded.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "azure:activity", + "channel": "Microsoft.Compute/virtualMachines/write: imageReference publisher NOT IN allowlist OR plan is new/unknown" + }, + { + "name": "gcp:audit", + "channel": "compute.instances.insert: sourceImage not in approved projects OR has external image link" + }, + { + "name": "azure:activity", + "channel": "MICROSOFT.COMPUTE/VIRTUALMACHINES/WRITE" + }, + { + "name": "gcp:audit", + "channel": "compute.instances.insert" + }, + { + "name": "AWS:CloudTrail", + "channel": "RunInstances,CreateImage" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:39.434000+00:00\"}, \"root['description']\": {\"new_value\": \"The initial provisioning and construction of a virtual machine (VM) or compute instance within a cloud infrastructure environment. This activity involves defining and allocating resources such as CPU, memory, storage, and networking to spin up a new compute instance. Examples:\\n\\n- AWS: creating an EC2 instance using RunInstances API calls.\\n- Azure, creating a VM through the Azure Resource Manager (ARM).\\n- GCP, an `instance.insert` action recorded.\", \"old_value\": \"The initial provisioning and construction of a virtual machine (VM) or compute instance within a cloud infrastructure environment. This activity involves defining and allocating resources such as CPU, memory, storage, and networking to spin up a new compute instance. Examples:\\n\\n- AWS: creating an EC2 instance using RunInstances API calls.\\n- Azure, creating a VM through the Azure Resource Manager (ARM).\\n- GCP, an `instance.insert` action recorded.\\n\\n*Data Collection Measures:*\\n\\n- AWS CloudTrail: CloudTrail logs stored in S3 or accessible via CloudWatch.\\n- Azure Activity Logs: Accessible in Azure Monitor or exported to a storage account.\\n- GCP Audit Logs: Logs Explorer or BigQuery.\", \"diff\": \"--- \\n+++ \\n@@ -3,9 +3,3 @@\\n - AWS: creating an EC2 instance using RunInstances API calls.\\n - Azure, creating a VM through the Azure Resource Manager (ARM).\\n - GCP, an `instance.insert` action recorded.\\n-\\n-*Data Collection Measures:*\\n-\\n-- AWS CloudTrail: CloudTrail logs stored in S3 or accessible via CloudWatch.\\n-- Azure Activity Logs: Accessible in Azure Monitor or exported to a storage account.\\n-- GCP Audit Logs: Logs Explorer or BigQuery.\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1The initial provisioning and construction of a virtual machit1The initial provisioning and construction of a virtual machi
>ne (VM) or compute instance within a cloud infrastructure en>ne (VM) or compute instance within a cloud infrastructure en
>vironment. This activity involves defining and allocating re>vironment. This activity involves defining and allocating re
>sources such as CPU, memory, storage, and networking to spin>sources such as CPU, memory, storage, and networking to spin
> up a new compute instance. Examples:  - AWS: creating an EC> up a new compute instance. Examples:  - AWS: creating an EC
>2 instance using RunInstances API calls. - Azure, creating a>2 instance using RunInstances API calls. - Azure, creating a
> VM through the Azure Resource Manager (ARM). - GCP, an `ins> VM through the Azure Resource Manager (ARM). - GCP, an `ins
>tance.insert` action recorded.  *Data Collection Measures:* >tance.insert` action recorded.
> - AWS CloudTrail: CloudTrail logs stored in S3 or accessibl 
>e via CloudWatch. - Azure Activity Logs: Accessible in Azure 
> Monitor or exported to a storage account. - GCP Audit Logs: 
> Logs Explorer or BigQuery. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--7561ed50-16cb-4826-82c7-c1ddca61785e", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.274000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0081", + "external_id": "DC0081" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Instance Deletion", + "description": "Removal of a virtual machine (VM) or compute instance within a cloud infrastructure. This activity results in the termination and deletion of the allocated resources (e.g., CPU, memory, storage), making the instance unavailable for future use. Examples:\n\n- AWS: instance deletion involves the `TerminateInstances` API call, which is recorded in CloudTrail logs.\n- Azure: VM deletion can be monitored via Azure Activity Logs, showing the `Microsoft.Compute/virtualMachines/delete` operation.\n- GCP: instance deletion is logged as an instance.delete operation within GCP Audit Logs.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "azure:activity", + "channel": "MICROSOFT.COMPUTE/VIRTUALMACHINES/DELETE" + }, + { + "name": "gcp:audit", + "channel": "compute.instances.delete" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:37.952000+00:00\"}, \"root['description']\": {\"new_value\": \"Removal of a virtual machine (VM) or compute instance within a cloud infrastructure. This activity results in the termination and deletion of the allocated resources (e.g., CPU, memory, storage), making the instance unavailable for future use. Examples:\\n\\n- AWS: instance deletion involves the `TerminateInstances` API call, which is recorded in CloudTrail logs.\\n- Azure: VM deletion can be monitored via Azure Activity Logs, showing the `Microsoft.Compute/virtualMachines/delete` operation.\\n- GCP: instance deletion is logged as an instance.delete operation within GCP Audit Logs.\", \"old_value\": \"Removal of a virtual machine (VM) or compute instance within a cloud infrastructure. This activity results in the termination and deletion of the allocated resources (e.g., CPU, memory, storage), making the instance unavailable for future use. Examples:\\n\\n- AWS: instance deletion involves the `TerminateInstances` API call, which is recorded in CloudTrail logs.\\n- Azure: VM deletion can be monitored via Azure Activity Logs, showing the `Microsoft.Compute/virtualMachines/delete` operation.\\n- GCP: instance deletion is logged as an instance.delete operation within GCP Audit Logs.\\n\\n*Data Collection Measures: \\n\\n- AWS CloudTrail: CloudTrail logs stored in S3 or forwarded to CloudWatch.\\n- Azure Activity Logs: Accessible via Azure Monitor or exported to a storage account.\\n- GCP Audit Logs: Logs Explorer or BigQuery.\", \"diff\": \"--- \\n+++ \\n@@ -3,9 +3,3 @@\\n - AWS: instance deletion involves the `TerminateInstances` API call, which is recorded in CloudTrail logs.\\n - Azure: VM deletion can be monitored via Azure Activity Logs, showing the `Microsoft.Compute/virtualMachines/delete` operation.\\n - GCP: instance deletion is logged as an instance.delete operation within GCP Audit Logs.\\n-\\n-*Data Collection Measures: \\n-\\n-- AWS CloudTrail: CloudTrail logs stored in S3 or forwarded to CloudWatch.\\n-- Azure Activity Logs: Accessible via Azure Monitor or exported to a storage account.\\n-- GCP Audit Logs: Logs Explorer or BigQuery.\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Removal of a virtual machine (VM) or compute instance withint1Removal of a virtual machine (VM) or compute instance within
> a cloud infrastructure. This activity results in the termin> a cloud infrastructure. This activity results in the termin
>ation and deletion of the allocated resources (e.g., CPU, me>ation and deletion of the allocated resources (e.g., CPU, me
>mory, storage), making the instance unavailable for future u>mory, storage), making the instance unavailable for future u
>se. Examples:  - AWS: instance deletion involves the `Termin>se. Examples:  - AWS: instance deletion involves the `Termin
>ateInstances` API call, which is recorded in CloudTrail logs>ateInstances` API call, which is recorded in CloudTrail logs
>. - Azure: VM deletion can be monitored via Azure Activity L>. - Azure: VM deletion can be monitored via Azure Activity L
>ogs, showing the `Microsoft.Compute/virtualMachines/delete` >ogs, showing the `Microsoft.Compute/virtualMachines/delete` 
>operation. - GCP: instance deletion is logged as an instance>operation. - GCP: instance deletion is logged as an instance
>.delete operation within GCP Audit Logs.  *Data Collection M>.delete operation within GCP Audit Logs.
>easures:   - AWS CloudTrail: CloudTrail logs stored in S3 or 
> forwarded to CloudWatch. - Azure Activity Logs: Accessible  
>via Azure Monitor or exported to a storage account. - GCP Au 
>dit Logs: Logs Explorer or BigQuery. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--45fd904d-6eb0-4b50-8478-a961f09f898b", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.274000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0086", + "external_id": "DC0086" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Instance Metadata", + "description": "Contextual data about an instance and activity around it such as name, type, or status", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "AWS:CloudTrail", + "channel": "DescribeInstances" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:37.885000+00:00\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][1]\": {\"name\": \"CloudTrail:EC2\", \"channel\": \"DescribeInstances\"}}}", + "previous_version": "2.0" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--f8213cde-6b3a-420d-9ab7-41c9af1a919f", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.274000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0080", + "external_id": "DC0080" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Instance Start", + "description": "The initiation or activation of a virtual machine instance within a cloud infrastructure. This action typically involves starting an existing instance that had been stopped or paused, allowing it to resume operation. Examples: \n\n- Google Cloud Platform (GCP): Starting an instance through `instance.start` API activity.\n- AWS: Logging of `StartInstances` in AWS CloudTrail for EC2 instances.\n- Azure: `Microsoft.Compute/virtualMachines/start` entries indicate a VM instance being started.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "AWS:CloudTrail", + "channel": "StartInstances" + }, + { + "name": "AWS:CloudTrail", + "channel": "RunInstances" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:36.515000+00:00\"}, \"root['description']\": {\"new_value\": \"The initiation or activation of a virtual machine instance within a cloud infrastructure. This action typically involves starting an existing instance that had been stopped or paused, allowing it to resume operation. Examples: \\n\\n- Google Cloud Platform (GCP): Starting an instance through `instance.start` API activity.\\n- AWS: Logging of `StartInstances` in AWS CloudTrail for EC2 instances.\\n- Azure: `Microsoft.Compute/virtualMachines/start` entries indicate a VM instance being started.\", \"old_value\": \"The initiation or activation of a virtual machine instance within a cloud infrastructure. This action typically involves starting an existing instance that had been stopped or paused, allowing it to resume operation. Examples: \\n\\n- Google Cloud Platform (GCP): Starting an instance through `instance.start` API activity.\\n- AWS: Logging of `StartInstances` in AWS CloudTrail for EC2 instances.\\n- Azure: `Microsoft.Compute/virtualMachines/start` entries indicate a VM instance being started.\\n\\n*Data Collection Measures:*\\n\\n- Google Cloud Platform: Enable GCP Audit Logs for Compute Engine.\\n - Log Event: Look for instance.start entries in Cloud Logging.\\n- Amazon Web Services (AWS): AWS CloudTrail.\\n - Log Event: Search for StartInstances events associated with EC2.\\n- Microsoft Azure: Azure Activity Logs.\\n - Log Event: Filter for Microsoft.Compute/virtualMachines/start operations.\", \"diff\": \"--- \\n+++ \\n@@ -3,12 +3,3 @@\\n - Google Cloud Platform (GCP): Starting an instance through `instance.start` API activity.\\n - AWS: Logging of `StartInstances` in AWS CloudTrail for EC2 instances.\\n - Azure: `Microsoft.Compute/virtualMachines/start` entries indicate a VM instance being started.\\n-\\n-*Data Collection Measures:*\\n-\\n-- Google Cloud Platform: Enable GCP Audit Logs for Compute Engine.\\n- - Log Event: Look for instance.start entries in Cloud Logging.\\n-- Amazon Web Services (AWS): AWS CloudTrail.\\n- - Log Event: Search for StartInstances events associated with EC2.\\n-- Microsoft Azure: Azure Activity Logs.\\n- - Log Event: Filter for Microsoft.Compute/virtualMachines/start operations.\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][1]\": {\"name\": \"CloudTrail:RunInstances\", \"channel\": \"RunInstances\"}, \"root['x_mitre_log_sources'][2]\": {\"name\": \"CloudTrail:RunInstances\", \"channel\": \"RunInstances: AMI not in allowlist OR AMI owner != enterprise owner/account\"}, \"root['x_mitre_log_sources'][3]\": {\"name\": \"AWS:CloudTrail\", \"channel\": \"StartInstances: Instance starts from suspicious AMI or with userData present\"}, \"root['x_mitre_log_sources'][5]\": {\"name\": \"CloudTrail:EC2\", \"channel\": \"RunInstances\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1The initiation or activation of a virtual machine instance wt1The initiation or activation of a virtual machine instance w
>ithin a cloud infrastructure. This action typically involves>ithin a cloud infrastructure. This action typically involves
> starting an existing instance that had been stopped or paus> starting an existing instance that had been stopped or paus
>ed, allowing it to resume operation. Examples:   - Google Cl>ed, allowing it to resume operation. Examples:   - Google Cl
>oud Platform (GCP): Starting an instance through `instance.s>oud Platform (GCP): Starting an instance through `instance.s
>tart` API activity. - AWS: Logging of `StartInstances` in AW>tart` API activity. - AWS: Logging of `StartInstances` in AW
>S CloudTrail for EC2 instances. - Azure: `Microsoft.Compute/>S CloudTrail for EC2 instances. - Azure: `Microsoft.Compute/
>virtualMachines/start` entries indicate a VM instance being >virtualMachines/start` entries indicate a VM instance being 
>started.  *Data Collection Measures:*  - Google Cloud Platfo>started.
>rm: Enable GCP Audit Logs for Compute Engine.     - Log Even 
>t: Look for instance.start entries in Cloud Logging. - Amazo 
>n Web Services (AWS): AWS CloudTrail.     - Log Event: Searc 
>h for StartInstances events associated with EC2. - Microsoft 
> Azure: Azure Activity Logs.     - Log Event: Filter for Mic 
>rosoft.Compute/virtualMachines/start operations. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.274000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0067", + "external_id": "DC0067" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Logon Session Creation", + "description": "The successful establishment of a new user session following a successful authentication attempt. This typically signifies that a user has provided valid credentials or authentication tokens, and the system has initiated a session associated with that user account. This data is crucial for tracking authentication events and identifying potential unauthorized access. Examples: \n\n- Windows Systems\n - Event ID: 4624\n - Logon Type: 2 (Interactive) or 10 (Remote Interactive via RDP).\n - Account Name: JohnDoe\n - Source Network Address: 192.168.1.100\n - Authentication Package: NTLM\n- Linux Systems\n - /var/log/utmp or /var/log/wtmp:\n - Log format: login user [tty] from [source_ip]\n - User: jane\n - IP: 10.0.0.5\n - Timestamp: 2024-12-28 08:30:00\n- macOS Systems\n - /var/log/asl.log or unified logging framework:\n - Log: com.apple.securityd: Authentication succeeded for user 'admin'\n- Cloud Environments\n - Azure Sign-In Logs:\n - Activity: Sign-in successful\n - Client App: Browser\n - Location: Unknown (Country: X)\n- Google Workspace\n - Activity: Login\n - Event Type: successful_login\n - Source IP: 203.0.113.55", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Logon Session", + "channel": "None" + }, + { + "name": "macos:unifiedlog", + "channel": "UserLoggedIn" + }, + { + "name": "AWS:CloudTrail", + "channel": "ConsoleLogin, AssumeRole, ListResources" + }, + { + "name": "azure:signin", + "channel": "UserLoginSuccess, TokenIssued" + }, + { + "name": "Okta:SystemLog", + "channel": "user.authentication.sso, app.oauth.grant" + }, + { + "name": "m365:signinlogs", + "channel": "SignInSuccess, RoleAssignmentRead" + }, + { + "name": "m365:unified", + "channel": "UserLoggedIn" + }, + { + "name": "gcp:audit", + "channel": "LoginAudit, DriveAudit" + }, + { + "name": "saas:auth", + "channel": "LoginSuccess, APIKeyUse, AdminAction" + }, + { + "name": "azure:signinlogs", + "channel": "Abnormal sign-in from scripting tools (PowerShell, AADInternals)" + }, + { + "name": "azure:signinlogs", + "channel": "Suspicious login to cloud mailbox system" + }, + { + "name": "azure:signinlogs", + "channel": "Failed MFA attempts, unusual conditional access triggers, login attempts from unexpected IP ranges" + }, + { + "name": "AWS:CloudTrail", + "channel": "ConsoleLogin" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + }, + { + "name": "NSM:Connections", + "channel": "Mismatch between recorded user logon and active sessions (e.g., wtmp/utmp entries without corresponding authentication in auth.log)" + }, + { + "name": "macos:unifiedlog", + "channel": "Authentication inconsistencies where commands are executed without corresponding login events" + }, + { + "name": "CloudTrail:Signin", + "channel": "SAML login without corresponding IdP authentication log" + }, + { + "name": "m365:sharepoint", + "channel": "File access with forged or anomalous SAML claims" + }, + { + "name": "AWS:CloudTrail", + "channel": "Web console logins using session cookies without corresponding MFA event" + }, + { + "name": "saas:access", + "channel": "Multiple concurrent logins using same cookie from different locations" + }, + { + "name": "AWS:CloudTrail", + "channel": "ConsoleLogin: If IdP backed by cloud provider, Console login from new IP/agent after correlated endpoint compromise" + }, + { + "name": "macos:unifiedlog", + "channel": "authentication" + }, + { + "name": "AWS:CloudTrail", + "channel": "SendSSHPublicKey, StartSession (SSM), EC2InstanceConnect" + }, + { + "name": "azure:signin", + "channel": "Microsoft.Compute/virtualMachines/serialConsole/connect/action" + }, + { + "name": "gcp:audit", + "channel": "cloud.ssh.publicKey.inserted, compute.instances.osLogin" + }, + { + "name": "NSM:Connections", + "channel": "Missing new login event but session activity continues" + }, + { + "name": "macos:unifiedlog", + "channel": "Session reuse without new auth event" + }, + { + "name": "AWS:CloudTrail", + "channel": "Temporary security credentials used to authenticate into management console or APIs" + }, + { + "name": "macos:unifiedlog", + "channel": "Access to Keychain items or browser credential stores" + }, + { + "name": "m365:signinlogs", + "channel": "Token usage events with device/user mismatch" + }, + { + "name": "saas:github", + "channel": "Login from unusual IP, device fingerprint, or location; access token creation from new client" + }, + { + "name": "linux:syslog", + "channel": "sshd: Accepted password/publickey" + }, + { + "name": "macos:unifiedlog", + "channel": "eventMessage CONTAINS 'screensharingd' or 'AuthorizationRefCreate'" + }, + { + "name": "AWS:CloudTrail", + "channel": "AWS ConsoleLogin, StartSession" + }, + { + "name": "esxi:vmkernel", + "channel": "vim.fault.*, DCUI login, SSH shell" + }, + { + "name": "AWS:CloudTrail", + "channel": "GetConsoleOutput" + }, + { + "name": "saas:okta", + "channel": "user.session.start" + }, + { + "name": "m365:unified", + "channel": "ViewAdminReport" + }, + { + "name": "saas:zoom", + "channel": "Zoom Admin Dashboard accessed from unfamiliar IP/device" + }, + { + "name": "WinEventLog:Security", + "channel": "Anomalous logon without MFA enforcement" + }, + { + "name": "networkdevice:Firewall", + "channel": "Login from untrusted IP, or new admin account accessing firewall console/API" + }, + { + "name": "linux:syslog", + "channel": "authentication success after file access" + }, + { + "name": "macos:unifiedlog", + "channel": "Keychain or user login post-access" + }, + { + "name": "AWS:CloudTrail", + "channel": "sudden role assumption after credential file access" + }, + { + "name": "NSM:Connections", + "channel": "Accepted publickey for user from unusual IP or without tty" + }, + { + "name": "saas:confluence", + "channel": "logon" + }, + { + "name": "linux:syslog", + "channel": "auth.log / secure.log" + }, + { + "name": "esxi:auth", + "channel": "Shell login or escalation" + }, + { + "name": "linux:auth", + "channel": "User login event followed by unexpected process tree" + }, + { + "name": "azure:signinlogs", + "channel": "InteractiveUserLogin: Discovery behavior linked to privileged logins from atypical IP ranges" + }, + { + "name": "m365:signinlogs", + "channel": "UserLogin: Discovery operations shortly after account logins from new geolocations" + }, + { + "name": "saas:auth", + "channel": "Login, TokenGranted: Discovery actions tied to anomalous login sessions or tokens" + }, + { + "name": "NSM:Connections", + "channel": "simultaneous or anomalous logon sessions across multiple systems" + }, + { + "name": "macos:unifiedlog", + "channel": "authentication plugin load or modification events" + }, + { + "name": "azure:ad", + "channel": "SignInEvents" + }, + { + "name": "linux:syslog", + "channel": "Accepted publickey/password for * from * port * ssh2" + }, + { + "name": "macos:unifiedlog", + "channel": "loginwindow or sshd successful login events" + }, + { + "name": "azure:signinlogs", + "channel": "InteractiveUser, ServicePrincipalSignIn" + }, + { + "name": "AWS:CloudTrail", + "channel": "AssumeRole,AssumeRoleWithSAML,AssumeRoleWithWebIdentity" + }, + { + "name": "azure:signinlogs", + "channel": "InteractiveUser, NonInteractiveUser" + }, + { + "name": "azure:signinlogs", + "channel": "UserLogin, ConditionalAccessPolicyEvaluated" + }, + { + "name": "saas:okta", + "channel": "session.token.reuse" + }, + { + "name": "auditd:SYSCALL", + "channel": "capset or setns" + }, + { + "name": "gcp:audit", + "channel": "admin.googleapis.com" + }, + { + "name": "m365:signinlogs", + "channel": "UserLoggedIn" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4624" + }, + { + "name": "linux:syslog", + "channel": "None" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:35.022000+00:00\"}, \"root['description']\": {\"new_value\": \"The successful establishment of a new user session following a successful authentication attempt. This typically signifies that a user has provided valid credentials or authentication tokens, and the system has initiated a session associated with that user account. This data is crucial for tracking authentication events and identifying potential unauthorized access. Examples: \\n\\n- Windows Systems\\n - Event ID: 4624\\n - Logon Type: 2 (Interactive) or 10 (Remote Interactive via RDP).\\n - Account Name: JohnDoe\\n - Source Network Address: 192.168.1.100\\n - Authentication Package: NTLM\\n- Linux Systems\\n - /var/log/utmp or /var/log/wtmp:\\n - Log format: login user [tty] from [source_ip]\\n - User: jane\\n - IP: 10.0.0.5\\n - Timestamp: 2024-12-28 08:30:00\\n- macOS Systems\\n - /var/log/asl.log or unified logging framework:\\n - Log: com.apple.securityd: Authentication succeeded for user 'admin'\\n- Cloud Environments\\n - Azure Sign-In Logs:\\n - Activity: Sign-in successful\\n - Client App: Browser\\n - Location: Unknown (Country: X)\\n- Google Workspace\\n - Activity: Login\\n - Event Type: successful_login\\n - Source IP: 203.0.113.55\", \"old_value\": \"The successful establishment of a new user session following a successful authentication attempt. This typically signifies that a user has provided valid credentials or authentication tokens, and the system has initiated a session associated with that user account. This data is crucial for tracking authentication events and identifying potential unauthorized access. Examples: \\n\\n- Windows Systems\\n - Event ID: 4624\\n - Logon Type: 2 (Interactive) or 10 (Remote Interactive via RDP).\\n - Account Name: JohnDoe\\n - Source Network Address: 192.168.1.100\\n - Authentication Package: NTLM\\n- Linux Systems\\n - /var/log/utmp or /var/log/wtmp:\\n - Log format: login user [tty] from [source_ip]\\n - User: jane\\n - IP: 10.0.0.5\\n - Timestamp: 2024-12-28 08:30:00\\n- macOS Systems\\n - /var/log/asl.log or unified logging framework:\\n - Log: com.apple.securityd: Authentication succeeded for user 'admin'\\n- Cloud Environments\\n - Azure Sign-In Logs:\\n - Activity: Sign-in successful\\n - Client App: Browser\\n - Location: Unknown (Country: X)\\n- Google Workspace\\n - Activity: Login\\n - Event Type: successful_login\\n - Source IP: 203.0.113.55\\n\\nThis data component can be collected through the following measures:\\n\\n- Windows Systems\\n - Event Logs: Monitor Security Event Logs using Event ID 4624 for successful logons.\\n - PowerShell Example: `Get-EventLog -LogName Security -InstanceId 4624`\\n- Linux Systems\\n - Log Files: Monitor `/var/log/utmp`, `/var/log/wtmp`, or `/var/log/auth.log` for logon events.\\n - Tools: Use `last` or `who` commands to parse login records.\\n- macOS Systems\\n - Log Sources: Monitor `/var/log/asl.log` or Apple Unified Logs using the `log show` command.\\n - Command Example: `log show --predicate 'eventMessage contains \\\"Authentication succeeded\\\"' --info`\\n- Cloud Environments\\n - Azure AD: Use Azure Monitor to analyze sign-in logs. Example CLI Query: `az monitor log-analytics query -w --analytics-query \\\"AzureActivity | where ActivityStatus == 'Success' and OperationName == 'Sign-in'\\\"`\\n - Google Workspace: Enable and monitor Login Audit logs from the Admin Console.\\n - Office 365: Use Audit Log Search in Microsoft 365 Security & Compliance Center for login-related events.\\n- Network Logs\\n - Sources: Network authentication mechanisms (e.g., RADIUS or TACACS logs).\\n- Enable EDR Monitoring: \\n - EDR tools monitor logon session activity, including the creation of new sessions.\\n - Configure alerts for: Suspicious logon types (e.g., Logon Type 10 for RDP or Type 5 for Service). Logons from unusual locations, accounts, or devices.\\n - Leverage EDR telemetry for session attributes like source IP, session duration, and originating process.\", \"diff\": \"--- \\n+++ \\n@@ -24,25 +24,3 @@\\n - Activity: Login\\n - Event Type: successful_login\\n - Source IP: 203.0.113.55\\n-\\n-This data component can be collected through the following measures:\\n-\\n-- Windows Systems\\n- - Event Logs: Monitor Security Event Logs using Event ID 4624 for successful logons.\\n- - PowerShell Example: `Get-EventLog -LogName Security -InstanceId 4624`\\n-- Linux Systems\\n- - Log Files: Monitor `/var/log/utmp`, `/var/log/wtmp`, or `/var/log/auth.log` for logon events.\\n- - Tools: Use `last` or `who` commands to parse login records.\\n-- macOS Systems\\n- - Log Sources: Monitor `/var/log/asl.log` or Apple Unified Logs using the `log show` command.\\n- - Command Example: `log show --predicate 'eventMessage contains \\\"Authentication succeeded\\\"' --info`\\n-- Cloud Environments\\n- - Azure AD: Use Azure Monitor to analyze sign-in logs. Example CLI Query: `az monitor log-analytics query -w --analytics-query \\\"AzureActivity | where ActivityStatus == 'Success' and OperationName == 'Sign-in'\\\"`\\n- - Google Workspace: Enable and monitor Login Audit logs from the Admin Console.\\n- - Office 365: Use Audit Log Search in Microsoft 365 Security & Compliance Center for login-related events.\\n-- Network Logs\\n- - Sources: Network authentication mechanisms (e.g., RADIUS or TACACS logs).\\n-- Enable EDR Monitoring: \\n- - EDR tools monitor logon session activity, including the creation of new sessions.\\n- - Configure alerts for: Suspicious logon types (e.g., Logon Type 10 for RDP or Type 5 for Service). Logons from unusual locations, accounts, or devices.\\n- - Leverage EDR telemetry for session attributes like source IP, session duration, and originating process.\"}, \"root['x_mitre_log_sources'][5]['name']\": {\"new_value\": \"m365:signinlogs\", \"old_value\": \"m365:signin\"}, \"root['x_mitre_log_sources'][31]['name']\": {\"new_value\": \"m365:signinlogs\", \"old_value\": \"m365:signin\", \"new_path\": \"root['x_mitre_log_sources'][29]['name']\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][26]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4624 with LogonType=9 or smartcard logon\"}, \"root['x_mitre_log_sources'][33]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4624 (LogonType=10 or 3), EventCode=4648\"}, \"root['x_mitre_log_sources'][38]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4624 (LogonType=3)\"}, \"root['x_mitre_log_sources'][48]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4624 (LogonType=10), EventCode=4648\"}, \"root['x_mitre_log_sources'][49]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4624, 4672, 4648\"}, \"root['x_mitre_log_sources'][58]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"4624\"}, \"root['x_mitre_log_sources'][61]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4624,4648, 4672\"}, \"root['x_mitre_log_sources'][63]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4624,4648,4672,4769\"}, \"root['x_mitre_log_sources'][74]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventID=4624\"}, \"root['x_mitre_log_sources'][75]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4624, 4634\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1The successful establishment of a new user session followingt1The successful establishment of a new user session following
> a successful authentication attempt. This typically signifi> a successful authentication attempt. This typically signifi
>es that a user has provided valid credentials or authenticat>es that a user has provided valid credentials or authenticat
>ion tokens, and the system has initiated a session associate>ion tokens, and the system has initiated a session associate
>d with that user account. This data is crucial for tracking >d with that user account. This data is crucial for tracking 
>authentication events and identifying potential unauthorized>authentication events and identifying potential unauthorized
> access. Examples:   - Windows Systems     - Event ID: 4624 > access. Examples:   - Windows Systems     - Event ID: 4624 
>        - Logon Type: 2 (Interactive) or 10 (Remote Interact>        - Logon Type: 2 (Interactive) or 10 (Remote Interact
>ive via RDP).         - Account Name: JohnDoe         - Sour>ive via RDP).         - Account Name: JohnDoe         - Sour
>ce Network Address: 192.168.1.100         - Authentication P>ce Network Address: 192.168.1.100         - Authentication P
>ackage: NTLM - Linux Systems     - /var/log/utmp or /var/log>ackage: NTLM - Linux Systems     - /var/log/utmp or /var/log
>/wtmp:         - Log format: login user [tty] from [source_i>/wtmp:         - Log format: login user [tty] from [source_i
>p]         - User: jane         - IP: 10.0.0.5         - Tim>p]         - User: jane         - IP: 10.0.0.5         - Tim
>estamp: 2024-12-28 08:30:00 - macOS Systems     - /var/log/a>estamp: 2024-12-28 08:30:00 - macOS Systems     - /var/log/a
>sl.log or unified logging framework:         - Log: com.appl>sl.log or unified logging framework:         - Log: com.appl
>e.securityd: Authentication succeeded for user 'admin' - Clo>e.securityd: Authentication succeeded for user 'admin' - Clo
>ud Environments     - Azure Sign-In Logs:         - Activity>ud Environments     - Azure Sign-In Logs:         - Activity
>: Sign-in successful         - Client App: Browser         ->: Sign-in successful         - Client App: Browser         -
> Location: Unknown (Country: X) - Google Workspace     - Act> Location: Unknown (Country: X) - Google Workspace     - Act
>ivity: Login         - Event Type: successful_login         >ivity: Login         - Event Type: successful_login         
>- Source IP: 203.0.113.55  This data component can be collec>- Source IP: 203.0.113.55
>ted through the following measures:  - Windows Systems     - 
> Event Logs: Monitor Security Event Logs using Event ID 4624 
> for successful logons.     - PowerShell Example: `Get-Event 
>Log -LogName Security -InstanceId 4624` - Linux Systems      
>- Log Files: Monitor `/var/log/utmp`, `/var/log/wtmp`, or `/ 
>var/log/auth.log` for logon events.     - Tools: Use `last`  
>or `who` commands to parse login records. - macOS Systems    
>  - Log Sources: Monitor `/var/log/asl.log` or Apple Unified 
> Logs using the `log show` command.     - Command Example: ` 
>log show --predicate 'eventMessage contains \"Authentication  
>succeeded\"' --info` - Cloud Environments     - Azure AD: Use 
> Azure Monitor to analyze sign-in logs. Example CLI Query: ` 
>az monitor log-analytics query -w <workspace_id> --analytics 
>-query \"AzureActivity | where ActivityStatus == 'Success' an 
>d OperationName == 'Sign-in'\"`     - Google Workspace: Enabl 
>e and monitor Login Audit logs from the Admin Console.     - 
> Office 365: Use Audit Log Search in Microsoft 365 Security  
>& Compliance Center for login-related events. - Network Logs 
>     - Sources: Network authentication mechanisms (e.g., RAD 
>IUS or TACACS logs). - Enable EDR Monitoring:      - EDR too 
>ls monitor logon session activity, including the creation of 
> new sessions.     - Configure alerts for: Suspicious logon  
>types (e.g., Logon Type 10 for RDP or Type 5 for Service). L 
>ogons from unusual locations, accounts, or devices.     - Le 
>verage EDR telemetry for session attributes like source IP,  
>session duration, and originating process. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--39b9db72-8b48-4595-a18d-db5bbba3091b", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.274000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0088", + "external_id": "DC0088" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Logon Session Metadata", + "description": "Contextual data about a logon session, such as username, logon type, access tokens (security context, user SIDs, logon identifiers, and logon SID), and any activity associated within it", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Logon Session", + "channel": "None" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4672" + }, + { + "name": "macos:unifiedlog", + "channel": "LoginWindow context with associated PID linked to reopened plist paths" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4672, 4634" + }, + { + "name": "azure:signinlogs", + "channel": "SAML-based login with anomalous issuer or NotOnOrAfter lifetime" + }, + { + "name": "m365:unified", + "channel": "Abnormal user claims or unexpected elevated role assignment in SAML assertion" + }, + { + "name": "macos:unifiedlog", + "channel": "authd generating multiple MFA token requests" + }, + { + "name": "linux:syslog", + "channel": "None" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4625, 4768, 4769" + }, + { + "name": "linux:syslog", + "channel": "sssd / sudo logs" + }, + { + "name": "esxi:hostd", + "channel": "/var/log/hostd.log" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4778, EventCode=4779" + }, + { + "name": "auditd:SYSCALL", + "channel": "ssh logins or execve of remote commands" + }, + { + "name": "macos:unifiedlog", + "channel": "Remote login (ssh) or screen sharing authentication attempts" + }, + { + "name": "kubernetes:audit", + "channel": "Unauthorized container creation or kubelet exec logs" + }, + { + "name": "auditd:USER_LOGIN", + "channel": "USER_LOGIN" + }, + { + "name": "macos:unifiedlog", + "channel": "loginwindow or sshd" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4800, 4801" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4776, 4771, 4770" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve,socket,connect,openat" + }, + { + "name": "macos:unifiedlog", + "channel": "Group membership change for admin or wheel" + }, + { + "name": "azure:audit", + "channel": "Add delegated admin / Assign admin roles / Update application consent" + }, + { + "name": "saas:okta", + "channel": "user.session.start, app.oauth2.as.authorize, policy.mfa.bypass" + }, + { + "name": "gcp:audit", + "channel": "google.iam.credentials.generateAccessToken / serviceAccountTokenCreator" + }, + { + "name": "saas:salesforce", + "channel": "ConnectedApp OAuth policy change / Login as user" + }, + { + "name": "macos:unifiedlog", + "channel": "Unusual Kerberos TGS-REQ without TGT or anomalous ticket lifetime" + }, + { + "name": "saas:okta", + "channel": "user.authentication.sso" + }, + { + "name": "m365:unified", + "channel": "FileAccessed, SharingSet" + }, + { + "name": "m365:signinlogs", + "channel": "UserLogin" + }, + { + "name": "macos:unifiedlog", + "channel": "loginwindow, sshd" + }, + { + "name": "NSM:Connections", + "channel": "Successful sudo or ssh from unknown IPs" + }, + { + "name": "macos:unifiedlog", + "channel": "loginwindow or sshd events with external IP" + }, + { + "name": "macos:unifiedlog", + "channel": "process = 'sshd'" + }, + { + "name": "esxi:auth", + "channel": "None" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:36.246000+00:00\"}, \"root['x_mitre_log_sources'][4]['name']\": {\"new_value\": \"azure:signinlogs\", \"old_value\": \"azure:signinLogs\"}, \"root['x_mitre_log_sources'][3]['channel']\": {\"new_value\": \"EventCode=4776, 4771, 4770\", \"old_value\": \"EventCode=4624, 4634, 4672, 4768, 4769\", \"new_path\": \"root['x_mitre_log_sources'][18]['channel']\"}, \"root['x_mitre_log_sources'][32]['name']\": {\"new_value\": \"m365:signinlogs\", \"old_value\": \"m365:signin\", \"new_path\": \"root['x_mitre_log_sources'][28]['name']\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][3]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4672, 4634\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][11]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4624, 4634, 4672, 4769\"}, \"root['x_mitre_log_sources'][12]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4624, 4672\"}, \"root['x_mitre_log_sources'][20]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4776,4771,4770\"}, \"root['x_mitre_log_sources'][27]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4624,4672\"}, \"root['x_mitre_log_sources'][28]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4624, 4672, 4634, 4768, 4769\"}}}", + "previous_version": "2.0" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.272000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0016", + "external_id": "DC0016" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Module Load", + "description": "When a process or program dynamically attaches a shared library, module, or plugin into its memory space. This action is typically performed to extend the functionality of an application, access shared system resources, or interact with kernel-mode components.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Module", + "channel": "None" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "name": "ETW:LoadImage", + "channel": "provider: ETW LoadImage events for images from user-writable/UNC paths" + }, + { + "name": "auditd:SYSCALL", + "channel": "openat/read/mmap: Open/mmap .so files from non-standard paths" + }, + { + "name": "linux:osquery", + "channel": "select: Open files path LIKE '/tmp/%.so' OR '/dev/shm/%.so'" + }, + { + "name": "macos:unifiedlog", + "channel": "dyld/unified log entries indicating image load from non-system paths" + }, + { + "name": "macos:osquery", + "channel": "select: path LIKE '%/Library/%/*.dylib' OR '/tmp/*.dylib'" + }, + { + "name": "macos:unifiedlog", + "channel": "dynamic loading of sleep-related functions or sandbox detection libraries" + }, + { + "name": "auditd:SYSCALL", + "channel": "LD_PRELOAD Logging" + }, + { + "name": "linux:osquery", + "channel": "Dynamic Linking State" + }, + { + "name": "macos:unifiedlog", + "channel": "DYLD event subsystem" + }, + { + "name": "linux:osquery", + "channel": "Process linked with libcrypto.so making external connections" + }, + { + "name": "macos:unifiedlog", + "channel": "process execution events with dylib load activity" + }, + { + "name": "linux:Sysmon", + "channel": "EventCode=7" + }, + { + "name": "WinEventLog:Application", + "channel": "CLR Assembly creation, loading, or modification logs via MSSQL CLR integration" + }, + { + "name": "macos:unifiedlog", + "channel": "Process memory maps new dylib (dylib_load event)" + }, + { + "name": "macos:unifiedlog", + "channel": "Dylib loaded from abnormal location" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=3033" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=3063" + }, + { + "name": "auditd:MMAP", + "channel": "load: Loading of libzip.so, libz.so, or libbz2.so by processes not normally associated with archiving" + }, + { + "name": "macos:unifiedlog", + "channel": "Loading of libz.dylib, libarchive.dylib by non-standard applications" + }, + { + "name": "macos:unifiedlog", + "channel": "suspicious dlopen/dlsym usage in non-development processes" + }, + { + "name": "m365:unified", + "channel": "Non-standard Office startup component detected (e.g., unexpected DLL path)" + }, + { + "name": "auditd:SYSCALL", + "channel": "mmap" + }, + { + "name": "esxi:vmkernel", + "channel": "unexpected module load" + }, + { + "name": "snmp:status", + "channel": "Status change in cryptographic hardware modules (enabled -> disabled)" + }, + { + "name": "esxi:vmkernel", + "channel": "module load" + }, + { + "name": "macos:unifiedlog", + "channel": "delay/sleep library usage in user context" + }, + { + "name": "linux:syslog", + "channel": "kmod" + }, + { + "name": "macos:unifiedlog", + "channel": "subsystem=com.apple.kextd" + }, + { + "name": "macos:unifiedlog", + "channel": "loading of unexpected dylibs compared to historical baselines" + }, + { + "name": "auditd:file-events", + "channel": "open of suspicious .so from non-standard paths" + }, + { + "name": "macos:syslog", + "channel": "DYLD_INSERT_LIBRARIES anomalies" + }, + { + "name": "auditd:SYSCALL", + "channel": "dmesg" + }, + { + "name": "macos:endpointsecurity", + "channel": "ES_EVENT_TYPE_NOTIFY_KEXTLOAD" + }, + { + "name": "auditd:SYSCALL", + "channel": "module load or memory map path" + }, + { + "name": "macos:unifiedlog", + "channel": "launch and dylib load" + }, + { + "name": "linux:osquery", + "channel": "Processes linked with libssl/libcrypto performing network activity" + }, + { + "name": "etw:Microsoft-Windows-Kernel-ImageLoad", + "channel": "provider: Unsigned/user-writable image loads into msbuild.exe" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:35.471000+00:00\"}, \"root['description']\": {\"new_value\": \"When a process or program dynamically attaches a shared library, module, or plugin into its memory space. This action is typically performed to extend the functionality of an application, access shared system resources, or interact with kernel-mode components.\", \"old_value\": \"When a process or program dynamically attaches a shared library, module, or plugin into its memory space. This action is typically performed to extend the functionality of an application, access shared system resources, or interact with kernel-mode components.\\n\\n*Data Collection Measures:*\\n\\n- Event Logging (Windows):\\n - Sysmon Event ID 7: Logs when a DLL is loaded into a process.\\n - Windows Security Event ID 4688: Captures process creation events, often useful for correlating module loads.\\n - Windows Defender ATP: Can provide visibility into suspicious module loads.\\n- Event Logging (Linux/macOS):\\n - AuditD (`execve` and `open` syscalls): Captures when shared libraries (`.so` files) are loaded.\\n - Ltrace/Strace: Monitors process behavior, including library calls (`dlopen`, `execve`).\\n - MacOS Endpoint Security Framework (ESF): Monitors library loads (`ES_EVENT_TYPE_NOTIFY_DYLD_INSERT_LIBRARIES`).\\n- Endpoint Detection & Response (EDR): \\n - Provide real-time telemetry on module loads and process injections.\\n - Sysinternals Process Monitor (`procmon`): Captures loaded modules and their execution context.\\n- Memory Forensics:\\n - Volatility Framework (`malfind`, `ldrmodules`): Detects injected DLLs and anomalous module loads.\\n - Rekall Framework: Useful for kernel-mode module detection.\\n- SIEM and Log Analysis:\\n - Centralized log aggregation to correlate suspicious module loads across the environment.\\n - Detection rules using correlation searches and behavioral analytics.\", \"diff\": \"--- \\n+++ \\n@@ -1,21 +1 @@\\n When a process or program dynamically attaches a shared library, module, or plugin into its memory space. This action is typically performed to extend the functionality of an application, access shared system resources, or interact with kernel-mode components.\\n-\\n-*Data Collection Measures:*\\n-\\n-- Event Logging (Windows):\\n- - Sysmon Event ID 7: Logs when a DLL is loaded into a process.\\n- - Windows Security Event ID 4688: Captures process creation events, often useful for correlating module loads.\\n- - Windows Defender ATP: Can provide visibility into suspicious module loads.\\n-- Event Logging (Linux/macOS):\\n- - AuditD (`execve` and `open` syscalls): Captures when shared libraries (`.so` files) are loaded.\\n- - Ltrace/Strace: Monitors process behavior, including library calls (`dlopen`, `execve`).\\n- - MacOS Endpoint Security Framework (ESF): Monitors library loads (`ES_EVENT_TYPE_NOTIFY_DYLD_INSERT_LIBRARIES`).\\n-- Endpoint Detection & Response (EDR): \\n- - Provide real-time telemetry on module loads and process injections.\\n- - Sysinternals Process Monitor (`procmon`): Captures loaded modules and their execution context.\\n-- Memory Forensics:\\n- - Volatility Framework (`malfind`, `ldrmodules`): Detects injected DLLs and anomalous module loads.\\n- - Rekall Framework: Useful for kernel-mode module detection.\\n-- SIEM and Log Analysis:\\n- - Centralized log aggregation to correlate suspicious module loads across the environment.\\n- - Detection rules using correlation searches and behavioral analytics.\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1When a process or program dynamically attaches a shared librt1When a process or program dynamically attaches a shared libr
>ary, module, or plugin into its memory space. This action is>ary, module, or plugin into its memory space. This action is
> typically performed to extend the functionality of an appli> typically performed to extend the functionality of an appli
>cation, access shared system resources, or interact with ker>cation, access shared system resources, or interact with ker
>nel-mode components.  *Data Collection Measures:*  - Event L>nel-mode components.
>ogging (Windows):     - Sysmon Event ID 7: Logs when a DLL i 
>s loaded into a process.     - Windows Security Event ID 468 
>8: Captures process creation events, often useful for correl 
>ating module loads.     - Windows Defender ATP: Can provide  
>visibility into suspicious module loads. - Event Logging (Li 
>nux/macOS):     - AuditD (`execve` and `open` syscalls): Cap 
>tures when shared libraries (`.so` files) are loaded.     -  
>Ltrace/Strace: Monitors process behavior, including library  
>calls (`dlopen`, `execve`).     - MacOS Endpoint Security Fr 
>amework (ESF): Monitors library loads (`ES_EVENT_TYPE_NOTIFY 
>_DYLD_INSERT_LIBRARIES`). - Endpoint Detection & Response (E 
>DR):      - Provide real-time telemetry on module loads and  
>process injections.     - Sysinternals Process Monitor (`pro 
>cmon`): Captures loaded modules and their execution context. 
> - Memory Forensics:     - Volatility Framework (`malfind`,  
>`ldrmodules`): Detects injected DLLs and anomalous module lo 
>ads.     - Rekall Framework: Useful for kernel-mode module d 
>etection. - SIEM and Log Analysis:     - Centralized log agg 
>regation to correlate suspicious module loads across the env 
>ironment.     - Detection rules using correlation searches a 
>nd behavioral analytics. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.274000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0082", + "external_id": "DC0082" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Network Connection Creation", + "description": "The initial establishment of a network session, where a system or process initiates a connection to a local or remote endpoint. This typically involves capturing socket information (source/destination IP, ports, protocol) and tracking session metadata. Monitoring these events helps detect lateral movement, exfiltration, and command-and-control (C2) activities.\n\n*Data Collection Measures:*\n\n- Windows:\n - Event ID 5156 \u2013 Filtering Platform Connection - Logs network connections permitted by Windows Filtering Platform (WFP).\n - Sysmon Event ID 3 \u2013 Network Connection Initiated - Captures process, source/destination IP, ports, and parent process.\n- Linux/macOS:\n - Netfilter (iptables), nftables logs - Tracks incoming and outgoing network connections.\n - AuditD (`connect` syscall) - Logs TCP, UDP, and ICMP connections.\n - Zeek (`conn.log`) - Captures protocol, duration, and bytes transferred.\n- Cloud & Network Infrastructure:\n - AWS VPC Flow Logs / Azure NSG Flow Logs - Logs IP traffic at the network level in cloud environments.\n - Zeek (conn.log) or Suricata (network events) - Captures packet metadata for detection and correlation.\n- Endpoint Detection & Response (EDR):\n - Detect anomalous network activity such as new C2 connections or data exfiltration attempts.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Network Traffic", + "channel": "None" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "Outbound connection to 169.254.169.254 from EC2 workload" + }, + { + "name": "macos:unifiedlog", + "channel": "connection attempts" + }, + { + "name": "esxi:hostd", + "channel": "System service interactions" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "name": "NSM:Connections", + "channel": "web domain alerts" + }, + { + "name": "auditd:SYSCALL", + "channel": "connect" + }, + { + "name": "macos:osquery", + "channel": "process_events/socket_events" + }, + { + "name": "NSM:Firewall", + "channel": "Outbound Connections" + }, + { + "name": "macos:unifiedlog", + "channel": "connection open" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execs of chromium, google-chrome, firefox, libreoffice with http(s) in cmdline" + }, + { + "name": "NSM:Flow", + "channel": "New TCP/443 or TCP/80 to domain not previously seen for the user/host" + }, + { + "name": "NSM:Connections", + "channel": "New outbound connection from Safari/Chrome/Firefox/Word" + }, + { + "name": "NSM:Flow", + "channel": "conn.log" + }, + { + "name": "macos:osquery", + "channel": "execution of trusted tools interacting with external endpoints" + }, + { + "name": "linux:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "name": "WinEventLog:Microsoft-Windows-Bits-Client/Operational", + "channel": "BITS job lifecycle events such as job create/modify/transfer/complete and URL/remote name fields" + }, + { + "name": "NSM:Firewall", + "channel": "proxy or TLS inspection logs" + }, + { + "name": "macos:unifiedlog", + "channel": "network connection events" + }, + { + "name": "esxi:vmkernel", + "channel": "protocol egress" + }, + { + "name": "NSM:Flow", + "channel": "Outbound connection to *.tunnels.api.visualstudio.com or *.devtunnels.ms" + }, + { + "name": "NSM:Flow", + "channel": "Connections to *.devtunnels.ms or tunnels.api.visualstudio.com" + }, + { + "name": "NSM:Flow", + "channel": "HTTPs connection to tunnels.api.visualstudio.com" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=5156, 5157" + }, + { + "name": "linux:osquery", + "channel": "family=AF_PACKET or protocol raw; process name not in allowlist." + }, + { + "name": "macos:unifiedlog", + "channel": "First outbound connection from the same PID/user shortly after an inbound trigger." + }, + { + "name": "NSM:Flow", + "channel": "Outbound or inbound TFTP file transfers of ROMMON or firmware binaries" + }, + { + "name": "NSM:Connections", + "channel": "Outbound connections from newly spawned child processes or from the browser to uncommon endpoints or on anomalous ports" + }, + { + "name": "NSM:Flow", + "channel": "connection: TCP connections to ports 139/445 to multiple hosts" + }, + { + "name": "NSM:Flow", + "channel": "connection: SMB connections to multiple internal hosts" + }, + { + "name": "auditd:SYSCALL", + "channel": "connect/sendto" + }, + { + "name": "macos:endpointsecurity", + "channel": "ES_EVENT_TYPE_NOTIFY_CONNECT" + }, + { + "name": "snmp:access", + "channel": "GETBULK/GETNEXT requests for OIDs associated with configuration parameters" + }, + { + "name": "esxi:hostd", + "channel": "Service initiated connections" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "Large transfer volume (>20MB) from RDS IP range to external public IPs" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "High outbound traffic from new region resource" + }, + { + "name": "NSM:Flow", + "channel": "Outbound HTTP/S initiated by newly installed interpreter process" + }, + { + "name": "auditd:SYSCALL", + "channel": "open or connect syscalls on /tmp/ssh-* or $SSH_AUTH_SOCK" + }, + { + "name": "NSM:Flow", + "channel": "outbound connections to RMM services or to unusual destination ports" + }, + { + "name": "macos:unifiedlog", + "channel": "network sessions initiated by remote desktop apps" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "Outbound connections to port 22, 3389" + }, + { + "name": "auditd:SYSCALL", + "channel": "socket/connect with TLS context by unexpected process" + }, + { + "name": "NSM:Flow", + "channel": "Multiple failed connections (conn_state=REJ/S0 or history has 'R') across distinct ports from the same src_ip followed by success to a specific port." + }, + { + "name": "auditd:SYSCALL", + "channel": "socket/bind: New bind() to a previously closed port shortly after the sequence." + }, + { + "name": "NSM:Flow", + "channel": "Sequence of REJ/S0 then SF success from same src_ip within TimeWindow." + }, + { + "name": "NSM:Flow", + "channel": "Series of denied/closed flows to distinct ports then success to mgmt port from same src_ip within TimeWindow." + }, + { + "name": "NSM:Flow", + "channel": "Outbound traffic spike through formerly blocked ports/subnets following config change" + }, + { + "name": "cni:netflow", + "channel": "outbound connection to internal or external APIs" + }, + { + "name": "macos:osquery", + "channel": "launchd or network_events" + }, + { + "name": "networkdevice:syslog", + "channel": "Dynamic route changes" + }, + { + "name": "NSM:Flow", + "channel": "New egress to Internet by the same UID/host shortly after terminal exec" + }, + { + "name": "NSM:Flow", + "channel": "connection: Inbound connections to SSH or VPN ports" + }, + { + "name": "macos:unifiedlog", + "channel": "Inbound connections to VNC/SSH ports" + }, + { + "name": "NSM:Flow", + "channel": "External access to container ports (2375, 6443)" + }, + { + "name": "linux:syslog", + "channel": "network" + }, + { + "name": "macos:osquery", + "channel": "process_events + launchd" + }, + { + "name": "esxi:esxupdate", + "channel": "/var/log/esxupdate.log or /var/log/vmksummary.log" + }, + { + "name": "ebpf:syscalls", + "channel": "socket connect" + }, + { + "name": "NSM:Flow", + "channel": "remote access" + }, + { + "name": "NSM:Flow", + "channel": "Outbound Connections" + }, + { + "name": "macos:unifiedlog", + "channel": "network" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "Traffic observed on mirror destination instance" + }, + { + "name": "networkdevice:Flow", + "channel": "Traffic from mirrored interface to mirror target IP" + }, + { + "name": "macos:osquery", + "channel": "process_events, socket_events" + }, + { + "name": "esxi:vmkernel", + "channel": "network activity" + }, + { + "name": "NSM:Flow", + "channel": "connection attempts" + }, + { + "name": "NSM:Flow", + "channel": "High-volume or repeated SNMP GETBULK/GETNEXT queries from untrusted or external IPs" + }, + { + "name": "auditd:SYSCALL", + "channel": "sendto/connect" + }, + { + "name": "NSM:Flow", + "channel": "outbound connections from host during or immediately after image build" + }, + { + "name": "macos:unifiedlog", + "channel": "Outbound Traffic" + }, + { + "name": "esxi:hostd", + "channel": "Service-Based Network Connection" + }, + { + "name": "linux:syslog", + "channel": "postfix/smtpd" + }, + { + "name": "NSM:Flow", + "channel": "new outbound connection from browser/office lineage" + }, + { + "name": "NSM:Flow", + "channel": "new outbound connection from exploited lineage" + }, + { + "name": "macos:osquery", + "channel": "CONNECT: Long-lived connections from remote-control parents to external IPs/domains" + }, + { + "name": "auditd:SYSCALL", + "channel": "outbound connections" + }, + { + "name": "macos:unifiedlog", + "channel": "None" + }, + { + "name": "esxi:vmkernel", + "channel": "None" + }, + { + "name": "macos:unifiedlog", + "channel": "networkd or socket" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream network activity" + }, + { + "name": "NSM:Flow", + "channel": "Multiple failed connections to closed ports (history contains 'R' or conn_state in {REJ, S0}) followed by a successful handshake to a new port from same src within TimeWindowKnock" + }, + { + "name": "auditd:SYSCALL", + "channel": "socket/bind: Process binds to a new local port shortly after knock" + }, + { + "name": "NSM:Flow", + "channel": "Closed-port hits followed by success from same src_ip" + }, + { + "name": "NSM:Flow", + "channel": "Port-knock pattern from one src to device unicast,broadcast,network addresses on same port within TimeWindowKnock" + }, + { + "name": "WinEventLog:Microsoft-Windows-WLAN-AutoConfig", + "channel": "EventCode=8001, 8002, 8003" + }, + { + "name": "linux:syslog", + "channel": "New Wi-Fi connection established or repeated association failures" + }, + { + "name": "macos:unifiedlog", + "channel": "Association and authentication events including failures and new SSIDs" + }, + { + "name": "auditd:SYSCALL", + "channel": "socket/connect calls showing SSH processes forwarding arbitrary ports" + }, + { + "name": "esxi:vmkernel", + "channel": "network session initiation with external HTTPS services" + }, + { + "name": "WinEventLog:System", + "channel": "EventCode=8001" + }, + { + "name": "linux:syslog", + "channel": "None" + }, + { + "name": "macos:osquery", + "channel": "None" + }, + { + "name": "auditd:SYSCALL", + "channel": "openat,connect -k discovery" + }, + { + "name": "NSM:Flow", + "channel": "Unexpected inbound/outbound TFTP traffic for device image files" + }, + { + "name": "NSM:Flow", + "channel": "Unexpected or unauthorized inbound connections to SNMP, NETCONF, or RESTCONF services" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "mobile-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:34.190000+00:00\"}, \"root['x_mitre_log_sources'][19]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=22\", \"new_path\": \"root['x_mitre_log_sources'][15]['channel']\"}, \"root['x_mitre_log_sources'][27]['channel']\": {\"new_value\": \"EventCode=5156, 5157\", \"old_value\": \"EventCode=5156\", \"new_path\": \"root['x_mitre_log_sources'][23]['channel']\"}, \"root['x_mitre_log_sources'][90]['channel']\": {\"new_value\": \"EventCode=8001, 8002, 8003\", \"old_value\": \"8001, 8002, 8003\", \"new_path\": \"root['x_mitre_log_sources'][84]['channel']\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][2]\": {\"name\": \"WinEventLog:Sysmon\", \"channel\": \"EventCode=3\"}, \"root['x_mitre_log_sources'][7]\": {\"name\": \"WinEventLog:Sysmon\", \"channel\": \"EventCode=22\"}, \"root['x_mitre_log_sources'][9]\": {\"name\": \"auditd:SYSCALL\", \"channel\": \"netconnect\"}, \"root['x_mitre_log_sources'][17]\": {\"name\": \"auditd:SYSCALL\", \"channel\": \"open or connect\"}, \"root['x_mitre_log_sources'][28]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=5156,5157\"}, \"root['x_mitre_log_sources'][68]\": {\"name\": \"linux:Sysmon\", \"channel\": \"EventCode=3\"}}}", + "previous_version": "2.0" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--f5468e67-51c7-4756-9b4f-65707708e7fa", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.275000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0102", + "external_id": "DC0102" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Network Share Access", + "description": "Opening a network share, which makes the contents available to the requestor (ex: Windows EID 5140 or 5145)", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Network Share", + "channel": "None" + }, + { + "name": "WinEventLog:Microsoft-Windows-SMBClient/Security", + "channel": "EventCode=31001" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=5140" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=5145" + }, + { + "name": "WinEventLog:Microsoft-Windows-SMBServer", + "channel": "Access to SYSVOL share from non-admin user or unusual endpoints" + }, + { + "name": "NSM:Flow", + "channel": "smb_files.log" + }, + { + "name": "m365:unified", + "channel": "FileUploaded, FileAccessed" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:37.412000+00:00\"}, \"root['description']\": {\"new_value\": \"Opening a network share, which makes the contents available to the requestor (ex: Windows EID 5140 or 5145)\", \"old_value\": \"Opening a network share, which makes the contents available to the requestor (ex: Windows EID 5140 or 5145)\\n\\n*Data Collection Measures:*\\n\\n- Windows:\\n - Event ID 5140 \\u2013 Network Share Object Access Logs every access attempt to a network share.\\n - Event ID 5145 \\u2013 Detailed Network Share Object Access Captures granular access control information, including the requesting user, source IP, and access permissions.\\n - Sysmon Event ID 3 \\u2013 Network Connection Initiated Helps track SMB connections to suspicious or unauthorized network shares.\\n - Enable Audit Policy for Network Share Access: `auditpol /set /subcategory:\\\"File Share\\\" /success:enable /failure:enable`\\n - Enable PowerShell Logging to Detect Unauthorized SMB Access: `Set-ExecutionPolicy RemoteSigned`\\n - Restrict Network Share Access with Group Policy (GPO): `Computer Configuration \\u2192 Windows Settings \\u2192 Security Settings \\u2192 Local Policies \\u2192 User Rights Assignment` Set \\\"Access this computer from the network\\\" to restrict unauthorized accounts.\\n- Linux/macOS:\\n - AuditD (`open`, `read`, `write`, `connect` syscalls) Detects access to NFS, CIFS, and SMB network shares.\\n - Lsof (`lsof | grep nfs` or `lsof | grep smb`) Identifies active network share connections.\\n - Mount (`mount | grep nfs` or `mount | grep cifs`) Lists currently mounted network shares.\\n - Enable AuditD for SMB/NFS Access: `auditctl -a always,exit -F arch=b64 -S open -F path=/mnt/share -k network_share_access`\\n - Monitor Active Network Shares Using Netstat: `netstat -an | grep :445`\\n- Endpoint Detection & Response (EDR):\\n - Detects abnormal network share access behavior, such as unusual account usage, large file transfers, or encrypted file activity.\", \"diff\": \"--- \\n+++ \\n@@ -1,19 +1 @@\\n Opening a network share, which makes the contents available to the requestor (ex: Windows EID 5140 or 5145)\\n-\\n-*Data Collection Measures:*\\n-\\n-- Windows:\\n- - Event ID 5140 \\u2013 Network Share Object Access Logs every access attempt to a network share.\\n- - Event ID 5145 \\u2013 Detailed Network Share Object Access Captures granular access control information, including the requesting user, source IP, and access permissions.\\n- - Sysmon Event ID 3 \\u2013 Network Connection Initiated Helps track SMB connections to suspicious or unauthorized network shares.\\n- - Enable Audit Policy for Network Share Access: `auditpol /set /subcategory:\\\"File Share\\\" /success:enable /failure:enable`\\n- - Enable PowerShell Logging to Detect Unauthorized SMB Access: `Set-ExecutionPolicy RemoteSigned`\\n- - Restrict Network Share Access with Group Policy (GPO): `Computer Configuration \\u2192 Windows Settings \\u2192 Security Settings \\u2192 Local Policies \\u2192 User Rights Assignment` Set \\\"Access this computer from the network\\\" to restrict unauthorized accounts.\\n-- Linux/macOS:\\n- - AuditD (`open`, `read`, `write`, `connect` syscalls) Detects access to NFS, CIFS, and SMB network shares.\\n- - Lsof (`lsof | grep nfs` or `lsof | grep smb`) Identifies active network share connections.\\n- - Mount (`mount | grep nfs` or `mount | grep cifs`) Lists currently mounted network shares.\\n- - Enable AuditD for SMB/NFS Access: `auditctl -a always,exit -F arch=b64 -S open -F path=/mnt/share -k network_share_access`\\n- - Monitor Active Network Shares Using Netstat: `netstat -an | grep :445`\\n-- Endpoint Detection & Response (EDR):\\n- - Detects abnormal network share access behavior, such as unusual account usage, large file transfers, or encrypted file activity.\"}, \"root['x_mitre_log_sources'][1]['channel']\": {\"new_value\": \"EventCode=31001\", \"old_value\": \"EventID=31001\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Opening a network share, which makes the contents available t1Opening a network share, which makes the contents available 
>to the requestor (ex: Windows EID 5140 or 5145)  *Data Colle>to the requestor (ex: Windows EID 5140 or 5145)
>ction Measures:*  - Windows:     - Event ID 5140 \u2013 Network S 
>hare Object Access Logs every access attempt to a network sh 
>are.     - Event ID 5145 \u2013 Detailed Network Share Object Acc 
>ess Captures granular access control information, including  
>the requesting user, source IP, and access permissions.      
>- Sysmon Event ID 3 \u2013 Network Connection Initiated Helps tra 
>ck SMB connections to suspicious or unauthorized network sha 
>res.     - Enable Audit Policy for Network Share Access: `au 
>ditpol /set /subcategory:\"File Share\" /success:enable /failu 
>re:enable`     - Enable PowerShell Logging to Detect Unautho 
>rized SMB Access: `Set-ExecutionPolicy RemoteSigned`     - R 
>estrict Network Share Access with Group Policy (GPO): `Compu 
>ter Configuration \u2192 Windows Settings \u2192 Security Settings \u2192 L 
>ocal Policies \u2192 User Rights Assignment` Set \"Access this com 
>puter from the network\" to restrict unauthorized accounts. - 
> Linux/macOS:     - AuditD (`open`, `read`, `write`, `connec 
>t` syscalls) Detects access to NFS, CIFS, and SMB network sh 
>ares.     - Lsof (`lsof | grep nfs` or `lsof | grep smb`) Id 
>entifies active network share connections.     - Mount (`mou 
>nt | grep nfs` or `mount | grep cifs`) Lists currently mount 
>ed network shares.     - Enable AuditD for SMB/NFS Access: ` 
>auditctl -a always,exit -F arch=b64 -S open -F path=/mnt/sha 
>re -k network_share_access`     - Monitor Active Network Sha 
>res Using Netstat: `netstat -an | grep :445` - Endpoint Dete 
>ction & Response (EDR):     - Detects abnormal network share 
> access behavior, such as unusual account usage, large file  
>transfers, or encrypted file activity. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.274000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0078", + "external_id": "DC0078" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Network Traffic Flow", + "description": "Summarized network packet data that captures session-level details such as source/destination IPs, ports, protocol types, timestamps, and data volume, without storing full packet payloads. This is commonly used for traffic analysis, anomaly detection, and network performance monitoring.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Network Traffic", + "channel": "None" + }, + { + "name": "macos:osquery", + "channel": "socket_events" + }, + { + "name": "NSM:Flow", + "channel": "Unexpected flows between segmented networks or prohibited ports" + }, + { + "name": "snmp:config", + "channel": "Configuration change traps or policy enforcement failures" + }, + { + "name": "NSM:Flow", + "channel": "First-time outbound connections to package registries or unknown hosts immediately after restore/build" + }, + { + "name": "NSM:Flow", + "channel": "First-time egress to new registries/CDNs post-install/build" + }, + { + "name": "NSM:Flow", + "channel": "First-time egress to non-approved registries after dependency install" + }, + { + "name": "NSM:Flow", + "channel": "Outbound connections to TCP 139,445 and HTTP/HTTPS to WebDAV endpoints from workstation subnets" + }, + { + "name": "NSM:Flow", + "channel": "large outbound data flows or long-duration connections" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "egress > 90th percentile or frequent connection reuse" + }, + { + "name": "NSM:Flow", + "channel": "conn.log" + }, + { + "name": "auditd:SYSCALL", + "channel": "socket/connect" + }, + { + "name": "esxi:syslog", + "channel": "esxcli network vswitch or DNS resolver configuration updates" + }, + { + "name": "esxi:vobd", + "channel": "Network Events" + }, + { + "name": "iptables:LOG", + "channel": "TCP connections" + }, + { + "name": "NSM:Flow", + "channel": "connection metadata" + }, + { + "name": "wineventlog:dhcp", + "channel": "DHCP Lease Granted" + }, + { + "name": "NSM:Flow", + "channel": "LEASE_GRANTED" + }, + { + "name": "NSM:Flow", + "channel": "MAC not in allow-list acquiring IP (DHCP)" + }, + { + "name": "Windows Firewall Log", + "channel": "SMB over high port" + }, + { + "name": "NSM:Connections", + "channel": "Internal connection logging" + }, + { + "name": "NSM:Flow", + "channel": "pf firewall logs" + }, + { + "name": "esxi:vmkernel", + "channel": "/var/log/vmkernel.log" + }, + { + "name": "NSM:Flow", + "channel": "Inter-segment traffic" + }, + { + "name": "NSM:Flow", + "channel": "None" + }, + { + "name": "NSM:Flow", + "channel": "Long-lived or hijacked SSH sessions maintained with no active user activity" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "VPC/NSG flow logs for pod/instance egress to Internet or metadata" + }, + { + "name": "macos:unifiedlog", + "channel": "Suspicious outbound traffic from browser binary to non-standard domains" + }, + { + "name": "NSM:Flow", + "channel": "Abnormal browser traffic volume or destination" + }, + { + "name": "NSM:Flow", + "channel": "Outbound requests to domains not previously resolved or associated with phishing campaigns" + }, + { + "name": "NSM:Flow", + "channel": "Outbound traffic to domains/IPs not previously resolved, occurring shortly after attachment download or link click" + }, + { + "name": "M365Defender:DeviceNetworkEvents", + "channel": "NetworkConnection: bytes_sent >> bytes_received anomaly" + }, + { + "name": "PF:Logs", + "channel": "outbound flows with bytes_out >> bytes_in" + }, + { + "name": "NSX:FlowLogs", + "channel": "network_flow: bytes_out >> bytes_in to external" + }, + { + "name": "NSM:Flow", + "channel": "NetFlow/Zeek conn.log" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "Outbound data flows" + }, + { + "name": "NSM:Flow", + "channel": "Flow records with entropy signatures resembling symmetric encryption" + }, + { + "name": "NSM:Flow", + "channel": "flow records" + }, + { + "name": "networkdevice:syslog", + "channel": "flow records" + }, + { + "name": "macos:unifiedlog", + "channel": "HTTPS POST to known webhook URLs" + }, + { + "name": "saas:api", + "channel": "Webhook registrations or repeated POST activity" + }, + { + "name": "NSM:Flow", + "channel": "Source/destination IP translation inconsistent with intended policy" + }, + { + "name": "SNMP:DeviceLogs", + "channel": "Unexpected NAT translation statistics or rule insertion events" + }, + { + "name": "NSM:Flow", + "channel": "Sudden spike in incoming flows to web service ports from single/multiple IPs" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "Unusual volume of inbound packets from single source across short time interval" + }, + { + "name": "NSM:Flow", + "channel": "port 5900 inbound" + }, + { + "name": "NSM:Flow", + "channel": "TCP port 5900 open" + }, + { + "name": "NSM:firewall", + "channel": "inbound connection to port 5900" + }, + { + "name": "NSM:Firewall", + "channel": "Outbound connections to 139/445 to multiple destinations" + }, + { + "name": "VPCFlowLogs:All", + "channel": "High volume internal traffic with low entropy indicating looped or malicious DoS script" + }, + { + "name": "NSM:Flow", + "channel": "NetFlow/sFlow/PCAP" + }, + { + "name": "NSM:Flow", + "channel": "Outbound Network Flow" + }, + { + "name": "macos:unifiedlog", + "channel": "com.apple.network" + }, + { + "name": "NSM:Flow", + "channel": "Device-to-Device Deployment Flows" + }, + { + "name": "auditd:SYSCALL", + "channel": "socket/connect syscalls" + }, + { + "name": "macos:unifiedlog", + "channel": "outbound TCP/UDP traffic over unexpected port" + }, + { + "name": "esxi:vpxd", + "channel": "ESXi service connections on unexpected ports" + }, + { + "name": "iptables:LOG", + "channel": "OUTBOUND" + }, + { + "name": "macos:unifiedlog", + "channel": "tcp/udp" + }, + { + "name": "esxi:hostd", + "channel": "CLI network calls" + }, + { + "name": "NSM:Flow", + "channel": "Outbound traffic from suspicious new processes post-attachment execution" + }, + { + "name": "macos:unifiedlog", + "channel": "Suspicious anomalies in transmitted data integrity during application network operations" + }, + { + "name": "esxi:syslog", + "channel": "DNS resolution events leading to outbound traffic on unexpected ports" + }, + { + "name": "NSM:Flow", + "channel": "Outbound traffic to mining pools or proxies" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "Outbound flow logs to known mining pools" + }, + { + "name": "container:cni", + "channel": "Outbound network traffic to mining proxies" + }, + { + "name": "esxi:vpxd", + "channel": "TLS session established by ESXi service to unapproved endpoint" + }, + { + "name": "NSM:Flow", + "channel": "Session records with TLS-like byte patterns" + }, + { + "name": "macos:unifiedlog", + "channel": "HTTPS POST requests to pastebin.com or similar" + }, + { + "name": "NetFlow:Flow", + "channel": "new outbound connections from exploited process tree" + }, + { + "name": "NSM:Connections", + "channel": "new connections from exploited lineage" + }, + { + "name": "NSM:Flow", + "channel": "Unexpected route changes or duplicate gateway advertisements" + }, + { + "name": "WinEventLog:Microsoft-Windows-Windows Firewall With Advanced Security/Firewall", + "channel": "EventCode=2004, 2005, 2006" + }, + { + "name": "NSM:Flow", + "channel": "Knock pattern: repeated REJ/S0 across \u2265MinSequenceLen ports from same src_ip then SF success." + }, + { + "name": "macos:unifiedlog", + "channel": "Firewall/PF anchor load or rule change events." + }, + { + "name": "networkdevice:syslog", + "channel": "Config/ACL changes, line vty transport input changes, telnet/ssh/http(s) enable, image/feature module changes." + }, + { + "name": "NSM:Flow", + "channel": "First-time egress to non-approved update hosts right after install/update" + }, + { + "name": "NSM:Flow", + "channel": "New outbound flows to non-approved vendor hosts post install" + }, + { + "name": "NSM:Flow", + "channel": "New/rare egress to non-approved update hosts after install" + }, + { + "name": "NSM:Flow", + "channel": "large outbound HTTPS uploads to repo domains" + }, + { + "name": "esxi:vmkernel", + "channel": "HTTPS traffic to repository domains" + }, + { + "name": "NSM:Flow", + "channel": "alert log" + }, + { + "name": "esxi:vmkernel", + "channel": "None" + }, + { + "name": "NSM:Flow", + "channel": "Outbound flow records" + }, + { + "name": "m365:defender", + "channel": "NetworkConnection: high out:in ratio, periodic beacons, protocol mismatch" + }, + { + "name": "PF:Logs", + "channel": "high out:in ratio or fixed-size periodic flows" + }, + { + "name": "NSM:Flow", + "channel": "network_flow: bytes_out >> bytes_in, fixed packet sizes/intervals to non-approved CIDRs" + }, + { + "name": "auditd:SYSCALL", + "channel": "connect or sendto system call with burst pattern" + }, + { + "name": "macos:unifiedlog", + "channel": "sudden burst in outgoing packets from same PID" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "source instance sends large volume of traffic in short window" + }, + { + "name": "NSM:Flow", + "channel": "session stats with bytes_out > bytes_in" + }, + { + "name": "NIDS:Flow", + "channel": "session stats with bytes_out > bytes_in" + }, + { + "name": "esxi:vpxa", + "channel": "connection attempts and data transmission logs" + }, + { + "name": "PF:Logs", + "channel": "External traffic to remote access services" + }, + { + "name": "NSM:Flow", + "channel": "High volumes of SYN/ACK packets with unacknowledged TCP handshakes" + }, + { + "name": "dns:query", + "channel": "Outbound resolution to hidden service domains (e.g., `.onion`)" + }, + { + "name": "NSM:Flow", + "channel": "conn.log + ssl.log with Tor fingerprinting" + }, + { + "name": "macos:unifiedlog", + "channel": "forwarded encrypted traffic" + }, + { + "name": "NSM:Flow", + "channel": "Relayed session pathing (multi-hop)" + }, + { + "name": "NSM:Flow", + "channel": "Outbound TCP SYN or UDP to multiple ports/hosts" + }, + { + "name": "containerd:runtime", + "channel": "container-level outbound traffic events" + }, + { + "name": "WLANLogs:Association", + "channel": "Multiple APs advertising the same SSID but with different BSSID/MAC or encryption type" + }, + { + "name": "linux:osquery", + "channel": "socket_events" + }, + { + "name": "WinEventLog:Security", + "channel": "ARP cache modification attempts observed through event tracing or security baselines" + }, + { + "name": "NSM:Flow", + "channel": "Gratuitous ARP replies with mismatched IP-MAC binding" + }, + { + "name": "macos:unifiedlog", + "channel": "ARP table updates inconsistent with expected gateway or DHCP lease assignments" + }, + { + "name": "macos:unifiedlog", + "channel": "networkd or com.apple.network" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream 'eventMessage contains \"dns_request\"'" + }, + { + "name": "esxi:syslog", + "channel": "/var/log/syslog.log" + }, + { + "name": "AWS:CloudTrail", + "channel": "CreateTrafficMirrorSession or ModifyTrafficMirrorTarget" + }, + { + "name": "networkdevice:syslog", + "channel": "Config change: CLI/NETCONF/SNMP \u2013 'monitor session', 'mirror port'" + }, + { + "name": "NSM:Flow", + "channel": "Outbound UDP floods targeting common reflection services with spoofed IP headers" + }, + { + "name": "macos:unifiedlog", + "channel": "Outbound UDP spikes to external reflector IPs" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "Large outbound UDP traffic to multiple public reflector IPs" + }, + { + "name": "macos:unifiedlog", + "channel": "High entropy domain queries with multiple NXDOMAINs" + }, + { + "name": "esxi:syslog", + "channel": "Frequent DNS queries with high entropy names or NXDOMAIN results" + }, + { + "name": "vpxd.log", + "channel": "API communication" + }, + { + "name": "NSM:Connections", + "channel": "Outbound Connection" + }, + { + "name": "NSM:Flow", + "channel": "Connection Tracking" + }, + { + "name": "NSM:Firewall", + "channel": "pf firewall logs" + }, + { + "name": "NSM:Flow", + "channel": "Flow Creation (NetFlow/sFlow)" + }, + { + "name": "NSM:Flow", + "channel": "conn.log, icmp.log" + }, + { + "name": "NSM:Flow", + "channel": "Abnormal SMB authentication attempts correlated with poisoned LLMNR/NBT-NS sessions" + }, + { + "name": "NSM:Flow", + "channel": "Gratuitous or duplicate DHCP OFFER packets from non-legitimate servers" + }, + { + "name": "NSM:Connections", + "channel": "Inbound on ports 5985/5986" + }, + { + "name": "linux:syslog", + "channel": "Multiple IP addresses assigned to the same domain in rapid sequence" + }, + { + "name": "macos:unifiedlog", + "channel": "Rapid domain-to-IP resolution changes for same domain" + }, + { + "name": "esxi:syslog", + "channel": "Frequent DNS resolution of same domain with rotating IPs" + }, + { + "name": "NSM:Flow", + "channel": "uncommon ports" + }, + { + "name": "NSM:Flow", + "channel": "alternate ports" + }, + { + "name": "esxi:vpxd", + "channel": "None" + }, + { + "name": "NSM:Flow", + "channel": "conn.log or flow data" + }, + { + "name": "esxi:vmkernel", + "channel": "egress log analysis" + }, + { + "name": "esxi:vmkernel", + "channel": "egress logs" + }, + { + "name": "NSM:Flow", + "channel": "High volume flows with incomplete TCP sessions or single-packet bursts" + }, + { + "name": "NSM:Flow", + "channel": "Knock pattern: multiple REJ/S0 to distinct closed ports then successful connection to service_port" + }, + { + "name": "macos:unifiedlog", + "channel": "Firewall rule enable/disable or listen socket changes" + }, + { + "name": "networkdevice:syslog", + "channel": "Config/ACL/line vty changes, service enable (telnet/ssh/http(s)), module reloads" + }, + { + "name": "auditd:SYSCALL", + "channel": "ioctl: Changes to wireless network interfaces (up, down, reassociate)" + }, + { + "name": "macos:osquery", + "channel": "query: Historical list of associated SSIDs compared against baseline" + }, + { + "name": "NSM:Flow", + "channel": "First-time egress from host after new install to unknown update endpoints" + }, + { + "name": "NSM:Flow", + "channel": "First-time egress to unknown registries/mirrors immediately after install" + }, + { + "name": "NSM:Flow", + "channel": "New egress from app just installed to unknown update endpoints" + }, + { + "name": "esxi:vpxd", + "channel": "ESXi processes relaying traffic via SSH or unexpected ports" + }, + { + "name": "NSM:Flow", + "channel": "Outbound connection to mining pool port (3333, 4444, 5555)" + }, + { + "name": "NSM:Flow", + "channel": "Outbound traffic to mining pool upon container launch" + }, + { + "name": "NSM:Flow", + "channel": "Flow records with RSA key exchange on unexpected port" + }, + { + "name": "NSM:Flow", + "channel": "Outbound connections from web server binaries (apache2, nginx, php-fpm) to unknown external IPs" + }, + { + "name": "NSM:Flow", + "channel": "sustained outbound HTTPS sessions with high data volume" + }, + { + "name": "NSM:Flow", + "channel": "Connections from IDE hosts to marketplace/tunnel domains" + }, + { + "name": "macos:unifiedlog", + "channel": "Outbound connections from IDE processes to marketplace/tunnel domains" + }, + { + "name": "NSM:Flow", + "channel": "large HTTPS outbound uploads" + }, + { + "name": "esxi:vmkernel", + "channel": "network flows to external cloud services" + }, + { + "name": "NSM:Flow", + "channel": "TCP port 22 traffic" + }, + { + "name": "esxi:vmkernel", + "channel": "port 22 access" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "mobile-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:34.703000+00:00\"}, \"root['description']\": {\"new_value\": \"Summarized network packet data that captures session-level details such as source/destination IPs, ports, protocol types, timestamps, and data volume, without storing full packet payloads. This is commonly used for traffic analysis, anomaly detection, and network performance monitoring.\", \"old_value\": \"Summarized network packet data that captures session-level details such as source/destination IPs, ports, protocol types, timestamps, and data volume, without storing full packet payloads. This is commonly used for traffic analysis, anomaly detection, and network performance monitoring.\\n\\n*Data Collection Measures:*\\n\\n- Network Flow Logs (Metadata Collection)\\n - NetFlow \\n - Summarized metadata for network conversations (no packet payloads).\\n - sFlow (Sampled Flow Logging)\\n - Captures sampled packets from switches and routers.\\n - Used for real-time traffic monitoring and anomaly detection.\\n - Zeek (Bro) Flow Logs\\n - Zeek logs session-level details in logs like conn.log, http.log, dns.log, etc.\\n- Host-Based Collection\\n - Sysmon Event ID 3 \\u2013 Network Connection Initiated\\n - Logs process-level network activity, useful for detecting malicious outbound connections.\\n - AuditD (Linux) \\u2013 syscall=connect\\n - Monitors system calls for network connections. `auditctl -a always,exit -F arch=b64 -S connect -k network_activity`\\n- Cloud & SaaS Flow Monitoring\\n - AWS VPC Flow Logs\\n - Captures metadata for traffic between EC2 instances, security groups, and internet gateways.\\n - Azure NSG Flow Logs / Google VPC Flow Logs\\n - Logs ingress/egress traffic for cloud-based resources.\", \"diff\": \"--- \\n+++ \\n@@ -1,22 +1 @@\\n Summarized network packet data that captures session-level details such as source/destination IPs, ports, protocol types, timestamps, and data volume, without storing full packet payloads. This is commonly used for traffic analysis, anomaly detection, and network performance monitoring.\\n-\\n-*Data Collection Measures:*\\n-\\n-- Network Flow Logs (Metadata Collection)\\n- - NetFlow \\n- - Summarized metadata for network conversations (no packet payloads).\\n- - sFlow (Sampled Flow Logging)\\n- - Captures sampled packets from switches and routers.\\n- - Used for real-time traffic monitoring and anomaly detection.\\n- - Zeek (Bro) Flow Logs\\n- - Zeek logs session-level details in logs like conn.log, http.log, dns.log, etc.\\n-- Host-Based Collection\\n- - Sysmon Event ID 3 \\u2013 Network Connection Initiated\\n- - Logs process-level network activity, useful for detecting malicious outbound connections.\\n- - AuditD (Linux) \\u2013 syscall=connect\\n- - Monitors system calls for network connections. `auditctl -a always,exit -F arch=b64 -S connect -k network_activity`\\n-- Cloud & SaaS Flow Monitoring\\n- - AWS VPC Flow Logs\\n- - Captures metadata for traffic between EC2 instances, security groups, and internet gateways.\\n- - Azure NSG Flow Logs / Google VPC Flow Logs\\n- - Logs ingress/egress traffic for cloud-based resources.\"}, \"root['x_mitre_log_sources'][72]['channel']\": {\"new_value\": \"EventCode=2004, 2005, 2006\", \"old_value\": \"EventCode=2004,2005,2006\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Summarized network packet data that captures session-level dt1Summarized network packet data that captures session-level d
>etails such as source/destination IPs, ports, protocol types>etails such as source/destination IPs, ports, protocol types
>, timestamps, and data volume, without storing full packet p>, timestamps, and data volume, without storing full packet p
>ayloads. This is commonly used for traffic analysis, anomaly>ayloads. This is commonly used for traffic analysis, anomaly
> detection, and network performance monitoring.  *Data Colle> detection, and network performance monitoring.
>ction Measures:*  - Network Flow Logs (Metadata Collection)  
>    - NetFlow          - Summarized metadata for network con 
>versations (no packet payloads).     - sFlow (Sampled Flow L 
>ogging)         - Captures sampled packets from switches and 
> routers.         - Used for real-time traffic monitoring an 
>d anomaly detection.     - Zeek (Bro) Flow Logs         - Ze 
>ek logs session-level details in logs like conn.log, http.lo 
>g, dns.log, etc. - Host-Based Collection     - Sysmon Event  
>ID 3 \u2013 Network Connection Initiated         - Logs process-l 
>evel network activity, useful for detecting malicious outbou 
>nd connections.     - AuditD (Linux) \u2013 syscall=connect       
>   - Monitors system calls for network connections. `auditct 
>l -a always,exit -F arch=b64 -S connect -k network_activity` 
> - Cloud & SaaS Flow Monitoring     - AWS VPC Flow Logs      
>    - Captures metadata for traffic between EC2 instances, s 
>ecurity groups, and internet gateways.     - Azure NSG Flow  
>Logs / Google VPC Flow Logs         - Logs ingress/egress tr 
>affic for cloud-based resources. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.272000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0021", + "external_id": "DC0021" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "OS API Execution", + "description": "Calls made by a process to operating system-provided Application Programming Interfaces (APIs). These calls are essential for interacting with system resources such as memory, files, and hardware, or for performing system-level tasks. Monitoring these calls can provide insight into a process's intent, especially if the process is malicious.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Process", + "channel": "None" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Base", + "channel": "GetLocaleInfoW, GetTimeZoneInformation API calls" + }, + { + "name": "AWS:CloudTrail", + "channel": "GetMetadata, DescribeInstanceIdentity" + }, + { + "name": "macos:osquery", + "channel": "open, execve: Unexpected processes accessing or modifying critical files" + }, + { + "name": "auditd:SYSCALL", + "channel": "ptrace, ioctl" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "API tracing / stack tracing via ETW or telemetry-based EDR" + }, + { + "name": "EDR:memory", + "channel": "Behavioral API telemetry (GetProcAddress, LoadLibrary, VirtualAlloc)" + }, + { + "name": "networkdevice:syslog", + "channel": "aaa privilege_exec" + }, + { + "name": "macos:unifiedlog", + "channel": "None" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "APCQueueOperations" + }, + { + "name": "macos:unifiedlog", + "channel": "Invocation of SMLoginItemSetEnabled by non-system or recently installed application" + }, + { + "name": "macos:unifiedlog", + "channel": "flock|NSDistributedLock|FileHandle.*lockForWriting" + }, + { + "name": "etw:Microsoft-Windows-Directory-Services-SAM", + "channel": "api_call: Calls to DsAddSidHistory or related RPC operations" + }, + { + "name": "macos:unifiedlog", + "channel": "application logs referencing NSTimer, sleep, or launchd delays" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "High-frequency or suspicious sequence of QueryPerformanceCounter/GetTickCount API calls from a non-standard process lineage" + }, + { + "name": "auditd:SYSCALL", + "channel": "Rules capturing clock_gettime, time, gettimeofday syscalls when enabled" + }, + { + "name": "networkdevice:syslog", + "channel": "Unexpected reload, crashinfo, or boot message not tied to scheduled maintenance" + }, + { + "name": "etw:Microsoft-Windows-RPC", + "channel": "rpc_call: srvsvc.NetShareEnum / NetShareEnumAll from non-admin or unusual processes" + }, + { + "name": "NSM:Flow", + "channel": "smb_command: TreeConnectAndX to \\\\*\\IPC$ / srvsvc or Trans2/NT_CREATE for listing shares" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "name": "EDR:memory", + "channel": "API usage MFCreateDeviceSource, IAMStreamConfig, ICaptureGraphBuilder2, DirectShow filter graph creation from uncommon callers" + }, + { + "name": "auditd:SYSCALL", + "channel": "openat/read/ioctl: openat/read/ioctl on /dev/video* by uncommon user/process" + }, + { + "name": "macos:unifiedlog", + "channel": "Access decisions to kTCCServiceCamera for unexpected binaries" + }, + { + "name": "EDR:memory", + "channel": "Objective\u2011C/Swift calls to AVCaptureDevice/AVCaptureSession by non-whitelisted processes" + }, + { + "name": "auditd:SYSCALL", + "channel": "mmap, ptrace, process_vm_writev or direct memory ops" + }, + { + "name": "WinEventLog:Application", + "channel": "API call to AddMonitor invoked by non-installer process" + }, + { + "name": "etw:Microsoft-Windows-Win32k", + "channel": "SetWindowLong, SetClassLong, NtUserMessageCall, SendNotifyMessage, PostMessage" + }, + { + "name": "auditd:SYSCALL", + "channel": "unshare, mount, keyctl, setns syscalls executed by containerized processes" + }, + { + "name": "macos:unifiedlog", + "channel": "audio APIs" + }, + { + "name": "WinEventLog:Microsoft-Windows-COM/Operational", + "channel": "CLSID activation events where ProcessName=mmc.exe and CLSID not in allowed baseline" + }, + { + "name": "macos:unifiedlog", + "channel": "com.apple.securityd, com.apple.tccd" + }, + { + "name": "auditd:SYSCALL", + "channel": "send, recv, write: Abnormal interception or alteration of transmitted data" + }, + { + "name": "macos:osquery", + "channel": "CALCULATE: Integrity validation of transmitted data via hash checks" + }, + { + "name": "ETW:Token", + "channel": "token_analysis: API calls such as DuplicateTokenEx or ImpersonateLoggedOnUser" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "API Calls" + }, + { + "name": "etw:Microsoft-Windows-DotNETRuntime", + "channel": "AssemblyLoad/ModuleLoad (Loader keyword) from Microsoft-Windows-DotNETRuntime" + }, + { + "name": "EDR:memory", + "channel": "VirtualAlloc/VirtualProtect/MapViewOfFile indicators via stack/heap activity and ImageLoad" + }, + { + "name": "auditd:MMAP", + "channel": "memory region with RWX permissions allocated" + }, + { + "name": "snmp:trap", + "channel": "management queries" + }, + { + "name": "AWS:CloudTrail", + "channel": "Describe* or List* API calls" + }, + { + "name": "etw:Microsoft-Windows-Win32k", + "channel": "SendMessage, PostMessage, LVM_*" + }, + { + "name": "auditd:SYSCALL", + "channel": "sudo or pkexec invocation" + }, + { + "name": "macos:unifiedlog", + "channel": "authorization execute privilege requests" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "NtQueryInformationProcess" + }, + { + "name": "macos:unifiedlog", + "channel": "ptrace: Processes invoking ptrace with PTRACE_TRACEME flag" + }, + { + "name": "esxi:hostd", + "channel": "Remote access API calls and file uploads" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "NtUnmapViewOfSection, VirtualAllocEx, WriteProcessMemory, SetThreadContext, ResumeThread" + }, + { + "name": "linux:syslog", + "channel": "Execution of modified binaries or abnormal library load sequences" + }, + { + "name": "macos:unifiedlog", + "channel": "Calls to AuthorizationExecuteWithPrivileges() observed via Apple System Logger or security_auditing tools" + }, + { + "name": "macos:unifiedlog", + "channel": "access or unlock attempt to keychain database" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of input detection APIs (e.g., CGEventSourceKeyState)" + }, + { + "name": "auditd:SYSCALL", + "channel": "mount system call with bind or remap flags" + }, + { + "name": "AWS:CloudTrail", + "channel": "Decrypt" + }, + { + "name": "etw:Microsoft-Windows-Kernel-File", + "channel": "ZwSetEaFile or ZwQueryEaFile function calls" + }, + { + "name": "auditd:SYSCALL", + "channel": "fork/clone/daemon syscall tracing" + }, + { + "name": "fs:fsusage", + "channel": "Detached process execution with no associated parent" + }, + { + "name": "auditd:SYSCALL", + "channel": "ptrace, mmap, mprotect, open, dlopen" + }, + { + "name": "ETW:ProcThread", + "channel": "api_call: CreateProcessWithTokenW, CreateProcessAsUserW" + }, + { + "name": "EDR:memory", + "channel": "MemoryWriteToExecutable" + }, + { + "name": "ETW:Token", + "channel": "api_call: DuplicateTokenEx, ImpersonateLoggedOnUser, SetThreadToken" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "api_call: UpdateProcThreadAttribute (PROC_THREAD_ATTRIBUTE_PARENT_PROCESS) and CreateProcess* with EXTENDED_STARTUPINFO_PRESENT / StartupInfoEx" + }, + { + "name": "etw:Microsoft-Windows-Security-Auditing", + "channel": "api_call: LogonUser(A|W), LsaLogonUser, SetThreadToken, ImpersonateLoggedOnUser" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "API calls" + }, + { + "name": "auditd:SYSCALL", + "channel": "ptrace, mmap, process_vm_writev" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of dd or sed targeting /proc/*/mem" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "CreateTransaction, CreateFileTransacted, RollbackTransaction, NtCreateProcessEx, NtCreateThreadEx" + }, + { + "name": "ETW", + "channel": "Calls to GetUserDefaultUILanguage, GetSystemDefaultUILanguage, GetKeyboardLayoutList" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "WriteProcessMemory: WriteProcessMemory targeting regions containing KernelCallbackTable addresses" + }, + { + "name": "EDR:file", + "channel": "SetFileTime" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "mobile-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:36.999000+00:00\"}, \"root['description']\": {\"new_value\": \"Calls made by a process to operating system-provided Application Programming Interfaces (APIs). These calls are essential for interacting with system resources such as memory, files, and hardware, or for performing system-level tasks. Monitoring these calls can provide insight into a process's intent, especially if the process is malicious.\", \"old_value\": \"Calls made by a process to operating system-provided Application Programming Interfaces (APIs). These calls are essential for interacting with system resources such as memory, files, and hardware, or for performing system-level tasks. Monitoring these calls can provide insight into a process's intent, especially if the process is malicious.\\n\\n*Data Collection Measures:*\\n\\n- Endpoint Detection and Response (EDR) Tools:\\n - Leverage tools to monitor API execution behaviors at the process level.\\n - Example: Sysmon Event ID 10 captures API call traces for process access and memory allocation.\\n- Process Monitor (ProcMon):\\n - Use ProcMon to collect detailed logs of process and API activity. ProcMon can provide granular details on API usage and identify malicious behavior during analysis.\\n- Windows Event Logs:\\n - Use Event IDs from Windows logs for specific API-related activities:\\n - Event ID 4688: A new process has been created (can indirectly infer API use).\\n - Event ID 4657: A registry value has been modified (to monitor registry-altering APIs).\\n- Dynamic Analysis Tools:\\n - Tools like Cuckoo Sandbox, Flare VM, or Hybrid Analysis monitor API execution during malware detonation.\\n- Host-Based Logs:\\n - On Linux/macOS systems, leverage audit frameworks (e.g., `auditd`, `strace`) to capture and analyze system call usage that APIs map to.\\n- Runtime Monitors:\\n - Runtime security tools like Falco can monitor system-level calls for API execution.\\n- Debugging and Tracing:\\n - Use debugging tools like gdb (Linux) or WinDbg (Windows) for deep tracing of API executions in real time.\", \"diff\": \"--- \\n+++ \\n@@ -1,21 +1 @@\\n Calls made by a process to operating system-provided Application Programming Interfaces (APIs). These calls are essential for interacting with system resources such as memory, files, and hardware, or for performing system-level tasks. Monitoring these calls can provide insight into a process's intent, especially if the process is malicious.\\n-\\n-*Data Collection Measures:*\\n-\\n-- Endpoint Detection and Response (EDR) Tools:\\n- - Leverage tools to monitor API execution behaviors at the process level.\\n- - Example: Sysmon Event ID 10 captures API call traces for process access and memory allocation.\\n-- Process Monitor (ProcMon):\\n- - Use ProcMon to collect detailed logs of process and API activity. ProcMon can provide granular details on API usage and identify malicious behavior during analysis.\\n-- Windows Event Logs:\\n- - Use Event IDs from Windows logs for specific API-related activities:\\n- - Event ID 4688: A new process has been created (can indirectly infer API use).\\n- - Event ID 4657: A registry value has been modified (to monitor registry-altering APIs).\\n-- Dynamic Analysis Tools:\\n- - Tools like Cuckoo Sandbox, Flare VM, or Hybrid Analysis monitor API execution during malware detonation.\\n-- Host-Based Logs:\\n- - On Linux/macOS systems, leverage audit frameworks (e.g., `auditd`, `strace`) to capture and analyze system call usage that APIs map to.\\n-- Runtime Monitors:\\n- - Runtime security tools like Falco can monitor system-level calls for API execution.\\n-- Debugging and Tracing:\\n- - Use debugging tools like gdb (Linux) or WinDbg (Windows) for deep tracing of API executions in real time.\"}, \"root['x_mitre_log_sources'][19]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4656\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Calls made by a process to operating system-provided Applicat1Calls made by a process to operating system-provided Applica
>tion Programming Interfaces (APIs). These calls are essentia>tion Programming Interfaces (APIs). These calls are essentia
>l for interacting with system resources such as memory, file>l for interacting with system resources such as memory, file
>s, and hardware, or for performing system-level tasks. Monit>s, and hardware, or for performing system-level tasks. Monit
>oring these calls can provide insight into a process's inten>oring these calls can provide insight into a process's inten
>t, especially if the process is malicious.  *Data Collection>t, especially if the process is malicious.
> Measures:*  - Endpoint Detection and Response (EDR) Tools:  
>    - Leverage tools to monitor API execution behaviors at t 
>he process level.     - Example: Sysmon Event ID 10 captures 
> API call traces for process access and memory allocation. - 
> Process Monitor (ProcMon):     - Use ProcMon to collect det 
>ailed logs of process and API activity. ProcMon can provide  
>granular details on API usage and identify malicious behavio 
>r during analysis. - Windows Event Logs:     - Use Event IDs 
> from Windows logs for specific API-related activities:      
>    - Event ID 4688: A new process has been created (can ind 
>irectly infer API use).         - Event ID 4657: A registry  
>value has been modified (to monitor registry-altering APIs). 
> - Dynamic Analysis Tools:     - Tools like Cuckoo Sandbox,  
>Flare VM, or Hybrid Analysis monitor API execution during ma 
>lware detonation. - Host-Based Logs:     - On Linux/macOS sy 
>stems, leverage audit frameworks (e.g., `auditd`, `strace`)  
>to capture and analyze system call usage that APIs map to. - 
> Runtime Monitors:     - Runtime security tools like Falco c 
>an monitor system-level calls for API execution. - Debugging 
> and Tracing:     - Use debugging tools like gdb (Linux) or  
>WinDbg (Windows) for deep tracing of API executions in real  
>time. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.272000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0035", + "external_id": "DC0035" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Process Access", + "description": "Refers to an event where one process attempts to open another process, typically to inspect or manipulate its memory, access handles, or modify execution flow. Monitoring these access attempts can provide valuable insight into both benign and malicious behaviors, such as debugging, inter-process communication (IPC), or process injection.\n\n*Data Collection Measures:*\n\n- Endpoint Detection and Response (EDR) Tools:\n - EDR solutions that provide telemetry on inter-process access and memory manipulation.\n- Sysmon (Windows):\n - Event ID 10: Captures process access attempts, including:\n - Source process (initiator)\n - Target process (victim)\n - Access rights requested\n - Process ID correlation\n- Windows Event Logs:\n - Event ID 4656 (Audit Handle to an Object): Logs access attempts to system objects.\n - Event ID 4690 (Attempted Process Modification): Can help identify unauthorized process changes.\n- Linux/macOS Monitoring:\n - AuditD: Monitors process access through syscall tracing (e.g., `ptrace`, `open`, `read`, `write`).\n - eBPF/XDP: Used for low-level monitoring of kernel process access.\n - OSQuery: Query process access behavior via structured SQL-like logging.\n- Procmon (Process Monitor) and Debugging Tools:\n - Windows Procmon: Captures real-time process interactions.\n - Linux strace / ptrace: Useful for tracking process behavior at the system call level.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "WinEventLog:Sysmon", + "channel": "EventCode=10" + }, + { + "name": "linux:osquery", + "channel": "Process State" + }, + { + "name": "auditd:SYSCALL", + "channel": "ptrace attach" + }, + { + "name": "macos:unifiedlog", + "channel": "ptrace or task_for_pid" + }, + { + "name": "macos:osquery", + "channel": "process_open" + }, + { + "name": "auditd:SYSCALL", + "channel": "High frequency of accept(), read(), or SSL_read() syscalls tied to nginx/apache processes" + }, + { + "name": "Apple TCC Logs", + "channel": "Microphone Access Events" + }, + { + "name": "auditd:SYSCALL", + "channel": "ptrace" + }, + { + "name": "linux:syslog", + "channel": "syscalls (open, read, ioctl) on /dev/input or /proc/*/fd/*" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "EventCode=25" + }, + { + "name": "macos:endpointsecurity", + "channel": "ES_EVENT_TYPE_NOTIFY_OPEN" + }, + { + "name": "macos:unifiedlog", + "channel": "Unexpected NSXPCConnection calls by non-Apple-signed or abnormal binaries" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "name": "macos:unifiedlog", + "channel": "Unusual Mach port registration or access attempts between unrelated processes" + }, + { + "name": "macos:unifiedlog", + "channel": "subsystem=com.apple.security, library=libsystem_kernel.dylib" + }, + { + "name": "auditd:SYSCALL", + "channel": "ptrace syscall or access to /proc/*/mem" + }, + { + "name": "macos:unifiedlog", + "channel": "vm_read, task_for_pid, or file open to cookie databases" + }, + { + "name": "linux:osquery", + "channel": "process_events" + }, + { + "name": "auditd:SYSCALL", + "channel": "ACCESS" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve, fork, mmap, ptrace" + }, + { + "name": "auditd:SYSCALL", + "channel": "ptrace or process_vm_readv" + }, + { + "name": "macos:osquery", + "channel": "unexpected memory inspection" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:35.539000+00:00\"}, \"root['x_mitre_log_sources'][13]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4656\", \"new_path\": \"root['x_mitre_log_sources'][12]['channel']\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][8]\": {\"name\": \"WinEventLog:Sysmon\", \"channel\": \"EventCode=10, 7\"}}}", + "previous_version": "2.0" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.272000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0032", + "external_id": "DC0032" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Process Creation", + "description": "Refers to the event in which a new process (executable) is initialized by an operating system. This can involve parent-child process relationships, process arguments, and environmental variables. Monitoring process creation is crucial for detecting malicious behaviors, such as execution of unauthorized binaries, scripting abuse, or privilege escalation attempts.. ", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Process", + "channel": "None" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream 'eventMessage contains pubsub or broker'" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "name": "linux:osquery", + "channel": "Execution of binary resolved from $PATH not located in /usr/bin or /bin" + }, + { + "name": "macos:unifiedlog", + "channel": "Process execution path inconsistent with baseline PATH directories" + }, + { + "name": "macos:endpointsecurity", + "channel": "ES_EVENT_TYPE_NOTIFY_EXEC" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "name": "linux:osquery", + "channel": "process_events" + }, + { + "name": "macos:endpointsecurity", + "channel": "exec" + }, + { + "name": "macos:osquery", + "channel": "processes" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of launchctl with suspicious arguments" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve network tools" + }, + { + "name": "macos:osquery", + "channel": "process_events" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve calls to soffice.bin with suspicious macro execution flags" + }, + { + "name": "macos:unifiedlog", + "channel": "Process execution of Microsoft Word, Excel, PowerPoint with macro execution attempts" + }, + { + "name": "macos:osquery", + "channel": "process reading browser configuration paths" + }, + { + "name": "macos:unifiedlog", + "channel": "exec logs" + }, + { + "name": "auditd:EXECVE", + "channel": "execve: Processes launched with LD_PRELOAD/LD_LIBRARY_PATH pointing to non-system dirs" + }, + { + "name": "macos:endpointsecurity", + "channel": "exec: Process execution context for loaders calling dlopen/dlsym" + }, + { + "name": "auditd:EXECVE", + "channel": "EXECVE" + }, + { + "name": "auditd:EXECVE", + "channel": "execution of unexpected binaries during user shell startup" + }, + { + "name": "macos:unifiedlog", + "channel": "launch of Terminal.app or shell with non-standard environment setup" + }, + { + "name": "macos:endpointsecurity", + "channel": "ES_EVENT_TYPE_NOTIFY_EXEC with unusual parent-child process relationships from zsh" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of systemctl or service stop" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of launchctl or pkill" + }, + { + "name": "macos:unifiedlog", + "channel": "process::exec" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of klist, kinit, or tools interacting with ccache outside normal user context" + }, + { + "name": "macos:osquery", + "channel": "Execution of non-standard binaries accessing Kerberos APIs" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Electron-based binary spawning shell or script interpreter" + }, + { + "name": "macos:unifiedlog", + "channel": "Electron app spawning unexpected child process" + }, + { + "name": "esxi:shell", + "channel": "/root/.ash_history or /etc/init.d/*" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve calls with high-frequency or known bandwidth-intensive tools" + }, + { + "name": "macos:unifiedlog", + "channel": "exec or spawn calls to proxy tools or torrent clients" + }, + { + "name": "containers:osquery", + "channel": "bandwidth-intensive command execution from within a container namespace" + }, + { + "name": "macos:unifiedlog", + "channel": "process launch" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream --info --predicate 'subsystem == \"com.apple.cfprefsd\"'" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of security, sqlite3, or unauthorized binaries" + }, + { + "name": "macos:unifiedlog", + "channel": "Unexpected applications generating outbound DNS queries" + }, + { + "name": "linux:Sysmon", + "channel": "EventCode=1" + }, + { + "name": "macos:osquery", + "channel": "execve" + }, + { + "name": "macos:unifiedlog", + "channel": "Unexpected child process of Safari or Chrome" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve or syscall invoking vm artifact check commands (e.g., dmidecode, lspci, dmesg)" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of system_profiler, ioreg, kextstat with argument patterns related to VM/sandbox checks" + }, + { + "name": "macos:unifiedlog", + "channel": "process writes or modifies files in excluded paths" + }, + { + "name": "macos:unifiedlog", + "channel": "process" + }, + { + "name": "macos:unifiedlog", + "channel": "com.apple.mail.* exec.*" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of memory inspection tools (lldb, gdb, osqueryi)" + }, + { + "name": "esxi:vobd", + "channel": "/var/log/vobd.log" + }, + { + "name": "kubernetes:apiserver", + "channel": "kubectl exec or kubelet API calls targeting running pods" + }, + { + "name": "docker:audit", + "channel": "Process execution events within container namespace context" + }, + { + "name": "auditd:SYSCALL", + "channel": "process persists beyond parent shell termination" + }, + { + "name": "macos:unifiedlog", + "channel": "background process persists beyond user logout" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of scripts or binaries sourced from mail directories (/var/mail, ~/Maildir)" + }, + { + "name": "macos:unifiedlog", + "channel": "Preview.app, Safari.app, or Mail.app spawning new processes outside normal patterns" + }, + { + "name": "esxi:hostd", + "channel": "process execution across cloud VM" + }, + { + "name": "auditd:EXECVE", + "channel": "systemctl spawning managed processes" + }, + { + "name": "macos:unifiedlog", + "channel": "None" + }, + { + "name": "esxi:shell", + "channel": "/var/log/shell.log" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of processes linked to hijacked sessions (e.g., anomalous parent-child process lineage)" + }, + { + "name": "macos:unifiedlog", + "channel": "exec events where web process starts a shell/tooling" + }, + { + "name": "docker:events", + "channel": "Docker/Kubernetes audit of exec/attach (kubectl exec) or unexpected child processes inside container" + }, + { + "name": "macos:unifiedlog", + "channel": "exec of osascript, bash, curl with suspicious parameters" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of container management CLIs (docker, crictl, kubectl) or interpreted shells (sh, bash, python) within container context" + }, + { + "name": "macos:endpointsecurity", + "channel": "es_event_exec" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of discovery commands targeting backup binaries, processes, or config paths" + }, + { + "name": "macos:unifiedlog", + "channel": "Process execution logs showing discovery commands like mdfind, system_profiler, or launchctl list" + }, + { + "name": "macos:osquery", + "channel": "process_events OR launchd" + }, + { + "name": "auditd:EXECVE", + "channel": "execve" + }, + { + "name": "macos:osquery", + "channel": "launchd or process_events" + }, + { + "name": "macos:unifiedlog", + "channel": "process and file events via log stream" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of scripts or binaries spawned from browser processes" + }, + { + "name": "macos:unifiedlog", + "channel": "Browser processes launching unexpected interpreters (osascript, bash)" + }, + { + "name": "macos:unifiedlog", + "channel": "exec: Execution of defaults, plutil, or common editors (vim/nano) targeting plist files" + }, + { + "name": "auditd:SYSCALL", + "channel": "EXECVE" + }, + { + "name": "macos:unifiedlog", + "channel": "process:exec" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of bash, python, or perl processes spawned by browser/email client" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of osascript, bash, or Terminal initiated from Mail.app or Safari" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of /bin/sh,/bin/bash,/usr/bin/curl,/usr/bin/python by service accounts (e.g., apache, mysql, nobody) immediately after inbound network activity." + }, + { + "name": "macos:osquery", + "channel": "parent_name in ('sshd','httpd','screensharingd') spawning shells or scripting runtimes." + }, + { + "name": "macos:unifiedlog", + "channel": "process activity stream" + }, + { + "name": "auditd:SYSCALL", + "channel": "SYSCALL record where exe contains passwd/userdel/chage and auid != root" + }, + { + "name": "macos:unifiedlog", + "channel": "Post-login execution of unrecognized child process from launchd or loginwindow" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of base64|openssl|xxd|python|perl with arguments matching Base64 flags" + }, + { + "name": "macos:unifiedlog", + "channel": "process command line contains base64, -enc, openssl enc -base64" + }, + { + "name": "macos:endpointsecurity", + "channel": "exec: arguments contain Base64-like strings" + }, + { + "name": "esxi:shell", + "channel": "commands containing base64, openssl enc -base64, xxd -p" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of process launched via loginwindow session restore" + }, + { + "name": "macos:unifiedlog", + "channel": "process: exec + filewrite: ~/.ssh/authorized_keys" + }, + { + "name": "containerd:runtime", + "channel": "/var/log/containers/*.log" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of Java apps or other processes with hidden window attributes" + }, + { + "name": "macos:unifiedlog", + "channel": "Process Execution" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve on code or jetbrains-gateway with remote flags" + }, + { + "name": "macos:unifiedlog", + "channel": "process: code or jetbrains-gateway launching with --tunnel or --remote" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream --predicate 'processImagePath CONTAINS \"curl\" OR \"osascript\"'" + }, + { + "name": "auditd:EXECVE", + "channel": "Execution of dd, shred, wipe targeting block devices" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of sleep or ping command within script interpreted by bash/python" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve or socket/connect system calls from processes using crypto libraries" + }, + { + "name": "macos:unifiedlog", + "channel": "Process using AES/RC4 routines unexpectedly" + }, + { + "name": "linux:osquery", + "channel": "execution of known firewall binaries" + }, + { + "name": "auditd:SYSCALL", + "channel": "type=EXECVE or SYSCALL for /bin/date, /usr/bin/timedatectl, /sbin/hwclock, /bin/cat /etc/timezone, /bin/cat /proc/uptime" + }, + { + "name": "linux:osquery", + "channel": "execve: command like 'date', 'timedatectl', 'hwclock', 'cat /etc/timezone'" + }, + { + "name": "macos:unifiedlog", + "channel": "process exec events of systemsetup, date, ioreg with command_line parameters indicating time discovery" + }, + { + "name": "macos:endpointsecurity", + "channel": "exec: binary == \"/usr/sbin/systemsetup\" and args contains \"-gettimezone\"" + }, + { + "name": "macos:osquery", + "channel": "execve: command LIKE '%systemsetup -gettimezone%' OR '%date%'" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of osascript, curl, or unexpected automation" + }, + { + "name": "macos:unifiedlog", + "channel": "exec /usr/bin/pwpolicy" + }, + { + "name": "auditd:SYSCALL", + "channel": "socket(AF_PACKET|AF_INET, SOCK_RAW, *), setsockopt(\u2026 SO_ATTACH_FILTER|SO_ATTACH_BPF \u2026), bpf(cmd=BPF_PROG_LOAD), open/openat path=\"/dev/bpf*\" (BSD/macOS-like) or setcap cap_net_raw." + }, + { + "name": "linux:syslog", + "channel": "KERN messages about eBPF program load/verify or LSM denials related to bpf." + }, + { + "name": "OpenBSM:AuditTrail", + "channel": "open/openat of /dev/bpf*; ioctl BIOCSETF-like operations." + }, + { + "name": "macos:unifiedlog", + "channel": "Exec of tcpdump, rvictl, custom tools linked to libpcap.A.dylib; sysextd/systemextensionsctl events for NetworkExtension content filters." + }, + { + "name": "auditd:EXECVE", + "channel": "/usr/sbin/postfix, /usr/sbin/exim, /usr/sbin/sendmail" + }, + { + "name": "auditd:SYSCALL", + "channel": "execution of known flash tools (e.g., flashrom, fwupd)" + }, + { + "name": "macos:unifiedlog", + "channel": "com.apple.firmwareupdater activity or update-firmware binary invoked" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of system tools like dmidecode, lspci, lscpu, dmesg, systemd-detect-virt" + }, + { + "name": "macos:unifiedlog", + "channel": "exec or spawn of 'system_profiler', 'ioreg', 'kextstat', 'sysctl', or calls to sysctl API" + }, + { + "name": "macos:endpointSecurity", + "channel": "ES_EVENT_TYPE_NOTIFY_EXEC" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Suspicious binaries or scripts interacting with authentication binaries (sshd, gdm, login)" + }, + { + "name": "macos:osquery", + "channel": "execve: Processes unexpectedly invoking Keychain or authentication APIs" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: execve calls where a browser/webview process is parent and child is interpreter (python, sh, ruby) or downloader (curl, wget)" + }, + { + "name": "macos:unifiedlog", + "channel": "process_create: Process creation where parent is Safari/Google Chrome and child is script interpreter or signed-but-unusual helper binary" + }, + { + "name": "auditd:EXECVE", + "channel": "None" + }, + { + "name": "macos:unifiedlog", + "channel": "process:launch" + }, + { + "name": "auditd:EXECVE", + "channel": "Shell commands invoked by SQL process such as postgres, mysqld, or mariadbd" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of smbclient, smbmap, rpcclient, nmblookup, crackmapexec smb" + }, + { + "name": "macos:endpointsecurity", + "channel": "ES_EVENT_TYPE_NOTIFY_EXEC: Process execution of \"sharing -l\", \"smbutil view\", \"mount_smbfs\"" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of scp, rsync, curl with remote destination" + }, + { + "name": "macos:unifiedlog", + "channel": "logMessage contains pbpaste or osascript" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve call with argv matching known disk enumeration commands (lsblk, parted, fdisk)" + }, + { + "name": "macos:unifiedlog", + "channel": "process launch of diskutil or system_profiler with SPStorageDataType" + }, + { + "name": "esxi:hostd", + "channel": "execution of esxcli with args matching 'storage', 'filesystem', 'core device list'" + }, + { + "name": "macos:unifiedlog", + "channel": "Mail.app executing with parameters updating rules state" + }, + { + "name": "esxi:shell", + "channel": "/var/log/vmkernel.log, /var/log/vmkwarning.log" + }, + { + "name": "macos:endpointsecurity", + "channel": "exec: Exec of ffmpeg, avfoundation-based binaries, or custom signed apps accessing camera" + }, + { + "name": "kubernetes:apiserver", + "channel": "exec into pod followed by secret retrieval via API" + }, + { + "name": "macos:unifiedlog", + "channel": "process_name IN (\"VBoxManage\", \"prlctl\") AND command CONTAINS (\"list\", \"show\")" + }, + { + "name": "macos:unifiedlog", + "channel": "exec srm|exec openssl|exec gpg" + }, + { + "name": "linux:osquery", + "channel": "Process execution with LD_PRELOAD or modified library path" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of process with DYLD_INSERT_LIBRARIES set" + }, + { + "name": "linux:Sysmon", + "channel": "process creation events linked to container namespaces executing host-level binaries" + }, + { + "name": "macos:unifiedlog", + "channel": "process and signing chain events" + }, + { + "name": "macos:unifiedlog", + "channel": "launchservices events for misleading extensions" + }, + { + "name": "fs:fsusage", + "channel": "Execution of disguised binaries" + }, + { + "name": "linux:osquery", + "channel": "process listening or connecting on non-standard ports" + }, + { + "name": "macos:unifiedlog", + "channel": "launchd services binding to non-standard ports" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve, connect" + }, + { + "name": "esxi:cron", + "channel": "process or cron activity" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of binaries with unsigned or anomalously signed certificates" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve logging for /usr/bin/systemctl and systemd-run" + }, + { + "name": "macos:osquery", + "channel": "Invocation of osascript or dylib injection" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of files saved in mail or download directories" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of Terminal, osascript, or other interpreters originating from Mail or Preview" + }, + { + "name": "macos:unifiedlog", + "channel": "process events" + }, + { + "name": "linux:syslog", + "channel": "Unauthorized sudo or shell access, especially leading to file changes in /var/www or /srv/http" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of unexpected terminal or web scripts modifying /Library/WebServer/Documents" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of CLI tools like psql, mysql, mongo, sqlite3" + }, + { + "name": "macos:unifiedlog", + "channel": "Process start of Java or native DB client tools" + }, + { + "name": "macos:unifiedlog", + "channel": "loginwindow or tccd-related entries" + }, + { + "name": "macos:osquery", + "channel": "query: process_events, launchd, and tcc.db access" + }, + { + "name": "ebpf:syscalls", + "channel": "process execution or network connect from just-created container PID namespace" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of pip, npm, gem, or similar package managers" + }, + { + "name": "macos:unifiedlog", + "channel": "Command line invocation of pip3, brew install, npm install from interactive Terminal" + }, + { + "name": "auditd:SYSCALL", + "channel": "fork/exec of service via PID 1 (systemd)" + }, + { + "name": "auditd:EXECVE", + "channel": "Execution of ssh/scp/sftp without corresponding authentication log" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of ssh or sftp without corresponding login event" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: execve where exe=/usr/bin/python3 or similar interpreter" + }, + { + "name": "macos:unifiedlog", + "channel": "launch of remote desktop app or helper binary" + }, + { + "name": "macos:unifiedlog", + "channel": "Unexpected processes making network calls based on DNS-derived ports" + }, + { + "name": "macos:unifiedlog", + "channel": "launchctl spawning new processes" + }, + { + "name": "macos:unifiedlog", + "channel": "launchctl activity and process creation" + }, + { + "name": "containerd:events", + "channel": "New container with suspicious image name or high resource usage" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of Python, Swift, or other binaries invoking archiving libraries" + }, + { + "name": "linux:osquery", + "channel": "Processes linked with libssl or crypto libraries making outbound connections" + }, + { + "name": "macos:unifiedlog", + "channel": "Process invoking SSL routines from Security framework" + }, + { + "name": "auditd:SYSCALL", + "channel": "Execution of binaries located in /etc/init.d/ or systemd service paths" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of binary listed in newly modified LaunchAgent plist" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of bless or nvram modifying boot parameters" + }, + { + "name": "macos:unifiedlog", + "channel": "Unexpected processes registered with launchd" + }, + { + "name": "macos:unifiedlog", + "channel": "Process launch" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of curl, osascript, or unexpected Office processes" + }, + { + "name": "macos:osquery", + "channel": "exec" + }, + { + "name": "macos:unifiedlog", + "channel": "Trust validation failures or bypass attempts during notarization and code signing checks" + }, + { + "name": "esxi:vmkernel", + "channel": "spawned shell or execution environment activity" + }, + { + "name": "macos:unifiedlog", + "channel": "process_exec: image in {/bin/bash,/bin/zsh,/usr/bin/osascript,/usr/bin/python*,/usr/bin/curl,/usr/bin/ssh,/usr/bin/open} AND parent in {Preview, TextEdit, Microsoft Word, Microsoft Excel, AdobeReader, Archive Utility, Finder}" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: exe in {/bin/bash,/bin/sh,/usr/bin/python*,/usr/bin/perl,/usr/bin/php,/usr/bin/node,/usr/bin/curl,/usr/bin/wget,/usr/bin/xdg-open,/usr/bin/ssh,/usr/bin/rundll32 (wine)} AND ppid process is a document viewer/browser" + }, + { + "name": "auditd:EXECVE", + "channel": "Execution of dd/sgdisk with arguments writing to sector 0 or partition table" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of zip, ditto, hdiutil, or openssl by processes not normally associated with archiving" + }, + { + "name": "macos:unifiedlog", + "channel": "process execution events for chmod, chown, chflags with unusual parameters or targets" + }, + { + "name": "m365:defender", + "channel": "AdvancedHunting(DeviceEvents, ProcessCreate, ImageLoad, AMSI/ETW derived signals)" + }, + { + "name": "macos:unifiedlog", + "channel": "execve or dylib load from memory without backing file" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Commands that alter firewall or start listeners: iptables|nft|ufw|firewall-cmd|pfctl|systemctl start sshd/telnet/dropbear; raw-socket/libpcap tools (tcpdump, tshark, nmap --raw)." + }, + { + "name": "macos:unifiedlog", + "channel": "exec: Execution of pfctl, socketfilterfw, launchctl start ssh/telnet, libpcap consumers." + }, + { + "name": "esxi:shell", + "channel": "Shell Execution" + }, + { + "name": "macos:unifiedlog", + "channel": "Unusual child process tree indicating attempted recovery after crash" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of binaries/scripts presenting false health messages for security daemons" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of processes mimicking Apple Security & Privacy GUIs" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve, setifflags" + }, + { + "name": "macos:osquery", + "channel": "process_events where path like '%tcpdump%'" + }, + { + "name": "auditd:EXECVE", + "channel": "Execution of dd, shred, or wipe with arguments targeting block devices" + }, + { + "name": "auditd:EXECVE", + "channel": "systemctl stop auditd, kill -9 , or modifications to /etc/selinux/config" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of curl, git, or Office processes with network connections" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream - process subsystem" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve calls for qemu-system*, kvm, or VBoxHeadless" + }, + { + "name": "macos:unifiedlog", + "channel": "Process execution for VBoxHeadless, prl_vm_app, vmware-vmx" + }, + { + "name": "macos:unifiedlog", + "channel": "process logs" + }, + { + "name": "esxi:shell", + "channel": "None" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of interpreters (python, perl), custom binaries, or shell utilities with long arguments containing non-standard tokens" + }, + { + "name": "macos:endpointsecurity", + "channel": "ES_EVENT_TYPE_NOTIFY_EXEC: arguments contain long, non-standard tokens / custom alphabets" + }, + { + "name": "macos:unifiedlog", + "channel": "command line or log output shows non-standard encoding routines" + }, + { + "name": "esxi:shell", + "channel": "commands containing long non-standard tokens or custom lookup tables" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of /usr/sbin/installer spawning child process from within /private/tmp or package contents" + }, + { + "name": "auditd:SYSCALL", + "channel": "Execution of dpkg or rpm followed by fork/execve from within postinst, prerm, etc." + }, + { + "name": "macos:unifiedlog", + "channel": "execve: Helper tools invoked through XPC executing unexpected binaries" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of modified binary without valid signature" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: exe in (/usr/bin/bash,/usr/bin/sh,/usr/bin/zsh,/usr/bin/python*) AND cmdline matches '(curl|wget).*(\\||\\|\\s*sh|bash)|base64\\s*-d|python\\s*-c'" + }, + { + "name": "macos:unifiedlog", + "channel": "exec: ParentImage in (Terminal, iTerm2) AND Image in (/bin/zsh,/bin/bash,/usr/bin/python*) AND CommandLine matches '(curl|wget).*(\\||\\|\\s*sh|bash)|base64 -D|python -c'" + }, + { + "name": "macos:unifiedlog", + "channel": "process created with repeated ICMP or UDP flood behavior" + }, + { + "name": "fs:fsusage", + "channel": "binary execution of security_authtrampoline" + }, + { + "name": "macos:unifiedlog", + "channel": "process: exec" + }, + { + "name": "esxi:vmkernel", + "channel": "Exec" + }, + { + "name": "macos:unifiedlog", + "channel": "Child processes of Safari, Chrome, or Firefox executing scripting interpreters" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of older or non-standard interpreters" + }, + { + "name": "linux:osquery", + "channel": "process execution events for permission modification utilities with command-line analysis" + }, + { + "name": "macos:unifiedlog", + "channel": "process execution events for chmod, chown, chflags with parameter analysis and target path examination" + }, + { + "name": "macos:osquery", + "channel": "process execution monitoring for permission modification utilities with command-line argument analysis" + }, + { + "name": "auditd:SYSCALL", + "channel": "Invocation of packet generation tools (e.g., hping3, nping) or fork bombs" + }, + { + "name": "macos:osquery", + "channel": "Execution of flooding tools or compiled packet generators" + }, + { + "name": "esxi:hostd", + "channel": "process" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve for proxy tools" + }, + { + "name": "macos:unifiedlog", + "channel": "process, socket, and DNS logs" + }, + { + "name": "macos:osquery", + "channel": "process_events table" + }, + { + "name": "macos:unifiedlog", + "channel": "Command line containing `trap` or `echo 'trap` written to login shell files" + }, + { + "name": "macos:unifiedlog", + "channel": "log collect --predicate" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve or nanosleep with no stdout/stderr I/O" + }, + { + "name": "macos:unifiedlog", + "channel": "launchd or osascript spawns process with delay command" + }, + { + "name": "linux:syslog", + "channel": "systemd-udevd spawning user-defined action from RUN+=" + }, + { + "name": "ebpf:syscalls", + "channel": "execve" + }, + { + "name": "macos:unifiedlog", + "channel": "process:spawn" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream --predicate 'eventMessage contains \"exec\"'" + }, + { + "name": "auditd:EXECVE", + "channel": "cat|less|grep accessing .bash_history from a non-shell process" + }, + { + "name": "auditd:EXECVE", + "channel": "Process execution via .desktop Exec path from /etc/xdg/autostart or ~/.config/autostart" + }, + { + "name": "auditd:SYSCALL", + "channel": "Execution of dpkg, rpm, or other package manager with list flag" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of system_profiler or osascript invoking enumeration" + }, + { + "name": "auditd:SYSCALL", + "channel": "apache2 or nginx spawning sh, bash, or python interpreter" + }, + { + "name": "macos:unifiedlog", + "channel": "httpd spawning bash, zsh, python, or osascript" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of /usr/libexec/security_authtrampoline or child processes originating from non-trusted binaries triggering credential prompts" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of security or osascript" + }, + { + "name": "macos:unifiedlog", + "channel": "launchd spawning processes tied to new or modified LaunchDaemon .plist entries" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of ping, nping, or crafted network packets via bash or python to reflection services" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of commands modifying iptables/nftables to block selective IPs" + }, + { + "name": "macos:unifiedlog", + "channel": "System process modifications altering DNS/proxy settings" + }, + { + "name": "containerd:Events", + "channel": "unusual process spawned from container image context" + }, + { + "name": "macos:osquery", + "channel": "curl, python scripts, rsync with internal share URLs" + }, + { + "name": "macos:unifiedlog", + "channel": "process: spawn, exec" + }, + { + "name": "macos:osquery", + "channel": "Rapid spawning of resource-heavy applications (e.g., Preview, Safari, Office)" + }, + { + "name": "macos:unifiedlog", + "channel": "Process creation events where command line = pmset with arguments affecting sleep, hibernatemode, displaysleep" + }, + { + "name": "macos:unifiedlog", + "channel": "Unexpected apps performing repeated DNS lookups" + }, + { + "name": "macos:unifiedlog", + "channel": "launchservices or loginwindow events" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve with LD_PRELOAD or linker-related environment variables set" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of process with DYLD_INSERT_LIBRARIES set" + }, + { + "name": "macos:unifiedlog", + "channel": "Suspicious Swift/Objective-C or scripting processes writing archive-like outputs" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of re-parented process" + }, + { + "name": "linux:osquery", + "channel": "Anomalous parent PID change" + }, + { + "name": "macos:unifiedlog", + "channel": "Process creation with parent PID of 1 (launchd)" + }, + { + "name": "linux:osquery", + "channel": "child process invoking dynamic linker post-ptrace" + }, + { + "name": "macos:osquery", + "channel": "Processes executing kextload, spctl, or modifying kernel extension directories" + }, + { + "name": "macos:osquery", + "channel": "Unsigned or ad-hoc signed process executions in user contexts" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of diskutil or hdiutil attaching hidden partitions" + }, + { + "name": "macos:unifiedlog", + "channel": "process execution events for discovery utilities (system_profiler, sw_vers, dscl, networksetup) with command-line parameter analysis" + }, + { + "name": "macos:osquery", + "channel": "process event monitoring with focus on discovery utilities and cryptographic framework usage correlation" + }, + { + "name": "macos:unifiedlog", + "channel": "Unexpected apps generating frequent DNS queries" + }, + { + "name": "macos:unifiedlog", + "channel": "process exec" + }, + { + "name": "auditd:SYSCALL", + "channel": "socket: Suspicious creation of AF_UNIX sockets outside expected daemons" + }, + { + "name": "macos:unifiedlog", + "channel": "Non-standard processes invoking financial applications or payment APIs" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Agent/headless flags (listen/connect/reverse/tunnel) or remote-control binaries spawning shells" + }, + { + "name": "auditd:SYSCALL", + "channel": "systemctl enable/start: Creation/enablement of custom .service units in /etc/systemd/system" + }, + { + "name": "macos:unifiedlog", + "channel": "Process exec of remote-control apps or binaries with headless/connect flags" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: systemctl stop, service stop, or kill -9 on security daemons (e.g., falcon-sensor, auditd)" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of launchctl unload, kill, or removal of security agent daemons" + }, + { + "name": "macos:unifiedlog", + "channel": "process activity, exec events" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream process subsystem" + }, + { + "name": "macos:unifiedlog", + "channel": "process:exec and kext load events" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream --info --predicate 'eventMessage CONTAINS \"exec\"'" + }, + { + "name": "WinEventLog:Microsoft-Windows-DotNETRuntime", + "channel": "Unexpected AppDomain creation events or anomalous AppDomainManager assembly load behavior" + }, + { + "name": "auditd:SYSCALL", + "channel": "Execution of network stress tools or anomalies in socket/syscall behavior" + }, + { + "name": "macos:unifiedlog", + "channel": "Unsigned binary execution following SIP change" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Commands altering firewall or enabling listeners (iptables, nft, ufw, firewall-cmd, systemctl start *ssh*/*telnet*, ip route add, tcpdump, tshark)" + }, + { + "name": "macos:unifiedlog", + "channel": "exec: Execution of /sbin/pfctl, /usr/libexec/ApplicationFirewall/socketfilterfw, ifconfig, tcpdump, npcap/libpcap consumers" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of zip, ditto, hdiutil, or openssl by non-terminal parent processes" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of binaries with TCC protected access under unexpected parent processes such as Finder.app, SystemUIServer, or nsurlsessiond" + }, + { + "name": "WinEventLog:AppLocker", + "channel": "EventCode=8003, 8004" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve, unlink" + }, + { + "name": "macos:osquery", + "channel": "launchd, processes" + }, + { + "name": "linux:osquery", + "channel": "socat, ssh, or nc processes opening unexpected ports" + }, + { + "name": "macos:unifiedlog", + "channel": "process execution of ssh with -L/-R forwarding flags" + }, + { + "name": "macos:unifiedlog", + "channel": "launchd or cron spawning mining binaries" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve or socket/connect system calls for processes using RSA handshake" + }, + { + "name": "macos:unifiedlog", + "channel": "Process invoking SecKeyCreateRandomKey or asymmetric crypto APIs" + }, + { + "name": "azure:vmguest", + "channel": "Unexpected execution of cloud agent processes (e.g., WindowsAzureGuestAgent.exe, ssm-agent) followed by arbitrary script or binary execution" + }, + { + "name": "macos:unifiedlog", + "channel": "Script interpreter invoked by nginx/apache worker process" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of Office binaries with network activity" + }, + { + "name": "macos:unifiedlog", + "channel": "launch of bash/zsh/python/osascript targeting key file locations" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of /sbin/emond with child processes launched" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "provider: ETW CreateProcess events linking msbuild.exe to suspicious children where standard logs are incomplete" + }, + { + "name": "macos:unifiedlog", + "channel": "shutdown -h now or reboot" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of Code.app, idea, JetBrainsToolbox, eclipse with install/extension flags" + }, + { + "name": "macos:unifiedlog", + "channel": "process execution events for system discovery utilities (system_profiler, sysctl, networksetup, ioreg) with parameter analysis" + }, + { + "name": "OpenBSM:AuditTrail", + "channel": "BSM audit events for process execution and system call monitoring during reconnaissance" + }, + { + "name": "esxi:hostd", + "channel": "host daemon events related to VM operations and configuration queries during reconnaissance" + }, + { + "name": "esxi:vmkernel", + "channel": "VMware kernel events for hardware and system configuration access during environmental validation" + }, + { + "name": "linux:osquery", + "channel": "processes modifying environment variables related to history logging" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: parent process is usb/hid device handler, child process bash/python invoked" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of curl, rclone, or Office apps invoking network sessions" + }, + { + "name": "macos:unifiedlog", + "channel": "exec: Execution of kextstat, kextfind, or ioreg targeting driver information" + }, + { + "name": "macos:endpointsecurity", + "channel": "exec events" + }, + { + "name": "macos:unifiedlog", + "channel": "Process creation involving binaries interacting with resource fork data" + }, + { + "name": "macos:unifiedlog", + "channel": "process event" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of suspicious exploit binaries targeting security daemons" + }, + { + "name": "macos:osquery", + "channel": "execve: Unsigned or unnotarized processes launched with high privileges" + }, + { + "name": "macos:unifiedlog", + "channel": "security OR injection attempts into 1Password OR LastPass" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_data_source_ref": "", + "x_mitre_domains": [ + "ics-attack", + "mobile-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 19:28:39.339000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/datacomponents/DC0032\", \"old_value\": \"https://attack.mitre.org/data-components/DC0032\"}, \"root['description']\": {\"new_value\": \"Refers to the event in which a new process (executable) is initialized by an operating system. This can involve parent-child process relationships, process arguments, and environmental variables. Monitoring process creation is crucial for detecting malicious behaviors, such as execution of unauthorized binaries, scripting abuse, or privilege escalation attempts.. \", \"old_value\": \"Refers to the event in which a new process (executable) is initialized by an operating system. This can involve parent-child process relationships, process arguments, and environmental variables. Monitoring process creation is crucial for detecting malicious behaviors, such as execution of unauthorized binaries, scripting abuse, or privilege escalation attempts.\\n\\n*Data Collection Measures:*\\n\\n- Endpoint Detection and Response (EDR) Tools:\\n - EDRs provide process telemetry, tracking execution flows and arguments.\\n- Windows Event Logs:\\n - Event ID 4688 (Audit Process Creation): Captures process creation with associated parent process.\\n- Sysmon (Windows):\\n - Event ID 1 (Process Creation): Provides detailed logging\\n- Linux/macOS Monitoring:\\n - AuditD (execve syscall): Logs process creation.\\n - eBPF/XDP: Used for low-level monitoring of system calls related to process execution.\\n - OSQuery: Allows SQL-like queries to track process events (process_events table).\\n - Apple Endpoint Security Framework (ESF): Monitors process creation on macOS.\\n- Network-Based Monitoring:\\n - Zeek (Bro) Logs: Captures network-based process execution related to remote shells.\\n - Syslog/OSSEC: Tracks execution of processes on distributed systems.\\n- Behavioral SIEM Rules:\\n - Monitor process creation for uncommon binaries in user directories.\\n - Detect processes with suspicious command-line arguments. \", \"diff\": \"--- \\n+++ \\n@@ -1,21 +1 @@\\n-Refers to the event in which a new process (executable) is initialized by an operating system. This can involve parent-child process relationships, process arguments, and environmental variables. Monitoring process creation is crucial for detecting malicious behaviors, such as execution of unauthorized binaries, scripting abuse, or privilege escalation attempts.\\n-\\n-*Data Collection Measures:*\\n-\\n-- Endpoint Detection and Response (EDR) Tools:\\n- - EDRs provide process telemetry, tracking execution flows and arguments.\\n-- Windows Event Logs:\\n- - Event ID 4688 (Audit Process Creation): Captures process creation with associated parent process.\\n-- Sysmon (Windows):\\n- - Event ID 1 (Process Creation): Provides detailed logging\\n-- Linux/macOS Monitoring:\\n- - AuditD (execve syscall): Logs process creation.\\n- - eBPF/XDP: Used for low-level monitoring of system calls related to process execution.\\n- - OSQuery: Allows SQL-like queries to track process events (process_events table).\\n- - Apple Endpoint Security Framework (ESF): Monitors process creation on macOS.\\n-- Network-Based Monitoring:\\n- - Zeek (Bro) Logs: Captures network-based process execution related to remote shells.\\n- - Syslog/OSSEC: Tracks execution of processes on distributed systems.\\n-- Behavioral SIEM Rules:\\n- - Monitor process creation for uncommon binaries in user directories.\\n- - Detect processes with suspicious command-line arguments. \\n+Refers to the event in which a new process (executable) is initialized by an operating system. This can involve parent-child process relationships, process arguments, and environmental variables. Monitoring process creation is crucial for detecting malicious behaviors, such as execution of unauthorized binaries, scripting abuse, or privilege escalation attempts.. \"}, \"root['x_mitre_log_sources'][293]['channel']\": {\"new_value\": \"EventCode=8003, 8004\", \"old_value\": \"EventCode=8003,8004\", \"new_path\": \"root['x_mitre_log_sources'][290]['channel']\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][140]\": {\"name\": \"WinEventlog:Security\", \"channel\": \"EventCode=4688\"}, \"root['x_mitre_log_sources'][197]\": {\"name\": \"WinEventLog:Microsoft-Windows-Security-Auditing\", \"channel\": \"EventCode=4688\"}, \"root['x_mitre_log_sources'][249]\": {\"name\": \"WinEventLog:security\", \"channel\": \"EventCode=4688\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Refers to the event in which a new process (executable) is it1Refers to the event in which a new process (executable) is i
>nitialized by an operating system. This can involve parent-c>nitialized by an operating system. This can involve parent-c
>hild process relationships, process arguments, and environme>hild process relationships, process arguments, and environme
>ntal variables. Monitoring process creation is crucial for d>ntal variables. Monitoring process creation is crucial for d
>etecting malicious behaviors, such as execution of unauthori>etecting malicious behaviors, such as execution of unauthori
>zed binaries, scripting abuse, or privilege escalation attem>zed binaries, scripting abuse, or privilege escalation attem
>pts.  *Data Collection Measures:*  - Endpoint Detection and >pts.. 
>Response (EDR) Tools:     - EDRs provide process telemetry,  
>tracking execution flows and arguments. - Windows Event Logs 
>:     - Event ID 4688 (Audit Process Creation): Captures pro 
>cess creation with associated parent process. - Sysmon (Wind 
>ows):     - Event ID 1 (Process Creation): Provides detailed 
> logging - Linux/macOS Monitoring:     - AuditD (execve sysc 
>all): Logs process creation.     - eBPF/XDP: Used for low-le 
>vel monitoring of system calls related to process execution. 
>     - OSQuery: Allows SQL-like queries to track process eve 
>nts (process_events table).     - Apple Endpoint Security Fr 
>amework (ESF): Monitors process creation on macOS. - Network 
>-Based Monitoring:     - Zeek (Bro) Logs: Captures network-b 
>ased process execution related to remote shells.     - Syslo 
>g/OSSEC: Tracks execution of processes on distributed system 
>s. - Behavioral SIEM Rules:     - Monitor process creation f 
>or uncommon binaries in user directories.     - Detect proce 
>sses with suspicious command-line arguments.  
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--ee575f4a-2d4f-48f6-b18b-89067760adc1", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.272000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0034", + "external_id": "DC0034" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Process Metadata", + "description": "Contextual data about a running process, which may include information such as environment variables, image name, user/owner, etc.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Process", + "channel": "None" + }, + { + "name": "macos:unifiedlog", + "channel": "subsystem=com.apple.process" + }, + { + "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational", + "channel": "CodeIntegrity/WDAC events indicating unsigned/invalid DLL loads" + }, + { + "name": "linux:syslog", + "channel": "sudo or service accounts invoking loaders with suspicious env vars" + }, + { + "name": "macos:osquery", + "channel": "Process Context" + }, + { + "name": "esxi:auth", + "channel": "user session" + }, + { + "name": "networkdevice:syslog", + "channel": "Admin activity" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve call for sudo where euid != uid" + }, + { + "name": "macos:unifiedlog", + "channel": "subsystem=com.apple.TCC" + }, + { + "name": "macos:unifiedlog", + "channel": "exec of binary with setuid/setgid and EUID != UID" + }, + { + "name": "macos:unifiedlog", + "channel": "process" + }, + { + "name": "auditd:SYSCALL", + "channel": "Use of fork/exec with DISPLAY unset or redirected" + }, + { + "name": "EDR:Telemetry", + "channel": "Process lineage and API usage enrichment (GetSystemTime, GetTimeZoneInformation, NtQuerySystemTime)" + }, + { + "name": "esxi:hostd", + "channel": "/var/log/hostd.log API calls reading/altering time/ntp settings" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve, prctl, or ptrace activity affecting process memory or command-line arguments" + }, + { + "name": "linux:osquery", + "channel": "Cross-reference argv[0] with actual executable path and parent process metadata" + }, + { + "name": "WinEventLog:AppLocker", + "channel": "AppLocker audit/blocks showing developer utilities executing scripts/binaries outside policy" + }, + { + "name": "EDR:hunting", + "channel": "Correlation of signer info, parent-child lineage, rare invocation context (user host role), and API surfaces (CreateProcess*, LoadLibrary*)" + }, + { + "name": "WinEventLog:Microsoft-Windows-Security-Mitigations/KernelMode", + "channel": "ETW telemetry indicating ClickOnce deployment (dfsvc.exe) launching payloads" + }, + { + "name": "etw:Microsoft-Windows-ClickOnce", + "channel": "provider: Event Tracing for Windows (ETW) events associated with ClickOnce deployment (dfsvc.exe activity)" + }, + { + "name": "WinEventLog:Microsoft-Windows-Windows Camera Frame Server/Operational", + "channel": "Process session start/stop events for camera pipeline by unexpected executables" + }, + { + "name": "linux:osquery", + "channel": "select: path LIKE '/dev/video%'" + }, + { + "name": "linux:osquery", + "channel": "state=attached/debugged" + }, + { + "name": "macos:unifiedlog", + "channel": "Code Execution & Entitlement Access" + }, + { + "name": "macos:unifiedlog", + "channel": "Process opening SSH_AUTH_SOCK or /tmp/ssh-* socket not owned by same UID" + }, + { + "name": "macos:unifiedlog", + "channel": "code signature/memory protection" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve with UID \u2260 EUID" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve with escalated privileges" + }, + { + "name": "AWS:CloudTrail", + "channel": "cross-account or unexpected assume role" + }, + { + "name": "macos:unifiedlog", + "channel": "log collect from launchd and process start" + }, + { + "name": "containerd:events", + "channel": "Docker or containerd image pulls and process executions" + }, + { + "name": "linux:syslog", + "channel": "Kernel or daemon warnings of downgraded TLS or cryptographic settings" + }, + { + "name": "macos:unifiedlog", + "channel": "Modifications or writes to EFI system partition for downgraded bootloaders" + }, + { + "name": "macos:unifiedlog", + "channel": "non-shell process tree accessing bash history" + }, + { + "name": "linux:osquery", + "channel": "process metadata mismatch between /proc and runtime attributes" + }, + { + "name": "linux:osquery", + "channel": "process environment variables containing LD_PRELOAD" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "EventCode=400, 403" + }, + { + "name": "macos:osquery", + "channel": "Process Execution + Hash" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "process_start: EventHeader.ProcessId true parent vs reported PPID mismatch" + }, + { + "name": "macos:endpointsecurity", + "channel": "ES_EVENT_TYPE_NOTIFY_EXEC, ES_EVENT_TYPE_NOTIFY_MMAP" + }, + { + "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational", + "channel": "Unsigned/invalid signature modules or images loaded by msbuild.exe or its children" + }, + { + "name": "WinEventLog:Microsoft-Windows-DeviceGuard/Operational", + "channel": "WDAC policy audit/block affecting msbuild.exe spawned payloads" + }, + { + "name": "WinEventLog:Microsoft-Windows-SmartAppControl/Operational", + "channel": "Smart App Control decisions (audit/block) for msbuild.exe-launched executables" + }, + { + "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational", + "channel": "Unsigned or untrusted modules loaded during JamPlus.exe runtime" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "mobile-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:35.331000+00:00\"}, \"root['x_mitre_log_sources'][36]['channel']\": {\"new_value\": \"EventCode=400, 403\", \"old_value\": \"EventCode=400,403\"}}}", + "previous_version": "2.0" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--d5fca4e4-e47a-487b-873f-3d22f8865e96", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.272000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0020", + "external_id": "DC0020" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Process Modification", + "description": "Changes made to a running process, such as writing data into memory, modifying execution behavior, or injecting code into an existing process. Adversaries frequently modify processes to execute malicious payloads, evade detection, or gain escalated privileges.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "auditd:SYSCALL", + "channel": "rename, chmod" + }, + { + "name": "auditd:SYSCALL", + "channel": "mprotect" + }, + { + "name": "macos:endpointsecurity", + "channel": "ES_EVENT_MMAP" + }, + { + "name": "auditd:SYSCALL", + "channel": "kill syscalls targeting auditd process" + }, + { + "name": "macos:unifiedlog", + "channel": "memory mapping" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "EventCode=8" + }, + { + "name": "macos:osquery", + "channel": "Memory Mappings" + }, + { + "name": "ebpf:tracepoints", + "channel": "Runtime memory overwrite of argv[] memory region" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "Memory Modification / Unmapped module load or suspicious RWX allocations in the process space of a browser process" + }, + { + "name": "macos:unifiedlog", + "channel": "Anomalous dyld dynamic library loads or RWX memory mappings in browser process" + }, + { + "name": "auditd:SYSCALL", + "channel": "open, rename" + }, + { + "name": "auditd:SYSCALL", + "channel": "SYSCALL ptrace/mprotect" + }, + { + "name": "macos:endpointsecurity", + "channel": "ES_EVENT_TYPE_NOTIFY_MMAP" + }, + { + "name": "macos:unifiedlog", + "channel": "process, library load, memory operations" + }, + { + "name": "auditd:SYSCALL", + "channel": "rename" + }, + { + "name": "linux:osquery", + "channel": "Detection of bitwise operations or custom encryption functions in memory traces" + }, + { + "name": "macos:unifiedlog", + "channel": "Abnormal memory operations (XOR/bitwise loops) during archive generation" + }, + { + "name": "auditd:memprotect", + "channel": "change from PROT_READ|PROT_WRITE to PROT_EXEC" + }, + { + "name": "linux:procfs", + "channel": "/proc/[pid]/maps, /proc/[pid]/mem" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:35.747000+00:00\"}, \"root['description']\": {\"new_value\": \"Changes made to a running process, such as writing data into memory, modifying execution behavior, or injecting code into an existing process. Adversaries frequently modify processes to execute malicious payloads, evade detection, or gain escalated privileges.\", \"old_value\": \"Changes made to a running process, such as writing data into memory, modifying execution behavior, or injecting code into an existing process. Adversaries frequently modify processes to execute malicious payloads, evade detection, or gain escalated privileges.\\n\\n*Data Collection Measures:* \\n\\n- Endpoint Detection and Response (EDR) Tools:\\n - EDRs can monitor memory modifications and API-level calls.\\n- Sysmon (Windows):\\n - Event ID 8 (CreateRemoteThread) \\u2013 Detects cross-process thread injection, commonly used in process hollowing.\\n - Event ID 10 (Process Access) \\u2013 Detects access attempts to another process, often preceding injection attempts.\\n- Linux/macOS Monitoring:\\n - AuditD (ptrace, mmap, mprotect syscalls): Detects memory modifications and debugging attempts.\\n - eBPF/XDP: Monitors low-level system calls related to process modifications.\\n - OSQuery: The processes table can be queried for unusual modifications.\\n- Network-Based Monitoring:\\n - Zeek (Bro) Logs: Captures lateral movement attempts where adversaries remotely modify a process.\\n - Syslog/OSSEC: Monitors logs for suspicious modifications.\", \"diff\": \"--- \\n+++ \\n@@ -1,16 +1 @@\\n Changes made to a running process, such as writing data into memory, modifying execution behavior, or injecting code into an existing process. Adversaries frequently modify processes to execute malicious payloads, evade detection, or gain escalated privileges.\\n-\\n-*Data Collection Measures:* \\n-\\n-- Endpoint Detection and Response (EDR) Tools:\\n- - EDRs can monitor memory modifications and API-level calls.\\n-- Sysmon (Windows):\\n- - Event ID 8 (CreateRemoteThread) \\u2013 Detects cross-process thread injection, commonly used in process hollowing.\\n- - Event ID 10 (Process Access) \\u2013 Detects access attempts to another process, often preceding injection attempts.\\n-- Linux/macOS Monitoring:\\n- - AuditD (ptrace, mmap, mprotect syscalls): Detects memory modifications and debugging attempts.\\n- - eBPF/XDP: Monitors low-level system calls related to process modifications.\\n- - OSQuery: The processes table can be queried for unusual modifications.\\n-- Network-Based Monitoring:\\n- - Zeek (Bro) Logs: Captures lateral movement attempts where adversaries remotely modify a process.\\n- - Syslog/OSSEC: Monitors logs for suspicious modifications.\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Changes made to a running process, such as writing data intot1Changes made to a running process, such as writing data into
> memory, modifying execution behavior, or injecting code int> memory, modifying execution behavior, or injecting code int
>o an existing process. Adversaries frequently modify process>o an existing process. Adversaries frequently modify process
>es to execute malicious payloads, evade detection, or gain e>es to execute malicious payloads, evade detection, or gain e
>scalated privileges.  *Data Collection Measures:*   - Endpoi>scalated privileges.
>nt Detection and Response (EDR) Tools:     - EDRs can monito 
>r memory modifications and API-level calls. - Sysmon (Window 
>s):     - Event ID 8 (CreateRemoteThread) \u2013 Detects cross-pr 
>ocess thread injection, commonly used in process hollowing.  
>    - Event ID 10 (Process Access) \u2013 Detects access attempts 
> to another process, often preceding injection attempts. - L 
>inux/macOS Monitoring:     - AuditD (ptrace, mmap, mprotect  
>syscalls): Detects memory modifications and debugging attemp 
>ts.     - eBPF/XDP: Monitors low-level system calls related  
>to process modifications.     - OSQuery: The processes table 
> can be queried for unusual modifications. - Network-Based M 
>onitoring:     - Zeek (Bro) Logs: Captures lateral movement  
>attempts where adversaries remotely modify a process.     -  
>Syslog/OSSEC: Monitors logs for suspicious modifications. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--61f1d40e-f3d0-4cc6-aa2d-937b6204194f", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.272000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0033", + "external_id": "DC0033" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Process Termination", + "description": "The exit or termination of a running process on a system. This can occur due to normal operations, user-initiated commands, or malicious actions such as process termination by malware to disable security controls.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Process", + "channel": "None" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "EventCode=5" + }, + { + "name": "linux:syslog", + "channel": "Unexpected termination of daemons or critical services not aligned with admin change tickets" + }, + { + "name": "macos:osquery", + "channel": "process_termination: Unexpected termination of processes tied to vulnerable or high-value services" + }, + { + "name": "esxi:hostd", + "channel": "Log entries indicating VM powered off or forcibly terminated" + }, + { + "name": "macos:unifiedlog", + "channel": "Terminal process killed (killall Terminal) immediately after sudoers modification" + }, + { + "name": "auditd:SYSCALL", + "channel": "exit_group" + }, + { + "name": "macos:unifiedlog", + "channel": "process.*exit.*code" + }, + { + "name": "linux:osquery", + "channel": "unexpected termination of syslog or rsyslog processes" + }, + { + "name": "auditd:SYSCALL", + "channel": "Process segfault or abnormal termination after invoking vulnerable syscall sequence" + }, + { + "name": "auditd:SYSCALL", + "channel": "kill syscalls targeting logging/security processes" + }, + { + "name": "macos:unifiedlog", + "channel": "Termination of syspolicyd or XProtect processes" + }, + { + "name": "docker:runtime", + "channel": "Termination of monitoring sidecar or security container" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "mobile-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:36.181000+00:00\"}, \"root['description']\": {\"new_value\": \"The exit or termination of a running process on a system. This can occur due to normal operations, user-initiated commands, or malicious actions such as process termination by malware to disable security controls.\", \"old_value\": \"The exit or termination of a running process on a system. This can occur due to normal operations, user-initiated commands, or malicious actions such as process termination by malware to disable security controls.\\n\\n*Data Collection Measures:*\\n\\n- Endpoint Detection and Response (EDR) Tools:\\n - Monitor process termination events.\\n- Windows Event Logs:\\n - Event ID 4689 (Process Termination) \\u2013 Captures when a process exits, including process ID and parent process.\\n - Event ID 7036 (Service Control Manager) \\u2013 Monitors system service stops.\\n- Sysmon (Windows):\\n - Event ID 5 (Process Termination) \\u2013 Detects when a process exits, including parent-child relationships.\\n- Linux/macOS Monitoring:\\n - AuditD (`execve`, `exit_group`, `kill` syscalls) \\u2013 Captures process termination via command-line interactions.\\n - eBPF/XDP: Monitors low-level system calls related to process termination.\\n - OSQuery: The processes table can be queried for abnormal exits.\", \"diff\": \"--- \\n+++ \\n@@ -1,15 +1 @@\\n The exit or termination of a running process on a system. This can occur due to normal operations, user-initiated commands, or malicious actions such as process termination by malware to disable security controls.\\n-\\n-*Data Collection Measures:*\\n-\\n-- Endpoint Detection and Response (EDR) Tools:\\n- - Monitor process termination events.\\n-- Windows Event Logs:\\n- - Event ID 4689 (Process Termination) \\u2013 Captures when a process exits, including process ID and parent process.\\n- - Event ID 7036 (Service Control Manager) \\u2013 Monitors system service stops.\\n-- Sysmon (Windows):\\n- - Event ID 5 (Process Termination) \\u2013 Detects when a process exits, including parent-child relationships.\\n-- Linux/macOS Monitoring:\\n- - AuditD (`execve`, `exit_group`, `kill` syscalls) \\u2013 Captures process termination via command-line interactions.\\n- - eBPF/XDP: Monitors low-level system calls related to process termination.\\n- - OSQuery: The processes table can be queried for abnormal exits.\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1The exit or termination of a running process on a system. Tht1The exit or termination of a running process on a system. Th
>is can occur due to normal operations, user-initiated comman>is can occur due to normal operations, user-initiated comman
>ds, or malicious actions such as process termination by malw>ds, or malicious actions such as process termination by malw
>are to disable security controls.  *Data Collection Measures>are to disable security controls.
>:*  - Endpoint Detection and Response (EDR) Tools:     - Mon 
>itor process termination events. - Windows Event Logs:     - 
> Event ID 4689 (Process Termination) \u2013 Captures when a proce 
>ss exits, including process ID and parent process.     - Eve 
>nt ID 7036 (Service Control Manager) \u2013 Monitors system servi 
>ce stops. - Sysmon (Windows):     - Event ID 5 (Process Term 
>ination) \u2013 Detects when a process exits, including parent-ch 
>ild relationships. - Linux/macOS Monitoring:     - AuditD (` 
>execve`, `exit_group`, `kill` syscalls) \u2013 Captures process t 
>ermination via command-line interactions.     - eBPF/XDP: Mo 
>nitors low-level system calls related to process termination 
>.     - OSQuery: The processes table can be queried for abno 
>rmal exits. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--0dcbbf4f-929c-489a-b66b-9b820d3f7f0e", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.275000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0104", + "external_id": "DC0104" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Response Content", + "description": "Captured network traffic that provides details about responses received during an internet scan. This data includes both protocol header values (e.g., HTTP status codes, IP headers, or DNS response codes) and response body content (e.g., HTML, JSON, or raw data). Examples:\n\n- HTTP Scan: A web server responds to a probe with an HTTP 200 status code and an HTML body indicating the default page is accessible.\n- DNS Scan: A DNS server replies to a query with a resolved IP address for a domain, along with details like Time-To-Live (TTL) and authoritative information.\n- TCP Banner Grab: A service listening on a port (e.g., SSH or FTP) responds with a banner containing service name, version, or other metadata.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Internet Scan", + "channel": "None" + }, + { + "name": "NSM:Flow", + "channel": "Suspicious changes in TLS certificate responses or redirected domains" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:40.412000+00:00\"}, \"root['description']\": {\"new_value\": \"Captured network traffic that provides details about responses received during an internet scan. This data includes both protocol header values (e.g., HTTP status codes, IP headers, or DNS response codes) and response body content (e.g., HTML, JSON, or raw data). Examples:\\n\\n- HTTP Scan: A web server responds to a probe with an HTTP 200 status code and an HTML body indicating the default page is accessible.\\n- DNS Scan: A DNS server replies to a query with a resolved IP address for a domain, along with details like Time-To-Live (TTL) and authoritative information.\\n- TCP Banner Grab: A service listening on a port (e.g., SSH or FTP) responds with a banner containing service name, version, or other metadata.\", \"old_value\": \"Captured network traffic that provides details about responses received during an internet scan. This data includes both protocol header values (e.g., HTTP status codes, IP headers, or DNS response codes) and response body content (e.g., HTML, JSON, or raw data). Examples:\\n\\n- HTTP Scan: A web server responds to a probe with an HTTP 200 status code and an HTML body indicating the default page is accessible.\\n- DNS Scan: A DNS server replies to a query with a resolved IP address for a domain, along with details like Time-To-Live (TTL) and authoritative information.\\n- TCP Banner Grab: A service listening on a port (e.g., SSH or FTP) responds with a banner containing service name, version, or other metadata.\\n\\n*Data Collection Measures:*\\n\\n- Network Traffic Monitoring:\\n - Deploy packet capture tools like Wireshark, tcpdump, or Suricata to log both headers and body content of response traffic.\\n - Use network appliances like firewalls, intrusion detection systems (IDS), or intrusion prevention systems (IPS) with logging enabled to capture scan responses.\\n- Cloud Logging Services:\\n - AWS VPC Flow Logs: Capture metadata about network flows, including source and destination, protocol, and response codes.\\n - GCP Packet Mirroring: Use mirrored packets to analyze responses.\\n - Azure NSG Flow Logs: Record network traffic flow information for analysis.\\n- Specific Tools:\\n - Zmap or Masscan: Can perform internet-wide scans and collect response content for analysis.\\n - Nmap: Use custom scripts to capture and log detailed response data during scans.\", \"diff\": \"--- \\n+++ \\n@@ -3,16 +3,3 @@\\n - HTTP Scan: A web server responds to a probe with an HTTP 200 status code and an HTML body indicating the default page is accessible.\\n - DNS Scan: A DNS server replies to a query with a resolved IP address for a domain, along with details like Time-To-Live (TTL) and authoritative information.\\n - TCP Banner Grab: A service listening on a port (e.g., SSH or FTP) responds with a banner containing service name, version, or other metadata.\\n-\\n-*Data Collection Measures:*\\n-\\n-- Network Traffic Monitoring:\\n- - Deploy packet capture tools like Wireshark, tcpdump, or Suricata to log both headers and body content of response traffic.\\n- - Use network appliances like firewalls, intrusion detection systems (IDS), or intrusion prevention systems (IPS) with logging enabled to capture scan responses.\\n-- Cloud Logging Services:\\n- - AWS VPC Flow Logs: Capture metadata about network flows, including source and destination, protocol, and response codes.\\n- - GCP Packet Mirroring: Use mirrored packets to analyze responses.\\n- - Azure NSG Flow Logs: Record network traffic flow information for analysis.\\n-- Specific Tools:\\n- - Zmap or Masscan: Can perform internet-wide scans and collect response content for analysis.\\n- - Nmap: Use custom scripts to capture and log detailed response data during scans.\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Captured network traffic that provides details about responst1Captured network traffic that provides details about respons
>es received during an internet scan. This data includes both>es received during an internet scan. This data includes both
> protocol header values (e.g., HTTP status codes, IP headers> protocol header values (e.g., HTTP status codes, IP headers
>, or DNS response codes) and response body content (e.g., HT>, or DNS response codes) and response body content (e.g., HT
>ML, JSON, or raw data). Examples:  - HTTP Scan: A web server>ML, JSON, or raw data). Examples:  - HTTP Scan: A web server
> responds to a probe with an HTTP 200 status code and an HTM> responds to a probe with an HTTP 200 status code and an HTM
>L body indicating the default page is accessible. - DNS Scan>L body indicating the default page is accessible. - DNS Scan
>: A DNS server replies to a query with a resolved IP address>: A DNS server replies to a query with a resolved IP address
> for a domain, along with details like Time-To-Live (TTL) an> for a domain, along with details like Time-To-Live (TTL) an
>d authoritative information. - TCP Banner Grab: A service li>d authoritative information. - TCP Banner Grab: A service li
>stening on a port (e.g., SSH or FTP) responds with a banner >stening on a port (e.g., SSH or FTP) responds with a banner 
>containing service name, version, or other metadata.  *Data >containing service name, version, or other metadata.
>Collection Measures:*  - Network Traffic Monitoring:     - D 
>eploy packet capture tools like Wireshark, tcpdump, or Suric 
>ata to log both headers and body content of response traffic 
>.     - Use network appliances like firewalls, intrusion det 
>ection systems (IDS), or intrusion prevention systems (IPS)  
>with logging enabled to capture scan responses. - Cloud Logg 
>ing Services:     - AWS VPC Flow Logs: Capture metadata abou 
>t network flows, including source and destination, protocol, 
> and response codes.     - GCP Packet Mirroring: Use mirrore 
>d packets to analyze responses.     - Azure NSG Flow Logs: R 
>ecord network traffic flow information for analysis. - Speci 
>fic Tools:     - Zmap or Masscan: Can perform internet-wide  
>scans and collect response content for analysis.     - Nmap: 
> Use custom scripts to capture and log detailed response dat 
>a during scans. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--f42df6f0-6395-4f0c-9376-525a031f00c3", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.271000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0001", + "external_id": "DC0001" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Scheduled Job Creation", + "description": "The establishment of a task or job that will execute at a predefined time or based on specific triggers.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Scheduled Job", + "channel": "None" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4698" + }, + { + "name": "linux:syslog", + "channel": "Execution of non-standard script or binary by cron" + }, + { + "name": "WinEventLog:TaskScheduler", + "channel": "EventCode=106" + }, + { + "name": "linux:osquery", + "channel": "crontab, systemd_timers" + }, + { + "name": "macos:osquery", + "channel": "launchd_jobs" + }, + { + "name": "esxi:vmkernel", + "channel": "Startup script and task execution logs" + }, + { + "name": "kubernetes:apiserver", + "channel": "verb=create, resource=cronjobs, group=batch" + }, + { + "name": "linux:osquery", + "channel": "file_events" + }, + { + "name": "macos:unifiedlog", + "channel": "process: crontab edits, launch of cron job" + }, + { + "name": "macos:osquery", + "channel": "file_events - cron, launchd" + }, + { + "name": "esxi:cron", + "channel": "execution of scheduled job" + }, + { + "name": "esxi:hostd", + "channel": "task creation events" + }, + { + "name": "macos:cron", + "channel": "cron/launchd" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4699" + }, + { + "name": "linux:cron", + "channel": "Scheduled execution of unknown or unusual script/binary" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:35.814000+00:00\"}, \"root['description']\": {\"new_value\": \"The establishment of a task or job that will execute at a predefined time or based on specific triggers.\", \"old_value\": \"The establishment of a task or job that will execute at a predefined time or based on specific triggers.\\n\\n*Data Collection Measures: *\\n\\n- Windows Event Logs:\\n - Event ID 4698 (Scheduled Task Created) \\u2013 Detects the creation of new scheduled tasks.\\n - Event ID 4702 (Scheduled Task Updated) \\u2013 Identifies modifications to existing scheduled jobs.\\n - Event ID 106 (TaskScheduler Operational Log) \\u2013 Provides details about scheduled task execution.\\n- Sysmon (Windows):\\n - Event ID 1 (Process Creation) \\u2013 Detects the execution of suspicious tasks started by `schtasks.exe`, `at.exe`, or `taskeng.exe`.\\n- Linux/macOS Monitoring:\\n - AuditD: Monitor modifications to `/etc/cron*`, `/var/spool/cron/`, and `crontab` files.\\n - Syslog: Capture cron job execution logs from `/var/log/cron`.\\n - OSQuery: Query the `crontab` and `launchd` tables for scheduled job configurations.\\n- Endpoint Detection and Response (EDR) Tools:\\n - Track scheduled task creation and modification events.\\n- SIEM & XDR Detection Rules:\\n - Monitor for scheduled jobs created by unusual users.\\n - Detect tasks executing scripts from non-standard directories.\", \"diff\": \"--- \\n+++ \\n@@ -1,19 +1 @@\\n The establishment of a task or job that will execute at a predefined time or based on specific triggers.\\n-\\n-*Data Collection Measures: *\\n-\\n-- Windows Event Logs:\\n- - Event ID 4698 (Scheduled Task Created) \\u2013 Detects the creation of new scheduled tasks.\\n- - Event ID 4702 (Scheduled Task Updated) \\u2013 Identifies modifications to existing scheduled jobs.\\n- - Event ID 106 (TaskScheduler Operational Log) \\u2013 Provides details about scheduled task execution.\\n-- Sysmon (Windows):\\n- - Event ID 1 (Process Creation) \\u2013 Detects the execution of suspicious tasks started by `schtasks.exe`, `at.exe`, or `taskeng.exe`.\\n-- Linux/macOS Monitoring:\\n- - AuditD: Monitor modifications to `/etc/cron*`, `/var/spool/cron/`, and `crontab` files.\\n- - Syslog: Capture cron job execution logs from `/var/log/cron`.\\n- - OSQuery: Query the `crontab` and `launchd` tables for scheduled job configurations.\\n-- Endpoint Detection and Response (EDR) Tools:\\n- - Track scheduled task creation and modification events.\\n-- SIEM & XDR Detection Rules:\\n- - Monitor for scheduled jobs created by unusual users.\\n- - Detect tasks executing scripts from non-standard directories.\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1The establishment of a task or job that will execute at a prt1The establishment of a task or job that will execute at a pr
>edefined time or based on specific triggers.  *Data Collecti>edefined time or based on specific triggers.
>on Measures: *  - Windows Event Logs:     - Event ID 4698 (S 
>cheduled Task Created) \u2013 Detects the creation of new schedul 
>ed tasks.     - Event ID 4702 (Scheduled Task Updated) \u2013 Ide 
>ntifies modifications to existing scheduled jobs.     - Even 
>t ID 106 (TaskScheduler Operational Log) \u2013 Provides details  
>about scheduled task execution. - Sysmon (Windows):     - Ev 
>ent ID 1 (Process Creation) \u2013 Detects the execution of suspi 
>cious tasks started by `schtasks.exe`, `at.exe`, or `taskeng 
>.exe`. - Linux/macOS Monitoring:     - AuditD: Monitor modif 
>ications to `/etc/cron*`, `/var/spool/cron/`, and `crontab`  
>files.     - Syslog: Capture cron job execution logs from `/ 
>var/log/cron`.     - OSQuery: Query the `crontab` and `launc 
>hd` tables for scheduled job configurations. - Endpoint Dete 
>ction and Response (EDR) Tools:     - Track scheduled task c 
>reation and modification events. - SIEM & XDR Detection Rule 
>s:     - Monitor for scheduled jobs created by unusual users 
>.     - Detect tasks executing scripts from non-standard dir 
>ectories. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--7b375092-3a61-448d-900a-77c9a4bde4dc", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.271000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0005", + "external_id": "DC0005" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Scheduled Job Metadata", + "description": "Contextual data about a scheduled job, which may include information such as name, timing, command(s), etc.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Scheduled Job", + "channel": "None" + }, + { + "name": "linux:cron", + "channel": "cron activity" + }, + { + "name": "fs:fileevents", + "channel": "/Library/LaunchDaemons/*.plist, ~/Library/LaunchAgents/*.plist" + }, + { + "name": "WinEventLog:TaskScheduler", + "channel": "Task registration/execution shortly after a time discovery event" + }, + { + "name": "macos:unifiedlog", + "channel": "New/modified launchd plist (persistence/scheduling) within TimeWindow after time query" + }, + { + "name": "esxi:syslog", + "channel": "/var/log/vpxa.log task invocations tied to time configuration" + }, + { + "name": "WinEventLog:System", + "channel": "EventCode=106, 200" + }, + { + "name": "macos:launchd", + "channel": "launchd.plist and logs" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_data_source_ref": "", + "x_mitre_domains": [ + "enterprise-attack", + "ics-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-22 19:03:38.549000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/datacomponents/DC0005\", \"old_value\": \"https://attack.mitre.org/data-components/DC0005\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][1]\": {\"name\": \"linux:cron\", \"channel\": \"/var/log/syslog or journalctl\"}, \"root['x_mitre_log_sources'][4]\": {\"name\": \"linux::cron\", \"channel\": \"crontab or at job created within TimeWindow post time discovery\"}}}", + "previous_version": "2.0" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--9f387817-df83-432a-b56b-a8fb7f71eedd", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.272000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0029", + "external_id": "DC0029" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Script Execution", + "description": "The execution of a text file that contains code via the interpreter.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Script", + "channel": "None" + }, + { + "name": "m365:office", + "channel": "VBA auto_open, auto_close, or document_open events" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream --predicate 'eventMessage contains \"python\"'" + }, + { + "name": "linux:syslog", + "channel": "/var/log/syslog" + }, + { + "name": "WinEventLog:System", + "channel": "EventCode=1502, 1503" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream --predicate 'eventMessage contains \"wscript\" OR \"vbs\"'" + }, + { + "name": "macos:unifiedlog", + "channel": "osascript or AppleScript invocation modifying UI" + }, + { + "name": "networkdevice:runtime", + "channel": "runtime" + }, + { + "name": "macos:unifiedlog", + "channel": "log" + }, + { + "name": "esxi:vmkernel", + "channel": "boot" + }, + { + "name": "macos:unifiedlog", + "channel": "AppleScript creating login item via 'System Events' dictionary" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "name": "WinEventLog:Application", + "channel": "Stored procedure creation, modification, or xp_cmdshell invocation via SQL logs or SQL Server auditing" + }, + { + "name": "ApplicationLogs:SQL", + "channel": "Stored procedure creation or modification with shell invocation (e.g., system(), exec())" + }, + { + "name": "macos:unifiedlog", + "channel": "subsystem=launchservices" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "Set-ADUser or Set-ADAuthenticationPolicy with MFA attributes disabled" + }, + { + "name": "EDR:scriptblock", + "channel": "Process Tree + Script Block Logging" + }, + { + "name": "linux:syslog", + "channel": "boot logs" + }, + { + "name": "m365:defender", + "channel": "ScriptBlockLogging + AMSI" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream with predicate 'eventMessage CONTAINS \"osascript\"'" + }, + { + "name": "etw:Microsoft-Antimalware-Scan-Interface", + "channel": "Amsi/Script content + API verdicts during in-memory staging" + }, + { + "name": "esxi:shell", + "channel": "None" + }, + { + "name": "WinEventLog:System", + "channel": "EventCode=4016, 5312" + }, + { + "name": "auditd:PROCTITLE", + "channel": "scripting loop invoking sleep/ping" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "Scripts with references to XML parsing, AES decryption, or gpprefdecrypt logic" + }, + { + "name": "macos:syslog", + "channel": "system.log, asl.log" + }, + { + "name": "macos:osquery", + "channel": "exec: Unexpected execution of osascript or AppleScript targeting sensitive apps" + }, + { + "name": "macos:unifiedlog", + "channel": "subsystem=com.apple.Security or com.apple.applescript" + }, + { + "name": "azure:activity", + "channel": "Microsoft.Compute/virtualMachines/runCommand/action: Abnormal initiation of Azure RunCommand jobs or PowerShell/Bash payloads" + }, + { + "name": "EDR:AMSI", + "channel": "Malicious inline C#/script blobs embedded in MSBuild projects if intercepted by AMSI-aware loaders (rare but possible via chained LOLBins)" + }, + { + "name": "macos:unifiedlog", + "channel": "osascript, AppleScript, or Python execution triggered immediately after HID connection" + }, + { + "name": "m365:unified", + "channel": "Scripted Activity" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:36.018000+00:00\"}, \"root['description']\": {\"new_value\": \"The execution of a text file that contains code via the interpreter.\", \"old_value\": \"The execution of a text file that contains code via the interpreter.\\n\\n*Data Collection Measures:*\\n\\n- Windows Event Logs:\\n - Event ID 4104 (PowerShell Script Block Logging) \\u2013 Captures full command-line execution of PowerShell scripts.\\n - Event ID 4688 (Process Creation) \\u2013 Detects script execution by tracking process launches (`powershell.exe`, `wscript.exe`, `cscript.exe`).\\n - Event ID 5861 (Script Execution) \\u2013 Captures script execution via Windows Defender AMSI logging.\\n- Sysmon (Windows):\\n - Event ID 1 (Process Creation) \\u2013 Monitors script execution initiated by scripting engines.\\n - Event ID 11 (File Creation) \\u2013 Detects new script files written to disk before execution.\\n- Endpoint Detection and Response (EDR) Tools:\\n - Track script execution behavior, detect obfuscated commands, and prevent malicious scripts.\\n- PowerShell Logging:\\n - Enable Module Logging: Logs all loaded modules and cmdlets.\\n - Enable Script Block Logging: Captures complete PowerShell script execution history.\\n- SIEM Detection Rules:\\n - Detect script execution with obfuscated, encoded, or remote URLs.\\n - Alert on script executions using `-EncodedCommand` or `iex(iwr)`.\", \"diff\": \"--- \\n+++ \\n@@ -1,19 +1 @@\\n The execution of a text file that contains code via the interpreter.\\n-\\n-*Data Collection Measures:*\\n-\\n-- Windows Event Logs:\\n- - Event ID 4104 (PowerShell Script Block Logging) \\u2013 Captures full command-line execution of PowerShell scripts.\\n- - Event ID 4688 (Process Creation) \\u2013 Detects script execution by tracking process launches (`powershell.exe`, `wscript.exe`, `cscript.exe`).\\n- - Event ID 5861 (Script Execution) \\u2013 Captures script execution via Windows Defender AMSI logging.\\n-- Sysmon (Windows):\\n- - Event ID 1 (Process Creation) \\u2013 Monitors script execution initiated by scripting engines.\\n- - Event ID 11 (File Creation) \\u2013 Detects new script files written to disk before execution.\\n-- Endpoint Detection and Response (EDR) Tools:\\n- - Track script execution behavior, detect obfuscated commands, and prevent malicious scripts.\\n-- PowerShell Logging:\\n- - Enable Module Logging: Logs all loaded modules and cmdlets.\\n- - Enable Script Block Logging: Captures complete PowerShell script execution history.\\n-- SIEM Detection Rules:\\n- - Detect script execution with obfuscated, encoded, or remote URLs.\\n- - Alert on script executions using `-EncodedCommand` or `iex(iwr)`.\"}, \"root['x_mitre_log_sources'][11]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4103, 4104\"}, \"root['x_mitre_log_sources'][22]['channel']\": {\"new_value\": \"EventCode=4016, 5312\", \"old_value\": \"EventCode=4016,5312\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1The execution of a text file that contains code via the intet1The execution of a text file that contains code via the inte
>rpreter.  *Data Collection Measures:*  - Windows Event Logs:>rpreter.
>     - Event ID 4104 (PowerShell Script Block Logging) \u2013 Cap 
>tures full command-line execution of PowerShell scripts.     
> - Event ID 4688 (Process Creation) \u2013 Detects script executi 
>on by tracking process launches (`powershell.exe`, `wscript. 
>exe`, `cscript.exe`).     - Event ID 5861 (Script Execution) 
> \u2013 Captures script execution via Windows Defender AMSI loggi 
>ng. - Sysmon (Windows):     - Event ID 1 (Process Creation)  
>\u2013 Monitors script execution initiated by scripting engines.  
>    - Event ID 11 (File Creation) \u2013 Detects new script files 
> written to disk before execution. - Endpoint Detection and  
>Response (EDR) Tools:     - Track script execution behavior, 
> detect obfuscated commands, and prevent malicious scripts.  
>- PowerShell Logging:     - Enable Module Logging: Logs all  
>loaded modules and cmdlets.     - Enable Script Block Loggin 
>g: Captures complete PowerShell script execution history. -  
>SIEM Detection Rules:     - Detect script execution with obf 
>uscated, encoded, or remote URLs.     - Alert on script exec 
>utions using `-EncodedCommand` or `iex(iwr)`. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--5297a638-1382-4f0c-8472-0d21830bf705", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.273000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0060", + "external_id": "DC0060" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Service Creation", + "description": "The registration of a new service or daemon on an operating system.\n\n*Data Collection Measures:*\n\n- Windows Event Logs\n - Event ID 4697 - Captures the creation of a new Windows service.\n - Event ID 7045 - Captures services installed by administrators or adversaries.\n - Event ID 7034 - Could indicate malicious service modification or exploitation.\n- Sysmon Logs\n - Sysmon Event ID 1 - Process Creation (captures service executables).\n - Sysmon Event ID 4 - Service state changes (detects service installation).\n - Sysmon Event ID 13 - Registry modifications (captures service persistence changes).\n- PowerShell Logging\n - Monitor `New-Service` and `Set-Service` PowerShell cmdlets in Event ID 4104 (Script Block Logging).\n- Linux/macOS Collection Methods\n - AuditD & Syslog Daemon Logs (`/var/log/syslog`, `/var/log/messages`, `/var/log/daemon.log`)\n - AuditD Rules:\n - `auditctl -w /etc/systemd/system -p wa -k service_creation`\n - Detects changes to `systemd` service configurations.\n- Systemd Journals (`journalctl -u `)\n - Captures newly created systemd services.\n- LaunchDaemons & LaunchAgents (macOS)\n - Monitor `/Library/LaunchDaemons/` and `/Library/LaunchAgents/` for new plist files.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Service", + "channel": "None" + }, + { + "name": "WinEventLog:System", + "channel": "EventCode=7036" + }, + { + "name": "auditd:CONFIG_CHANGE", + "channel": "creation or modification of systemd services" + }, + { + "name": "macos:osquery", + "channel": "Process Events and Launch Daemons" + }, + { + "name": "WinEventLog:System", + "channel": "EventCode=7045" + }, + { + "name": "linux:osquery", + "channel": "newly registered unit file with ExecStart pointing to unknown binary" + }, + { + "name": "macos:unifiedlog", + "channel": "creation or loading of new launchd services" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4697" + }, + { + "name": "linux:syslog", + "channel": "systemctl start/enable with uncommon binary paths" + }, + { + "name": "WinEventLog:System", + "channel": "EventCode=7031, 7034" + }, + { + "name": "macos:osquery", + "channel": "launch_daemons" + }, + { + "name": "macos:unifiedlog", + "channel": "launchd loading new LaunchDaemon or changes to existing daemon configuration" + }, + { + "name": "macos:osquery", + "channel": "detection of new launch agents with suspicious paths or unsigned binaries" + }, + { + "name": "kubernetes:audit", + "channel": "create" + }, + { + "name": "containerLogs:systemd_unit_files", + "channel": "unit file referencing container binary with persistent flags" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:36.315000+00:00\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][5]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=7045\"}}}", + "previous_version": "2.0" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--74fa567d-bc90-425c-8a41-3c703abb221c", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.273000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0041", + "external_id": "DC0041" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Service Metadata", + "description": "Contextual data about a service/daemon, which may include information such as name, service executable, start type, etc.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Service", + "channel": "None" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "EventCode=4" + }, + { + "name": "linux:syslog", + "channel": "service stopped messages" + }, + { + "name": "macos:unifiedlog", + "channel": "launchctl disable or bootout calls" + }, + { + "name": "esxi:hostd", + "channel": "Stop VM or disable service events via vim-cmd" + }, + { + "name": "linux:syslog", + "channel": "auditd service stopped or disabled" + }, + { + "name": "macos:osquery", + "channel": "launchd" + }, + { + "name": "linux:osquery", + "channel": "scheduled/real-time" + }, + { + "name": "macos:unifiedlog", + "channel": "subsystem=com.apple.launchservices" + }, + { + "name": "esxi:hostd", + "channel": "registers services with legitimate-sounding names" + }, + { + "name": "WinEventLog:System", + "channel": "EventCode=7035" + }, + { + "name": "linux:syslog", + "channel": "Service restart with modified executable path" + }, + { + "name": "macos:unifiedlog", + "channel": "Observed loading of new LaunchAgent or LaunchDaemon plist" + }, + { + "name": "kubernetes:audit", + "channel": "seccomp or AppArmor profile changes" + }, + { + "name": "WinEventLog:System", + "channel": "Service stopped or RecoveryDisabled set via REAgentC" + }, + { + "name": "esxi:hostd", + "channel": "Service events" + }, + { + "name": "WinEventLog:WinRM", + "channel": "EventCode=6" + }, + { + "name": "auditd:CONFIG_CHANGE", + "channel": "delete: Modification of systemd unit files or config for security agents" + }, + { + "name": "macos:unifiedlog", + "channel": "Modification of system configuration profiles affecting security tools" + }, + { + "name": "kubernetes:audit", + "channel": "kubectl delete or patch of security pods/admission controllers" + }, + { + "name": "networkdevice:config", + "channel": "write: Startup configuration changes disabling security checks" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:36.382000+00:00\"}, \"root['x_mitre_log_sources'][1]['name']\": {\"new_value\": \"WinEventLog:Sysmon\", \"old_value\": \"WinEventLog:sysmon\"}}}", + "previous_version": "2.0" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--66531bc6-a509-4868-8314-4d599e91d222", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.273000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0065", + "external_id": "DC0065" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Service Modification", + "description": "Changes made to an existing service or daemon, such as modifying the service name, start type, execution parameters, or security configurations.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Service", + "channel": "None" + }, + { + "name": "WinEventLog:Microsoft-IIS-Configuration", + "channel": "Module or ISAPI filter registration events" + }, + { + "name": "WinEventLog:System", + "channel": "EventCode=7040" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:37.211000+00:00\"}, \"root['description']\": {\"new_value\": \"Changes made to an existing service or daemon, such as modifying the service name, start type, execution parameters, or security configurations.\", \"old_value\": \"Changes made to an existing service or daemon, such as modifying the service name, start type, execution parameters, or security configurations.\\n\\n*Data Collection Measures: *\\n\\n- Windows Event Logs\\n - Event ID 7040 - Detects modifications to the startup behavior of a service.\\n - Event ID 7045 - Can capture changes made to existing services.\\n - Event ID 7036 - Tracks when services start or stop, potentially indicating malicious tampering.\\n - Event ID 4697 - Can detect when an adversary reinstalls a service with different parameters.\\n- Sysmon Logs\\n - Sysmon Event ID 13 - Detects changes to service configurations in the Windows Registry (e.g., `HKLM\\\\SYSTEM\\\\CurrentControlSet\\\\Services\\\\`).\\n - Sysmon Event ID 1 - Can track execution of `sc.exe` or `PowerShell Set-Service`.\\n- PowerShell Logging\\n - Event ID 4104 (Script Block Logging) - Captures execution of commands like `Set-Service`, `New-Service`, or `sc config`.\\n - Command-Line Logging (Event ID 4688) - Tracks usage of service modification commands:\\n - `sc config start= auto` \\n - `sc qc ` \\n- Linux/macOS Collection Methods\\n - Systemd Journals (`journalctl -u `) Tracks modifications to systemd service configurations.\\n - Daemon Logs (`/var/log/syslog`, `/var/log/messages`, `/var/log/daemon.log`) Captures changes to service state and execution parameters.\\n - AuditD Rules for Service Modification \\n - Monitor modifications to `/etc/systemd/system/` for new or altered service unit files: `auditctl -w /etc/systemd/system/ -p wa -k service_modification`\\n - Track execution of `systemctl` or `service` commands: `auditctl -a always,exit -F arch=b64 -S execve -F a0=systemctl -F key=service_mod`\\n - OSQuery for Linux/macOS Monitoring\\n - Query modified services using OSQuery\\u2019s `processes` or `system_info` tables: `SELECT * FROM systemd_units WHERE state != 'running';`\\n - macOS Launch Daemon/Agent Modification\\n - Monitor for changes in:\\n - `/Library/LaunchDaemons/`\\n - `/Library/LaunchAgents/`\\n - Track modifications to `.plist` files indicating persistence attempts.\", \"diff\": \"--- \\n+++ \\n@@ -1,30 +1 @@\\n Changes made to an existing service or daemon, such as modifying the service name, start type, execution parameters, or security configurations.\\n-\\n-*Data Collection Measures: *\\n-\\n-- Windows Event Logs\\n- - Event ID 7040 - Detects modifications to the startup behavior of a service.\\n- - Event ID 7045 - Can capture changes made to existing services.\\n- - Event ID 7036 - Tracks when services start or stop, potentially indicating malicious tampering.\\n- - Event ID 4697 - Can detect when an adversary reinstalls a service with different parameters.\\n-- Sysmon Logs\\n- - Sysmon Event ID 13 - Detects changes to service configurations in the Windows Registry (e.g., `HKLM\\\\SYSTEM\\\\CurrentControlSet\\\\Services\\\\`).\\n- - Sysmon Event ID 1 - Can track execution of `sc.exe` or `PowerShell Set-Service`.\\n-- PowerShell Logging\\n- - Event ID 4104 (Script Block Logging) - Captures execution of commands like `Set-Service`, `New-Service`, or `sc config`.\\n- - Command-Line Logging (Event ID 4688) - Tracks usage of service modification commands:\\n- - `sc config start= auto` \\n- - `sc qc ` \\n-- Linux/macOS Collection Methods\\n- - Systemd Journals (`journalctl -u `) Tracks modifications to systemd service configurations.\\n- - Daemon Logs (`/var/log/syslog`, `/var/log/messages`, `/var/log/daemon.log`) Captures changes to service state and execution parameters.\\n- - AuditD Rules for Service Modification \\n- - Monitor modifications to `/etc/systemd/system/` for new or altered service unit files: `auditctl -w /etc/systemd/system/ -p wa -k service_modification`\\n- - Track execution of `systemctl` or `service` commands: `auditctl -a always,exit -F arch=b64 -S execve -F a0=systemctl -F key=service_mod`\\n- - OSQuery for Linux/macOS Monitoring\\n- - Query modified services using OSQuery\\u2019s `processes` or `system_info` tables: `SELECT * FROM systemd_units WHERE state != 'running';`\\n- - macOS Launch Daemon/Agent Modification\\n- - Monitor for changes in:\\n- - `/Library/LaunchDaemons/`\\n- - `/Library/LaunchAgents/`\\n- - Track modifications to `.plist` files indicating persistence attempts.\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Changes made to an existing service or daemon, such as modift1Changes made to an existing service or daemon, such as modif
>ying the service name, start type, execution parameters, or >ying the service name, start type, execution parameters, or 
>security configurations.  *Data Collection Measures: *  - Wi>security configurations.
>ndows Event Logs     - Event ID 7040 - Detects modifications 
> to the startup behavior of a service.     - Event ID 7045 - 
> Can capture changes made to existing services.     - Event  
>ID 7036 - Tracks when services start or stop, potentially in 
>dicating malicious tampering.     - Event ID 4697 - Can dete 
>ct when an adversary reinstalls a service with different par 
>ameters. - Sysmon Logs     - Sysmon Event ID 13 - Detects ch 
>anges to service configurations in the Windows Registry (e.g 
>., `HKLM\\SYSTEM\\CurrentControlSet\\Services\\`).     - Sysmon  
>Event ID 1 - Can track execution of `sc.exe` or `PowerShell  
>Set-Service`. - PowerShell Logging     - Event ID 4104 (Scri 
>pt Block Logging) - Captures execution of commands like `Set 
>-Service`, `New-Service`, or `sc config`.     - Command-Line 
> Logging (Event ID 4688) - Tracks usage of service modificat 
>ion commands:         - `sc config <service_name> start= aut 
>o`           - `sc qc <service_name>`   - Linux/macOS Collec 
>tion Methods     - Systemd Journals (`journalctl -u <service 
>_name>`) Tracks modifications to systemd service configurati 
>ons.     - Daemon Logs (`/var/log/syslog`, `/var/log/message 
>s`, `/var/log/daemon.log`) Captures changes to service state 
> and execution parameters.     - AuditD Rules for Service Mo 
>dification          - Monitor modifications to `/etc/systemd 
>/system/` for new or altered service unit files: `auditctl - 
>w /etc/systemd/system/ -p wa -k service_modification`        
>  - Track execution of `systemctl` or `service` commands: `a 
>uditctl -a always,exit -F arch=b64 -S execve -F a0=systemctl 
> -F key=service_mod`     - OSQuery for Linux/macOS Monitorin 
>g         - Query modified services using OSQuery\u2019s `process 
>es` or `system_info` tables: `SELECT * FROM systemd_units WH 
>ERE state != 'running';`     - macOS Launch Daemon/Agent Mod 
>ification         - Monitor for changes in:             - `/ 
>Library/LaunchDaemons/`             - `/Library/LaunchAgents 
>/`         - Track modifications to `.plist` files indicatin 
>g persistence attempts. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--3da222e6-53f3-451c-a239-0b405c009432", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.273000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0057", + "external_id": "DC0057" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Snapshot Creation", + "description": "The process of taking a point-in-time copy of a cloud storage volume (files, settings, configurations, etc.), virtual machine (VM), or database that can be created and deployed in cloud environments.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "esxi:vmkernel", + "channel": "snapshot create/write events" + }, + { + "name": "AWS:CloudTrail", + "channel": "CreateSnapshot" + }, + { + "name": "azure:activity", + "channel": "MICROSOFT.COMPUTE/SNAPSHOTS/WRITE" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:39.640000+00:00\"}, \"root['description']\": {\"new_value\": \"The process of taking a point-in-time copy of a cloud storage volume (files, settings, configurations, etc.), virtual machine (VM), or database that can be created and deployed in cloud environments.\", \"old_value\": \"The process of taking a point-in-time copy of a cloud storage volume (files, settings, configurations, etc.), virtual machine (VM), or database that can be created and deployed in cloud environments.\\n\\n*Data Collection Measures:*\\n\\n- Cloud Platform Logs (IaaS)\\n - AWS CloudTrail Logs: Monitor API calls related to snapshot creation (`CreateSnapshot`).\\n - Azure Monitor Logs: Track snapshot creation (`Microsoft.Compute/snapshots/write`).\\n - Google Cloud Logging: Detect `compute.disks.createSnapshot`.\", \"diff\": \"--- \\n+++ \\n@@ -1,8 +1 @@\\n The process of taking a point-in-time copy of a cloud storage volume (files, settings, configurations, etc.), virtual machine (VM), or database that can be created and deployed in cloud environments.\\n-\\n-*Data Collection Measures:*\\n-\\n-- Cloud Platform Logs (IaaS)\\n- - AWS CloudTrail Logs: Monitor API calls related to snapshot creation (`CreateSnapshot`).\\n- - Azure Monitor Logs: Track snapshot creation (`Microsoft.Compute/snapshots/write`).\\n- - Google Cloud Logging: Detect `compute.disks.createSnapshot`.\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1The process of taking a point-in-time copy of a cloud storagt1The process of taking a point-in-time copy of a cloud storag
>e volume (files, settings, configurations, etc.), virtual ma>e volume (files, settings, configurations, etc.), virtual ma
>chine (VM), or database that can be created and deployed in >chine (VM), or database that can be created and deployed in 
>cloud environments.  *Data Collection Measures:*  - Cloud Pl>cloud environments.
>atform Logs (IaaS)     - AWS CloudTrail Logs: Monitor API ca 
>lls related to snapshot creation (`CreateSnapshot`).     - A 
>zure Monitor Logs: Track snapshot creation (`Microsoft.Compu 
>te/snapshots/write`).     - Google Cloud Logging: Detect `co 
>mpute.disks.createSnapshot`. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--a953ca55-921a-44f7-9b8d-3d40141aa17e", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.271000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0002", + "external_id": "DC0002" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "User Account Authentication", + "description": "An attempt (successful and failed login attempts) by a user, service, or application to gain access to a network, system, or cloud-based resource. This typically involves credentials such as passwords, tokens, multi-factor authentication (MFA), or biometric validation.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "User Account", + "channel": "None" + }, + { + "name": "NSM:Flow", + "channel": "TGS-REQ and AS-REQ seen for new user shortly after domain-modifying process" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4625" + }, + { + "name": "saas:okta", + "channel": "session.impersonation.start" + }, + { + "name": "Okta:SystemLog", + "channel": "eventType: user.authentication.sso, app.oauth2.token.grant" + }, + { + "name": "azure:signinlogs", + "channel": "Success logs from high-risk accounts" + }, + { + "name": "networkdevice:syslog", + "channel": "config access, authentication logs" + }, + { + "name": "ESXiLogs:authlog", + "channel": "Unexpected login followed by encoding commands" + }, + { + "name": "saas:okta", + "channel": "Unusual OAuth app requesting message-read scopes for Slack/Teams/Jira" + }, + { + "name": "NSM:Connections", + "channel": "Accepted password or publickey for user from remote IP" + }, + { + "name": "macos:unifiedlog", + "channel": "successful sudo or authentication for account not normally associated with admin actions" + }, + { + "name": "esxi:vpxa", + "channel": "user login from unexpected IP or non-admin user role" + }, + { + "name": "m365:signinlogs", + "channel": "Sign-in from anomalous location or impossible travel condition" + }, + { + "name": "networkdevice:syslog", + "channel": "User privilege escalation to level 15/root prior to destructive commands" + }, + { + "name": "networkdevice:syslog", + "channel": "authorization/accounting logs" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4769, 1200, 1202" + }, + { + "name": "linux:syslog", + "channel": "sudo/date/timedatectl execution by non-standard users" + }, + { + "name": "saas:audit", + "channel": "Repeated requests to SMS-generating endpoints using anomalous or new user agents, IP ranges, or geographies." + }, + { + "name": "azure:signinlogs", + "channel": "Multiple MFA challenge requests without successful primary login" + }, + { + "name": "AWS:CloudTrail", + "channel": "AssumeRole or ConsoleLogin with repeated MFA failures followed by repeated MFA requests" + }, + { + "name": "auditd:AUTH", + "channel": "pam_unix or pam_google_authenticator invoked repeatedly within short interval" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4768, 4769, 4770" + }, + { + "name": "NSM:Connections", + "channel": "Repeated failed authentication attempts or replay patterns" + }, + { + "name": "azure:signinlogs", + "channel": "TokenIssued, TokenRenewed: Unexpected or anomalous token issuance events" + }, + { + "name": "azure:signinlogs", + "channel": "SignIn: Sign-ins flagged as atypical (new geographic region, unfamiliar device id) shortly after correlated endpoint/browser compromise times" + }, + { + "name": "AWS:CloudTrail", + "channel": "sts:GetFederationToken" + }, + { + "name": "m365:unified", + "channel": "Delegated permission grants without user login event" + }, + { + "name": "saas:salesforce", + "channel": "API login using access_token without login history" + }, + { + "name": "AWS:CloudTrail", + "channel": "AssumeRoleWithWebIdentity" + }, + { + "name": "azure:signinlogs", + "channel": "Operation=UserLogin" + }, + { + "name": "esxi:auth", + "channel": "interactive shell or SSH access preceding storage enumeration" + }, + { + "name": "NSM:Connections", + "channel": "Successful login without expected MFA challenge" + }, + { + "name": "macos:unifiedlog", + "channel": "Login success without MFA step" + }, + { + "name": "kubernetes:apiserver", + "channel": "get/list requests to /api/v1/secrets or /api/v1/namespaces/*/serviceaccounts" + }, + { + "name": "auditd:SYSCALL", + "channel": "pam_authenticate, sshd" + }, + { + "name": "macos:unifiedlog", + "channel": "log show --predicate 'eventMessage contains \"Authentication\"'" + }, + { + "name": "esxi:vpxd", + "channel": "/var/log/vmware/vpxd.log" + }, + { + "name": "azure:signinlogs", + "channel": "Unusual Token Usage or Application Consent" + }, + { + "name": "networkdevice:syslog", + "channel": "Failed and successful logins to network devices outside approved admin IP ranges" + }, + { + "name": "azure:signinlogs", + "channel": "OperationName=SetDomainAuthentication OR Set-FederatedDomain" + }, + { + "name": "network:auth", + "channel": "repeated successful authentications with previously unknown accounts or anomalous password acceptance" + }, + { + "name": "azure:signinlogs", + "channel": "Sign-in with unfamiliar location/device + portal navigation" + }, + { + "name": "m365:signinlogs", + "channel": "UserLoginSuccess" + }, + { + "name": "saas:salesforce", + "channel": "Login" + }, + { + "name": "networkdevice:syslog", + "channel": "Privileged login followed by destructive format command" + }, + { + "name": "networkdevice:syslog", + "channel": "admin login events" + }, + { + "name": "networkdevice:syslog", + "channel": "Privileged login followed by destructive command sequence" + }, + { + "name": "azure:signinlogs", + "channel": "Login from newly created account" + }, + { + "name": "auditd:SYSCALL", + "channel": "execution of ssh, scp, or sftp using previously unseen credentials or keys" + }, + { + "name": "m365:unified", + "channel": "login using refresh_token with no preceding authentication context" + }, + { + "name": "saas:googleworkspace", + "channel": "API access without user login" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4769" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4776, 4625" + }, + { + "name": "azure:signinlogs", + "channel": "Interactive/Non-Interactive Sign-In" + }, + { + "name": "AWS:CloudTrail", + "channel": "AWS IAM: ListUsers, ListRoles" + }, + { + "name": "gcp:workspaceaudit", + "channel": "Token Generation via Domain Delegation" + }, + { + "name": "m365:signinlogs", + "channel": "Unusual sign-in from service principal to user mailbox" + }, + { + "name": "macos:unifiedlog", + "channel": "User credential prompt events without associated trusted installer package" + }, + { + "name": "linux:auth", + "channel": "sshd login" + }, + { + "name": "saas:googleworkspace", + "channel": "Accessed third-party credential management service" + }, + { + "name": "azure:signinlogs", + "channel": "Reset password or download key from portal" + }, + { + "name": "linux:syslog", + "channel": "SSH failed login" + }, + { + "name": "macos:unifiedlog", + "channel": "Login failure / authorization denied" + }, + { + "name": "azure:signinlogs", + "channel": "status = failure" + }, + { + "name": "Okta:authn", + "channel": "authentication_failure" + }, + { + "name": "saas-app:auth", + "channel": "login_failure" + }, + { + "name": "networkdevice:syslog", + "channel": "AAA, RADIUS, or TACACS authentication" + }, + { + "name": "kubernetes:apiserver", + "channel": "authentication.k8s.io/v1beta1" + }, + { + "name": "m365:exchange", + "channel": "Logon failure" + }, + { + "name": "AWS:CloudTrail", + "channel": "eventName=ConsoleLogin | eventType=AwsConsoleSignIn" + }, + { + "name": "auditd:USER_LOGIN", + "channel": "USER_AUTH" + }, + { + "name": "azure:signinlogs", + "channel": "Sign-in logs" + }, + { + "name": "macos:unifiedlog", + "channel": "auth" + }, + { + "name": "m365:unified", + "channel": "Sign-in logs" + }, + { + "name": "AWS:CloudTrail", + "channel": "ConsoleLogin or AssumeRole" + }, + { + "name": "esxi:auth", + "channel": "/var/log/auth.log" + }, + { + "name": "networkdevice:syslog", + "channel": "authentication logs" + }, + { + "name": "azure:signinlogs", + "channel": "SigninSuccess" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4625, 4771, 4648" + }, + { + "name": "linux:syslog", + "channel": "Failed password for invalid user" + }, + { + "name": "macos:unifiedlog", + "channel": "Login Window and Authd errors" + }, + { + "name": "azure:signinlogs", + "channel": "Failure Reason + UserPrincipalName" + }, + { + "name": "saas:okta", + "channel": "authentication_failure" + }, + { + "name": "networkdevice:syslog", + "channel": "AAA or TACACS authentication failures" + }, + { + "name": "kubernetes:audit", + "channel": "Failed login" + }, + { + "name": "m365:exchange", + "channel": "FailedLogin" + }, + { + "name": "saas:auth", + "channel": "signin_failed" + }, + { + "name": "saas:googleworkspace", + "channel": "login with reused session token and mismatched user agent or IP" + }, + { + "name": "saas:googleworkspace", + "channel": "Access via OAuth credentials with unusual scopes or from anomalous IPs" + }, + { + "name": "networkdevice:syslog", + "channel": "authentication & authorization" + }, + { + "name": "azure:signinlogs", + "channel": "Sign-in activity" + }, + { + "name": "AWS:CloudTrail", + "channel": "ConsoleLogin, AssumeRole, ListAccessKeys, CreateUser" + }, + { + "name": "gcp:audit", + "channel": "drive.activity" + }, + { + "name": "gcp:audit", + "channel": "login.event" + }, + { + "name": "linux:syslog", + "channel": "sshd[pid]: Failed password" + }, + { + "name": "macos:unifiedlog", + "channel": "authd" + }, + { + "name": "networkdevice:syslog", + "channel": "login failed" + }, + { + "name": "GCPAuditLogs:login.googleapis.com", + "channel": "Failed sign-in events" + }, + { + "name": "esxi:auth", + "channel": "SSH session/login" + }, + { + "name": "NSM:Connections", + "channel": "sshd or PAM logins" + }, + { + "name": "saas:okta", + "channel": "Sign-in logs / audit events" + }, + { + "name": "gcp:audit", + "channel": "Sign-in logs / audit events" + }, + { + "name": "azure:signinlogs", + "channel": "Sign-in logs / audit events" + }, + { + "name": "kubernetes:audit", + "channel": "authentication.k8s.io" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4648" + }, + { + "name": "linux:syslog", + "channel": "authentication and authorization events during environmental validation phase" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:34.948000+00:00\"}, \"root['description']\": {\"new_value\": \"An attempt (successful and failed login attempts) by a user, service, or application to gain access to a network, system, or cloud-based resource. This typically involves credentials such as passwords, tokens, multi-factor authentication (MFA), or biometric validation.\", \"old_value\": \"An attempt (successful and failed login attempts) by a user, service, or application to gain access to a network, system, or cloud-based resource. This typically involves credentials such as passwords, tokens, multi-factor authentication (MFA), or biometric validation.\\n\\n*Data Collection Measures:*\\n\\n- Host-Based Authentication Logs\\n - Windows Event Logs\\n - Event ID 4776 \\u2013 NTLM authentication attempt.\\n - Event ID 4624 \\u2013 Successful user logon.\\n - Event ID 4625 \\u2013 Failed authentication attempt.\\n - Event ID 4648 \\u2013 Explicit logon with alternate credentials.\\n - Linux/macOS Authentication Logs\\n - `/var/log/auth.log`, `/var/log/secure` \\u2013 Logs SSH, sudo, and other authentication attempts.\\n - AuditD \\u2013 Tracks authentication events via PAM modules.\\n - macOS Unified Logs \\u2013 `/var/db/diagnostics` captures authentication failures.\\n- Cloud Authentication Logs\\n - Azure AD Logs\\n - Sign-in Logs \\u2013 Tracks authentication attempts, MFA challenges, and conditional access failures.\\n - Audit Logs \\u2013 Captures authentication-related configuration changes.\\n - Microsoft Graph API \\u2013 Provides real-time sign-in analytics.\\n - Google Workspace & Office 365\\n - Google Admin Console \\u2013 `User Login Report` tracks login attempts and failures.\\n - Office 365 Unified Audit Logs \\u2013 Captures logins across Exchange, SharePoint, and Teams.\\n - AWS CloudTrail & IAM\\n - Tracks authentication via `AWS IAM AuthenticateUser` and `sts:GetSessionToken`.\\n - Logs failed authentications to AWS Management Console and API requests.\\n- Container Authentication Monitoring\\n - Kubernetes Authentication Logs\\n - kubectl audit logs \\u2013 Captures authentication attempts for service accounts and admin users.\\n - Azure Kubernetes Service (AKS) and Google Kubernetes Engine (GKE) \\u2013 Logs IAM authentication events.\", \"diff\": \"--- \\n+++ \\n@@ -1,29 +1 @@\\n An attempt (successful and failed login attempts) by a user, service, or application to gain access to a network, system, or cloud-based resource. This typically involves credentials such as passwords, tokens, multi-factor authentication (MFA), or biometric validation.\\n-\\n-*Data Collection Measures:*\\n-\\n-- Host-Based Authentication Logs\\n- - Windows Event Logs\\n- - Event ID 4776 \\u2013 NTLM authentication attempt.\\n- - Event ID 4624 \\u2013 Successful user logon.\\n- - Event ID 4625 \\u2013 Failed authentication attempt.\\n- - Event ID 4648 \\u2013 Explicit logon with alternate credentials.\\n- - Linux/macOS Authentication Logs\\n- - `/var/log/auth.log`, `/var/log/secure` \\u2013 Logs SSH, sudo, and other authentication attempts.\\n- - AuditD \\u2013 Tracks authentication events via PAM modules.\\n- - macOS Unified Logs \\u2013 `/var/db/diagnostics` captures authentication failures.\\n-- Cloud Authentication Logs\\n- - Azure AD Logs\\n- - Sign-in Logs \\u2013 Tracks authentication attempts, MFA challenges, and conditional access failures.\\n- - Audit Logs \\u2013 Captures authentication-related configuration changes.\\n- - Microsoft Graph API \\u2013 Provides real-time sign-in analytics.\\n- - Google Workspace & Office 365\\n- - Google Admin Console \\u2013 `User Login Report` tracks login attempts and failures.\\n- - Office 365 Unified Audit Logs \\u2013 Captures logins across Exchange, SharePoint, and Teams.\\n- - AWS CloudTrail & IAM\\n- - Tracks authentication via `AWS IAM AuthenticateUser` and `sts:GetSessionToken`.\\n- - Logs failed authentications to AWS Management Console and API requests.\\n-- Container Authentication Monitoring\\n- - Kubernetes Authentication Logs\\n- - kubectl audit logs \\u2013 Captures authentication attempts for service accounts and admin users.\\n- - Azure Kubernetes Service (AKS) and Google Kubernetes Engine (GKE) \\u2013 Logs IAM authentication events.\"}, \"root['x_mitre_log_sources'][12]['name']\": {\"new_value\": \"m365:signinlogs\", \"old_value\": \"m365:signin\"}, \"root['x_mitre_log_sources'][15]['channel']\": {\"new_value\": \"EventCode=4776, 4625\", \"old_value\": \"EventCode=4769,1200,1202\", \"new_path\": \"root['x_mitre_log_sources'][52]['channel']\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][15]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4769, 1200, 1202\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][52]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4624, 4625\"}, \"root['x_mitre_log_sources'][70]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4625, 4624\"}, \"root['x_mitre_log_sources'][91]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"4624, 4625\"}, \"root['x_mitre_log_sources'][101]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventID=4625\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1An attempt (successful and failed login attempts) by a user,t1An attempt (successful and failed login attempts) by a user,
> service, or application to gain access to a network, system> service, or application to gain access to a network, system
>, or cloud-based resource. This typically involves credentia>, or cloud-based resource. This typically involves credentia
>ls such as passwords, tokens, multi-factor authentication (M>ls such as passwords, tokens, multi-factor authentication (M
>FA), or biometric validation.  *Data Collection Measures:*  >FA), or biometric validation.
>- Host-Based Authentication Logs     - Windows Event Logs    
>      - Event ID 4776 \u2013 NTLM authentication attempt.         
> - Event ID 4624 \u2013 Successful user logon.         - Event ID 
> 4625 \u2013 Failed authentication attempt.         - Event ID 46 
>48 \u2013 Explicit logon with alternate credentials.     - Linux/ 
>macOS Authentication Logs         - `/var/log/auth.log`, `/v 
>ar/log/secure` \u2013 Logs SSH, sudo, and other authentication at 
>tempts.         - AuditD \u2013 Tracks authentication events via  
>PAM modules.         - macOS Unified Logs \u2013 `/var/db/diagnos 
>tics` captures authentication failures. - Cloud Authenticati 
>on Logs     - Azure AD Logs         - Sign-in Logs \u2013 Tracks  
>authentication attempts, MFA challenges, and conditional acc 
>ess failures.         - Audit Logs \u2013 Captures authentication 
>-related configuration changes.         - Microsoft Graph AP 
>I \u2013 Provides real-time sign-in analytics.     - Google Works 
>pace & Office 365         - Google Admin Console \u2013 `User Log 
>in Report` tracks login attempts and failures.         - Off 
>ice 365 Unified Audit Logs \u2013 Captures logins across Exchange 
>, SharePoint, and Teams.     - AWS CloudTrail & IAM          
>- Tracks authentication via `AWS IAM AuthenticateUser` and ` 
>sts:GetSessionToken`.         - Logs failed authentications  
>to AWS Management Console and API requests. - Container Auth 
>entication Monitoring     - Kubernetes Authentication Logs   
>       - kubectl audit logs \u2013 Captures authentication attemp 
>ts for service accounts and admin users.         - Azure Kub 
>ernetes Service (AKS) and Google Kubernetes Engine (GKE) \u2013 L 
>ogs IAM authentication events. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--deb22295-7e37-4a3b-ac6f-c86666fbe63d", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.271000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0014", + "external_id": "DC0014" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "User Account Creation", + "description": "The initial establishment of a new user, service, or machine account within an operating system, cloud environment, or identity management system.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "WinEventLog:Security", + "channel": "EventCode=4720" + }, + { + "name": "azure:audit", + "channel": "Add user" + }, + { + "name": "AWS:CloudTrail", + "channel": "CreateUser" + }, + { + "name": "saas:zoom", + "channel": "New user created" + }, + { + "name": "saas:slack", + "channel": "admin.user.create" + }, + { + "name": "m365:unified", + "channel": "Add user" + }, + { + "name": "auditd:SYSCALL", + "channel": "adduser" + }, + { + "name": "docker:daemon", + "channel": "ExecCreate + usermod or useradd" + }, + { + "name": "auditd:SYSCALL", + "channel": "useradd or adduser executed" + }, + { + "name": "networkdevice:syslog", + "channel": "username privilege " + }, + { + "name": "saas:okta", + "channel": "user.lifecycle.create" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:34.784000+00:00\"}, \"root['description']\": {\"new_value\": \"The initial establishment of a new user, service, or machine account within an operating system, cloud environment, or identity management system.\", \"old_value\": \"The initial establishment of a new user, service, or machine account within an operating system, cloud environment, or identity management system.\\n\\n*Data Collection Measures:*\\n\\n- Host-Based Logging\\n - Windows Event Logs\\n - Event ID 4720 \\u2013 A new user account was created.\\n - Event ID 4732/4735 \\u2013 A user was added to a privileged group.\\n - Event ID 4798 \\u2013 Enumeration of user accounts.\\n - Linux/macOS Authentication Logs\\n - `/var/log/auth.log`, `/var/log/secure` \\u2013 Logs `useradd`, `adduser`, `passwd`, and `groupmod` activities.\\n - AuditD \\u2013 Detects new account creation via PAM (`useradd`, `usermod`).\\n - OSQuery \\u2013 The `users` table tracks newly created accounts.\\n- Cloud-Based Logging\\n - Azure AD Logs\\n - Azure AD Audit Logs \\u2013 Tracks new user and service account creation.\\n - Azure Graph API \\u2013 Provides logs on new account provisioning.\\n - AWS IAM & CloudTrail Logs\\n - CreateUser, CreateRole \\u2013 Tracks new IAM user creation.\\n - AttachRolePolicy \\u2013 Identifies privilege escalation via account creation.\\n - Google Workspace & Office 365 Logs\\n - Google Admin Console \\u2013 Logs user creation in User Accounts API.\\n - Microsoft 365 Unified Audit Log \\u2013 Tracks new account provisioning.\\n- Container & Network Account Creation Logs\\n - Kubernetes Account Creation Logs\\n - kubectl audit logs \\u2013 Detects new service account provisioning.\\n - GKE/Azure AKS Logs \\u2013 Track new container service accounts.\", \"diff\": \"--- \\n+++ \\n@@ -1,27 +1 @@\\n The initial establishment of a new user, service, or machine account within an operating system, cloud environment, or identity management system.\\n-\\n-*Data Collection Measures:*\\n-\\n-- Host-Based Logging\\n- - Windows Event Logs\\n- - Event ID 4720 \\u2013 A new user account was created.\\n- - Event ID 4732/4735 \\u2013 A user was added to a privileged group.\\n- - Event ID 4798 \\u2013 Enumeration of user accounts.\\n- - Linux/macOS Authentication Logs\\n- - `/var/log/auth.log`, `/var/log/secure` \\u2013 Logs `useradd`, `adduser`, `passwd`, and `groupmod` activities.\\n- - AuditD \\u2013 Detects new account creation via PAM (`useradd`, `usermod`).\\n- - OSQuery \\u2013 The `users` table tracks newly created accounts.\\n-- Cloud-Based Logging\\n- - Azure AD Logs\\n- - Azure AD Audit Logs \\u2013 Tracks new user and service account creation.\\n- - Azure Graph API \\u2013 Provides logs on new account provisioning.\\n- - AWS IAM & CloudTrail Logs\\n- - CreateUser, CreateRole \\u2013 Tracks new IAM user creation.\\n- - AttachRolePolicy \\u2013 Identifies privilege escalation via account creation.\\n- - Google Workspace & Office 365 Logs\\n- - Google Admin Console \\u2013 Logs user creation in User Accounts API.\\n- - Microsoft 365 Unified Audit Log \\u2013 Tracks new account provisioning.\\n-- Container & Network Account Creation Logs\\n- - Kubernetes Account Creation Logs\\n- - kubectl audit logs \\u2013 Detects new service account provisioning.\\n- - GKE/Azure AKS Logs \\u2013 Track new container service accounts.\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][6]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4720, EventCode=4781\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1The initial establishment of a new user, service, or machinet1The initial establishment of a new user, service, or machine
> account within an operating system, cloud environment, or i> account within an operating system, cloud environment, or i
>dentity management system.  *Data Collection Measures:*  - H>dentity management system.
>ost-Based Logging     - Windows Event Logs         - Event I 
>D 4720 \u2013 A new user account was created.         - Event ID  
>4732/4735 \u2013 A user was added to a privileged group.          
>- Event ID 4798 \u2013 Enumeration of user accounts.     - Linux/ 
>macOS Authentication Logs         - `/var/log/auth.log`, `/v 
>ar/log/secure` \u2013 Logs `useradd`, `adduser`, `passwd`, and `g 
>roupmod` activities.         - AuditD \u2013 Detects new account  
>creation via PAM (`useradd`, `usermod`).         - OSQuery \u2013 
> The `users` table tracks newly created accounts. - Cloud-Ba 
>sed Logging     - Azure AD Logs         - Azure AD Audit Log 
>s \u2013 Tracks new user and service account creation.         -  
>Azure Graph API \u2013 Provides logs on new account provisioning. 
>     - AWS IAM & CloudTrail Logs         - CreateUser, Creat 
>eRole \u2013 Tracks new IAM user creation.         - AttachRolePo 
>licy \u2013 Identifies privilege escalation via account creation. 
>     - Google Workspace & Office 365 Logs         - Google A 
>dmin Console \u2013 Logs user creation in User Accounts API.      
>    - Microsoft 365 Unified Audit Log \u2013 Tracks new account p 
>rovisioning. - Container & Network Account Creation Logs     
> - Kubernetes Account Creation Logs         - kubectl audit  
>logs \u2013 Detects new service account provisioning.         - G 
>KE/Azure AKS Logs \u2013 Track new container service accounts. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--d6257b8e-869c-41c0-8731-fdca40858a91", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.271000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0009", + "external_id": "DC0009" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "User Account Deletion", + "description": "The removal of a user, service, or machine account from an operating system, cloud identity management system, or directory service.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "WinEventLog:Security", + "channel": "EventCode=4726, 4657" + }, + { + "name": "esxi:hostd", + "channel": "method=RemoveUser or esxcli system account remove invocation" + }, + { + "name": "m365:unified", + "channel": "Remove-Mailbox, Set-Mailbox" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:36.864000+00:00\"}, \"root['description']\": {\"new_value\": \"The removal of a user, service, or machine account from an operating system, cloud identity management system, or directory service.\", \"old_value\": \"The removal of a user, service, or machine account from an operating system, cloud identity management system, or directory service.\\n\\n*Data Collection Measures:*\\n\\n- Host-Based Logging\\n - Windows Event Logs\\n - Event ID 4726 \\u2013 A user account was deleted.\\n - Event ID 4733/4735 \\u2013 A user was removed from a privileged group.\\n - Event ID 1102 \\u2013 Security log was cleared (potential cover-up).\\n - Linux/macOS Authentication Logs\\n - `/var/log/auth.log`, `/var/log/secure` \\u2013 Logs `userdel`, `deluser`, `passwd -l`.\\n - AuditD \\u2013 Tracks account deletions via PAM events (`userdel`).\\n - OSQuery \\u2013 The `users` table can detect account removal.\\n- Cloud-Based Logging\\n - Azure AD Logs\\n - Azure AD Audit Logs \\u2013 Tracks user and service account deletions.\\n - Azure Graph API \\u2013 Monitors identity changes.\\n - AWS IAM & CloudTrail Logs\\n - `DeleteUser`, `DeleteRole` \\u2013 Tracks IAM user deletion.\\n - DetachRolePolicy \\u2013 Identifies privilege revocation before deletion.\\n - Google Workspace & Office 365 Logs\\n - Google Admin Console \\u2013 Logs user removal activities.\\n - Microsoft 365 Unified Audit Log \\u2013 Captures deleted accounts in Active Directory.\\n- Container & Network Account Deletion Logs\\n - Kubernetes Service Account Deletion\\n - kubectl audit logs \\u2013 Detects when service accounts are removed from pods.\\n - GKE/Azure AKS Logs \\u2013 Track containerized identity removals.\", \"diff\": \"--- \\n+++ \\n@@ -1,27 +1 @@\\n The removal of a user, service, or machine account from an operating system, cloud identity management system, or directory service.\\n-\\n-*Data Collection Measures:*\\n-\\n-- Host-Based Logging\\n- - Windows Event Logs\\n- - Event ID 4726 \\u2013 A user account was deleted.\\n- - Event ID 4733/4735 \\u2013 A user was removed from a privileged group.\\n- - Event ID 1102 \\u2013 Security log was cleared (potential cover-up).\\n- - Linux/macOS Authentication Logs\\n- - `/var/log/auth.log`, `/var/log/secure` \\u2013 Logs `userdel`, `deluser`, `passwd -l`.\\n- - AuditD \\u2013 Tracks account deletions via PAM events (`userdel`).\\n- - OSQuery \\u2013 The `users` table can detect account removal.\\n-- Cloud-Based Logging\\n- - Azure AD Logs\\n- - Azure AD Audit Logs \\u2013 Tracks user and service account deletions.\\n- - Azure Graph API \\u2013 Monitors identity changes.\\n- - AWS IAM & CloudTrail Logs\\n- - `DeleteUser`, `DeleteRole` \\u2013 Tracks IAM user deletion.\\n- - DetachRolePolicy \\u2013 Identifies privilege revocation before deletion.\\n- - Google Workspace & Office 365 Logs\\n- - Google Admin Console \\u2013 Logs user removal activities.\\n- - Microsoft 365 Unified Audit Log \\u2013 Captures deleted accounts in Active Directory.\\n-- Container & Network Account Deletion Logs\\n- - Kubernetes Service Account Deletion\\n- - kubectl audit logs \\u2013 Detects when service accounts are removed from pods.\\n- - GKE/Azure AKS Logs \\u2013 Track containerized identity removals.\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1The removal of a user, service, or machine account from an ot1The removal of a user, service, or machine account from an o
>perating system, cloud identity management system, or direct>perating system, cloud identity management system, or direct
>ory service.  *Data Collection Measures:*  - Host-Based Logg>ory service.
>ing     - Windows Event Logs         - Event ID 4726 \u2013 A use 
>r account was deleted.         - Event ID 4733/4735 \u2013 A user 
> was removed from a privileged group.         - Event ID 110 
>2 \u2013 Security log was cleared (potential cover-up).     - Lin 
>ux/macOS Authentication Logs         - `/var/log/auth.log`,  
>`/var/log/secure` \u2013 Logs `userdel`, `deluser`, `passwd -l`.  
>        - AuditD \u2013 Tracks account deletions via PAM events ( 
>`userdel`).         - OSQuery \u2013 The `users` table can detect 
> account removal. - Cloud-Based Logging     - Azure AD Logs  
>        - Azure AD Audit Logs \u2013 Tracks user and service acco 
>unt deletions.         - Azure Graph API \u2013 Monitors identity 
> changes.     - AWS IAM & CloudTrail Logs         - `DeleteU 
>ser`, `DeleteRole` \u2013 Tracks IAM user deletion.         - Det 
>achRolePolicy \u2013 Identifies privilege revocation before delet 
>ion.     - Google Workspace & Office 365 Logs         - Goog 
>le Admin Console \u2013 Logs user removal activities.         - M 
>icrosoft 365 Unified Audit Log \u2013 Captures deleted accounts i 
>n Active Directory. - Container & Network Account Deletion L 
>ogs     - Kubernetes Service Account Deletion         - kube 
>ctl audit logs \u2013 Detects when service accounts are removed f 
>rom pods.         - GKE/Azure AKS Logs \u2013 Track containerized 
> identity removals. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--d27b0089-2c39-4b6c-84ff-303e48657e77", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.271000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0010", + "external_id": "DC0010" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "User Account Modification", + "description": "Changes made to an existing user, service, or machine account, including alterations to attributes, permissions, roles, authentication methods, or group memberships.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "azure:audit", + "channel": "Operation IN (\"Add device\", \"Add registered users to device\", \"Add registered owner to device\")" + }, + { + "name": "linux:syslog", + "channel": "sudo or su access prior to content change" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4738, 4728, 4670" + }, + { + "name": "auditd:SYSCALL", + "channel": "usermod, groupmod, passwd" + }, + { + "name": "macos:unifiedlog", + "channel": "com.apple.accountsd, com.apple.opendirectoryd" + }, + { + "name": "saas:okta", + "channel": "User Attribute Modified / Role Assignment Changed" + }, + { + "name": "m365:unified", + "channel": "Admin Activity > Role Change or Sharing Change" + }, + { + "name": "gcp:audit", + "channel": "Admin Activity > Role Change or Sharing Change" + }, + { + "name": "m365:unified", + "channel": "Set-ADUser OR Set-ADAccountControl" + }, + { + "name": "AWS:CloudTrail", + "channel": "UpdateLoginProfile" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4723, 4724, 4740" + }, + { + "name": "saas:okta", + "channel": "user.lifecycle.delete, user.account.lock" + }, + { + "name": "m365:unified", + "channel": "User excluded from MFA or MFA method registered" + }, + { + "name": "saas:zoom", + "channel": "DisableMFA or RegisterNewFactor" + }, + { + "name": "AWS:CloudTrail", + "channel": "AttachUserPolicy, CreatePolicyVersion, PutRolePolicy" + }, + { + "name": "gcp:audit", + "channel": "google.iam.admin.v1.RoleAssignment" + }, + { + "name": "m365:audit", + "channel": "Add member to role, Add app role assignment" + }, + { + "name": "Okta:SystemLog", + "channel": "user.account.privilege.grant" + }, + { + "name": "m365:unified", + "channel": "Add member to role, Set-Mailbox" + }, + { + "name": "m365:unified", + "channel": "Set-MailboxAuditBypassAssociation or disabling Advanced Auditing" + }, + { + "name": "m365:unified", + "channel": "New agent registration by non-admin user" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4704" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4728, 4729, 4732, 4733, 4756, 4757" + }, + { + "name": "auditd:SYSCALL", + "channel": "SYSCALL for usermod or /etc/group file modification" + }, + { + "name": "macos:unifiedlog", + "channel": "Process execution or directory service changes" + }, + { + "name": "azure:policy", + "channel": "DisableMfaPolicy or change to ConditionalAccess rules" + }, + { + "name": "azure:audit", + "channel": "Add member to role" + }, + { + "name": "AWS:CloudTrail", + "channel": "AttachUserPolicy" + }, + { + "name": "AWS:CloudTrail", + "channel": "CreateAccessKey" + }, + { + "name": "azure:signinlogs", + "channel": "unusual role assumption or elevation path" + }, + { + "name": "saas:okta", + "channel": "admin role granted outside approved workflows" + }, + { + "name": "AWS:CloudTrail", + "channel": "role privilege expansion detected" + }, + { + "name": "m365:unified", + "channel": "Add-MailboxPermission, UpdateFolderPermissions" + }, + { + "name": "gcp:audit", + "channel": "Set Gmail Delegation" + }, + { + "name": "auditd:SYSCALL", + "channel": "usermod, or account rename system calls" + }, + { + "name": "azure:audit", + "channel": "Rename user" + }, + { + "name": "m365:unified", + "channel": "Set-Mailbox, Set-InboxRule, Set-MailboxFolderPermission" + }, + { + "name": "azure:audit", + "channel": "Add service principal credentials, app password added, app role assignment" + }, + { + "name": "gcp:audit", + "channel": "iam.serviceAccounts.keys.create, os-login.sshPublicKeys.add" + }, + { + "name": "gcp:audit", + "channel": "API Key Created, OAuth Client Registered" + }, + { + "name": "kubernetes:audit", + "channel": "create or update events for RoleBinding or ClusterRoleBinding objects" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:36.735000+00:00\"}, \"root['description']\": {\"new_value\": \"Changes made to an existing user, service, or machine account, including alterations to attributes, permissions, roles, authentication methods, or group memberships.\", \"old_value\": \"Changes made to an existing user, service, or machine account, including alterations to attributes, permissions, roles, authentication methods, or group memberships.\\n\\n*Data Collection Measures:*\\n\\n- Host-Based Logging\\n - Windows Event Logs\\n - Event ID 4738 \\u2013 A user account was changed.\\n - Event ID 4725 \\u2013 A user account was disabled.\\n - Event ID 4724 \\u2013 An attempt was made to reset an account's password.\\n - Event ID 4767 \\u2013 A user account was unlocked.\\n - Linux/macOS Authentication Logs\\n - `/var/log/auth.log`, `/var/log/secure` \\u2013 Tracks account modifications (`usermod`, `chage`, `passwd`).\\n - AuditD \\u2013 Monitors account changes (`useradd`, `usermod`, `gpasswd`).\\n - OSQuery \\u2013 Queries the `users` table for recent modifications.\\n- Cloud-Based Logging\\n - Azure AD Logs\\n - Azure AD Audit Logs \\u2013 Tracks modifications to users and security groups.\\n - Azure Graph API \\u2013 Captures changes to authentication policies and MFA settings.\\n - AWS IAM & CloudTrail Logs\\n - `ModifyUser`, `UpdateLoginProfile` \\u2013 Captures changes to IAM user attributes.\\n - `AttachUserPolicy`, `AddUserToGroup` \\u2013 Detects policy and group modifications.\\n - Google Workspace & Office 365 Logs\\n - Google Admin Console \\u2013 Logs account changes, role modifications, and group membership updates.\\n - Microsoft 365 Unified Audit Log \\u2013 Captures modifications to security settings and privileged account changes.\\n- Container & Network Account Modification Logs\\n - Kubernetes Service Account Changes\\n - kubectl audit logs \\u2013 Detects service account modifications in Kubernetes clusters.\\n - GKE/Azure AKS Logs \\u2013 Monitors role and permission changes.\", \"diff\": \"--- \\n+++ \\n@@ -1,28 +1 @@\\n Changes made to an existing user, service, or machine account, including alterations to attributes, permissions, roles, authentication methods, or group memberships.\\n-\\n-*Data Collection Measures:*\\n-\\n-- Host-Based Logging\\n- - Windows Event Logs\\n- - Event ID 4738 \\u2013 A user account was changed.\\n- - Event ID 4725 \\u2013 A user account was disabled.\\n- - Event ID 4724 \\u2013 An attempt was made to reset an account's password.\\n- - Event ID 4767 \\u2013 A user account was unlocked.\\n- - Linux/macOS Authentication Logs\\n- - `/var/log/auth.log`, `/var/log/secure` \\u2013 Tracks account modifications (`usermod`, `chage`, `passwd`).\\n- - AuditD \\u2013 Monitors account changes (`useradd`, `usermod`, `gpasswd`).\\n- - OSQuery \\u2013 Queries the `users` table for recent modifications.\\n-- Cloud-Based Logging\\n- - Azure AD Logs\\n- - Azure AD Audit Logs \\u2013 Tracks modifications to users and security groups.\\n- - Azure Graph API \\u2013 Captures changes to authentication policies and MFA settings.\\n- - AWS IAM & CloudTrail Logs\\n- - `ModifyUser`, `UpdateLoginProfile` \\u2013 Captures changes to IAM user attributes.\\n- - `AttachUserPolicy`, `AddUserToGroup` \\u2013 Detects policy and group modifications.\\n- - Google Workspace & Office 365 Logs\\n- - Google Admin Console \\u2013 Logs account changes, role modifications, and group membership updates.\\n- - Microsoft 365 Unified Audit Log \\u2013 Captures modifications to security settings and privileged account changes.\\n-- Container & Network Account Modification Logs\\n- - Kubernetes Service Account Changes\\n- - kubectl audit logs \\u2013 Detects service account modifications in Kubernetes clusters.\\n- - GKE/Azure AKS Logs \\u2013 Monitors role and permission changes.\"}, \"root['x_mitre_log_sources'][11]['channel']\": {\"new_value\": \"EventCode=4723, 4724, 4740\", \"old_value\": \"EventCode=4723, 4724, 4726, 4740\", \"new_path\": \"root['x_mitre_log_sources'][10]['channel']\"}, \"root['x_mitre_log_sources'][30]['name']\": {\"new_value\": \"azure:signinlogs\", \"old_value\": \"azure:signinLogs\", \"new_path\": \"root['x_mitre_log_sources'][29]['name']\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][1]\": {\"name\": \"WinEventLog:DirectoryService\", \"channel\": \"EventID 5136\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Changes made to an existing user, service, or machine account1Changes made to an existing user, service, or machine accoun
>t, including alterations to attributes, permissions, roles, >t, including alterations to attributes, permissions, roles, 
>authentication methods, or group memberships.  *Data Collect>authentication methods, or group memberships.
>ion Measures:*  - Host-Based Logging     - Windows Event Log 
>s         - Event ID 4738 \u2013 A user account was changed.      
>    - Event ID 4725 \u2013 A user account was disabled.         - 
> Event ID 4724 \u2013 An attempt was made to reset an account's p 
>assword.         - Event ID 4767 \u2013 A user account was unlock 
>ed.     - Linux/macOS Authentication Logs         - `/var/lo 
>g/auth.log`, `/var/log/secure` \u2013 Tracks account modification 
>s (`usermod`, `chage`, `passwd`).         - AuditD \u2013 Monitor 
>s account changes (`useradd`, `usermod`, `gpasswd`).         
> - OSQuery \u2013 Queries the `users` table for recent modificati 
>ons. - Cloud-Based Logging     - Azure AD Logs         - Azu 
>re AD Audit Logs \u2013 Tracks modifications to users and securit 
>y groups.         - Azure Graph API \u2013 Captures changes to au 
>thentication policies and MFA settings.     - AWS IAM & Clou 
>dTrail Logs         - `ModifyUser`, `UpdateLoginProfile` \u2013 C 
>aptures changes to IAM user attributes.         - `AttachUse 
>rPolicy`, `AddUserToGroup` \u2013 Detects policy and group modifi 
>cations.     - Google Workspace & Office 365 Logs         -  
>Google Admin Console \u2013 Logs account changes, role modificati 
>ons, and group membership updates.         - Microsoft 365 U 
>nified Audit Log \u2013 Captures modifications to security settin 
>gs and privileged account changes. - Container & Network Acc 
>ount Modification Logs     - Kubernetes Service Account Chan 
>ges         - kubectl audit logs \u2013 Detects service account m 
>odifications in Kubernetes clusters.         - GKE/Azure AKS 
> Logs \u2013 Monitors role and permission changes. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--dad75cc7-5bae-4175-adb4-ca1962d8650e", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.275000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0097", + "external_id": "DC0097" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Volume Creation", + "description": "The initial provisioning of block storage volumes in cloud or on-prem environments, typically used for data storage, backup, or workload scaling.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "AWS:CloudTrail", + "channel": "CreateVolume" + }, + { + "name": "WinEventLog:Microsoft-Windows-VSS", + "channel": "Volume Shadow Copy Creation" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:39.832000+00:00\"}, \"root['description']\": {\"new_value\": \"The initial provisioning of block storage volumes in cloud or on-prem environments, typically used for data storage, backup, or workload scaling.\", \"old_value\": \"The initial provisioning of block storage volumes in cloud or on-prem environments, typically used for data storage, backup, or workload scaling.\\n\\n*Data Collection Measures:*\\n\\n- Cloud-Based Logging & Monitoring\\n - AWS CloudTrail\\n - `CreateVolume` \\u2013 Logs the creation of new Amazon Elastic Block Store (EBS) volumes.\\n - `RunInstances` \\u2013 Can be correlated to detect automatic volume provisioning.\\n - Azure Monitor & Log Analytics\\n - `Microsoft.Compute/disks/write` \\u2013 Captures creation of new managed/unmanaged disks.\\n - `Microsoft.Storage/storageAccounts/write` \\u2013 Detects creation of new Azure Blob Storage volumes.\\n - Google Cloud Logging (GCP)\\n - `compute.disks.insert` \\u2013 Tracks new persistent disk creation.\\n - `compute.instances.attachDisk` \\u2013 Logs attachment of a volume to a running VM.\\n - OpenStack Logs\\n - `volume.create` \\u2013 Captures new storage volume provisioning.\\n - `cinder.volume.create` \\u2013 Logs OpenStack Cinder block storage creation.\\n- Host-Based & SIEM Detection\\n - Linux/macOS System Logs\\n - `/var/log/syslog` & `/var/log/messages` \\u2013 Detects new mount points or attached storage.\\n - `dmesg | grep \\\"new disk\\\"` \\u2013 Identifies kernel messages for volume attachment.\\n - AuditD: Tracks `mkfs` (filesystem creation) for new volume provisioning.\\n - Windows Event Logs\\n - Event ID 1006 (Storage Management Events) \\u2013 Captures disk volume creation.\\n - Event ID 5145 (Object Access: File Share) \\u2013 Detects access to newly created storage shares.\", \"diff\": \"--- \\n+++ \\n@@ -1,25 +1 @@\\n The initial provisioning of block storage volumes in cloud or on-prem environments, typically used for data storage, backup, or workload scaling.\\n-\\n-*Data Collection Measures:*\\n-\\n-- Cloud-Based Logging & Monitoring\\n- - AWS CloudTrail\\n- - `CreateVolume` \\u2013 Logs the creation of new Amazon Elastic Block Store (EBS) volumes.\\n- - `RunInstances` \\u2013 Can be correlated to detect automatic volume provisioning.\\n- - Azure Monitor & Log Analytics\\n- - `Microsoft.Compute/disks/write` \\u2013 Captures creation of new managed/unmanaged disks.\\n- - `Microsoft.Storage/storageAccounts/write` \\u2013 Detects creation of new Azure Blob Storage volumes.\\n- - Google Cloud Logging (GCP)\\n- - `compute.disks.insert` \\u2013 Tracks new persistent disk creation.\\n- - `compute.instances.attachDisk` \\u2013 Logs attachment of a volume to a running VM.\\n- - OpenStack Logs\\n- - `volume.create` \\u2013 Captures new storage volume provisioning.\\n- - `cinder.volume.create` \\u2013 Logs OpenStack Cinder block storage creation.\\n-- Host-Based & SIEM Detection\\n- - Linux/macOS System Logs\\n- - `/var/log/syslog` & `/var/log/messages` \\u2013 Detects new mount points or attached storage.\\n- - `dmesg | grep \\\"new disk\\\"` \\u2013 Identifies kernel messages for volume attachment.\\n- - AuditD: Tracks `mkfs` (filesystem creation) for new volume provisioning.\\n- - Windows Event Logs\\n- - Event ID 1006 (Storage Management Events) \\u2013 Captures disk volume creation.\\n- - Event ID 5145 (Object Access: File Share) \\u2013 Detects access to newly created storage shares.\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1The initial provisioning of block storage volumes in cloud ot1The initial provisioning of block storage volumes in cloud o
>r on-prem environments, typically used for data storage, bac>r on-prem environments, typically used for data storage, bac
>kup, or workload scaling.  *Data Collection Measures:*  - Cl>kup, or workload scaling.
>oud-Based Logging & Monitoring     - AWS CloudTrail          
>- `CreateVolume` \u2013 Logs the creation of new Amazon Elastic B 
>lock Store (EBS) volumes.         - `RunInstances` \u2013 Can be  
>correlated to detect automatic volume provisioning.     - Az 
>ure Monitor & Log Analytics         - `Microsoft.Compute/dis 
>ks/write` \u2013 Captures creation of new managed/unmanaged disks 
>.         - `Microsoft.Storage/storageAccounts/write` \u2013 Dete 
>cts creation of new Azure Blob Storage volumes.     - Google 
> Cloud Logging (GCP)         - `compute.disks.insert` \u2013 Trac 
>ks new persistent disk creation.         - `compute.instance 
>s.attachDisk` \u2013 Logs attachment of a volume to a running VM. 
>     - OpenStack Logs         - `volume.create` \u2013 Captures n 
>ew storage volume provisioning.         - `cinder.volume.cre 
>ate` \u2013 Logs OpenStack Cinder block storage creation. - Host- 
>Based & SIEM Detection     - Linux/macOS System Logs         
> - `/var/log/syslog` & `/var/log/messages` \u2013 Detects new mou 
>nt points or attached storage.         - `dmesg | grep \"new  
>disk\"` \u2013 Identifies kernel messages for volume attachment.   
>       - AuditD: Tracks `mkfs` (filesystem creation) for new 
> volume provisioning.     - Windows Event Logs         - Eve 
>nt ID 1006 (Storage Management Events) \u2013 Captures disk volum 
>e creation.         - Event ID 5145 (Object Access: File Sha 
>re) \u2013 Detects access to newly created storage shares. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--3acecdde-c327-4498-9bb8-33a2e63c6c57", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.275000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0098", + "external_id": "DC0098" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Volume Deletion", + "description": "The removal of a cloud-based or on-premise block storage volume. This action permanently deletes the allocated storage and may result in data loss if not backed up.\n\n*Data Collection Measures:*\n\n- Cloud Logging & APIs\n - AWS CloudTrail Logs\n - `eventName: DeleteVolume` (tracks volume deletions)\n - Azure Monitor Logs\n - `operationName: Microsoft.Compute/disks/delete`\n - `status: Success | Failure` (flag unauthorized delete attempts)\n - Google Cloud Audit Logs\n - `protoPayload.methodName: \"v1.compute.disks.delete\"`\n - `authenticationInfo.principalEmail` (identifies the user deleting the volume)\n- System & Host-Based Logging\n - Linux & macOS Logs:\n - `/var/log/syslog` or `/var/log/messages` for volume detach/deletion actions\n - Windows Event Logs:\n - Event ID 98 (Storage Class Memory)\n - Event ID 225 (Volume Removal Detected)\n - Event ID 12 (Disk Removal Notification)", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "esxi:vmkernel", + "channel": "file delete|datastore purge" + }, + { + "name": "AWS:CloudTrail", + "channel": "DeleteVolume" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:38.711000+00:00\"}, \"root['x_mitre_log_sources'][1]['channel']\": {\"new_value\": \"DeleteVolume\", \"old_value\": \"DeleteVolume, ModifyVolume\"}}}", + "previous_version": "2.0" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--0f72bf50-35b3-419d-ab95-70f9b6a818dd", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.275000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0100", + "external_id": "DC0100" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Volume Metadata", + "description": "Contextual data about a cloud volume and activity around it, such as id, type, state, and size", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Metadata", + "channel": "None" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:38.841000+00:00\"}, \"root['x_mitre_log_sources'][0]['name']\": {\"new_value\": \"Metadata\", \"old_value\": \"WinEventLog:Security\"}, \"root['x_mitre_log_sources'][0]['channel']\": {\"new_value\": \"None\", \"old_value\": \"4673, 4674\"}}}", + "previous_version": "2.0" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--05645013-2fed-4066-8bdc-626b2e201dd4", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.271000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0008", + "external_id": "DC0008" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "WMI Creation", + "description": "Initial construction of a WMI object, such as a filter, consumer, subscription, binding, or providers.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "WinEventLog:WMI", + "channel": "Creation or modification of __EventFilter, __FilterToConsumerBinding, or CommandLineEventConsumer" + }, + { + "name": "WinEventLog:WMI", + "channel": "EventCode=5857, 5858, 5860, 5861" + }, + { + "name": "WinEventLog:Application", + "channel": "WMI Object Creation Events" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:35.880000+00:00\"}, \"root['description']\": {\"new_value\": \"Initial construction of a WMI object, such as a filter, consumer, subscription, binding, or providers.\", \"old_value\": \"Initial construction of a WMI object, such as a filter, consumer, subscription, binding, or providers. \\n\\n*Data Collection Measures:*\\n\\n- Windows Security Event Logs:\\n - Event ID 5861 (WMI Permanent Event Subscription)\\n - Event ID 5860 (WMI Event Filter Activity)\\n - Event ID 5857 (WMI Event Consumer Activity)\\n- Sysmon Logs:\\n - Sysmon Event ID 19 \\u2013 WMI Event Filter Created\\n - Sysmon Event ID 20 \\u2013 WMI Event Consumer Created\\n - Sysmon Event ID 21 \\u2013 WMI Event Binding Created\\n- Endpoint Detection & Response (EDR)\\n - Detects WMI-based persistence techniques.\", \"diff\": \"--- \\n+++ \\n@@ -1,14 +1 @@\\n-Initial construction of a WMI object, such as a filter, consumer, subscription, binding, or providers. \\n-\\n-*Data Collection Measures:*\\n-\\n-- Windows Security Event Logs:\\n- - Event ID 5861 (WMI Permanent Event Subscription)\\n- - Event ID 5860 (WMI Event Filter Activity)\\n- - Event ID 5857 (WMI Event Consumer Activity)\\n-- Sysmon Logs:\\n- - Sysmon Event ID 19 \\u2013 WMI Event Filter Created\\n- - Sysmon Event ID 20 \\u2013 WMI Event Consumer Created\\n- - Sysmon Event ID 21 \\u2013 WMI Event Binding Created\\n-- Endpoint Detection & Response (EDR)\\n- - Detects WMI-based persistence techniques.\\n+Initial construction of a WMI object, such as a filter, consumer, subscription, binding, or providers.\"}, \"root['x_mitre_log_sources'][3]['channel']\": {\"new_value\": \"EventCode=5857, 5858, 5860, 5861\", \"old_value\": \"EventCode=5857, 5858\", \"new_path\": \"root['x_mitre_log_sources'][1]['channel']\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][1]\": {\"name\": \"WinEventLog:Microsoft-Windows-WMI-Activity/Operational\", \"channel\": \"EventCode=5861\"}, \"root['x_mitre_log_sources'][4]\": {\"name\": \"WinEventLog:Microsoft-Windows-WMI-Activity/Operational\", \"channel\": \"EventCode=5857, 5860, 5861\"}, \"root['x_mitre_log_sources'][5]\": {\"name\": \"WinEventLog:WMI\", \"channel\": \"EventCode=5857, 5860, 5861\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Initial construction of a WMI object, such as a filter, const1Initial construction of a WMI object, such as a filter, cons
>umer, subscription, binding, or providers.   *Data Collectio>umer, subscription, binding, or providers.
>n Measures:*  - Windows Security Event Logs:     - Event ID  
>5861 (WMI Permanent Event Subscription)     - Event ID 5860  
>(WMI Event Filter Activity)     - Event ID 5857 (WMI Event C 
>onsumer Activity) - Sysmon Logs:     - Sysmon Event ID 19 \u2013  
>WMI Event Filter Created     - Sysmon Event ID 20 \u2013 WMI Even 
>t Consumer Created     - Sysmon Event ID 21 \u2013 WMI Event Bind 
>ing Created - Endpoint Detection & Response (EDR)     - Dete 
>cts WMI-based persistence techniques. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--5f7c9def-0ddf-423b-b1f8-fb2ddeed0ce3", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.271000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0006", + "external_id": "DC0006" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Web Credential Creation", + "description": "Initial construction of new web credential material (ex: Windows EID 1200 or 4769)", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "WinEventLog:ADFS", + "channel": "Token issuance events showing anomalous claims or issuers" + }, + { + "name": "AWS:CloudTrail", + "channel": "AssumeRole, GetFederationToken API calls by unusual or new entities" + }, + { + "name": "azure:signinlogs", + "channel": "SAML/OIDC tokens issued without corresponding MFA or password validation" + }, + { + "name": "m365:unified", + "channel": "Session creation without MFA or login event" + }, + { + "name": "m365:oauth", + "channel": "OAuth grants or tokens issued without expected user consent" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:38.777000+00:00\"}, \"root['x_mitre_log_sources'][2]['name']\": {\"new_value\": \"azure:signinlogs\", \"old_value\": \"azure:signinLogs\"}}}", + "previous_version": "2.0" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--ff93f688-d7a4-49cf-9c79-a14454da8428", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.271000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0007", + "external_id": "DC0007" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Web Credential Usage", + "description": "An attempt by a user to gain access to a network or computing resource by providing web credentials (ex: Windows EID 1202)", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "AWS:CloudTrail", + "channel": "SessionToken used without preceding MFA or login event" + }, + { + "name": "m365:unified", + "channel": "SessionId reused from different device/browser fingerprint" + }, + { + "name": "AWS:CloudTrail", + "channel": "AssumeRoleWithSAML" + }, + { + "name": "saas:access", + "channel": "SAML token accepted without preceding login challenge" + }, + { + "name": "m365:exchange", + "channel": "Mailbox access using SAML token without corresponding MFA event" + }, + { + "name": "AWS:CloudTrail", + "channel": "GetSessionToken, AssumeRoleWithWebIdentity" + }, + { + "name": "macos:unifiedlog", + "channel": "New session initiated using cookies without normal MFA or password validation" + }, + { + "name": "m365:unified", + "channel": "Session activity without correlated login event" + }, + { + "name": "AWS:CloudTrail", + "channel": "AssumeRole, GetFederationToken, GetSessionToken" + }, + { + "name": "azure:signinlogs", + "channel": "TokenIssued, RefreshTokenUsed" + }, + { + "name": "saas:googleworkspace", + "channel": "OAuthTokenGranted, APIRequest" + }, + { + "name": "m365:unified", + "channel": "OAuthTokenIssued, FileAccessed, MailItemsAccessed" + }, + { + "name": "kubernetes:apiserver", + "channel": "serviceAccount token used in API requests not tied to workload identity" + }, + { + "name": "NSM:Connections", + "channel": "Pre-authentication keys generated or token signing anomalies" + }, + { + "name": "macos:unifiedlog", + "channel": "Web sessions initiated with newly forged tokens" + }, + { + "name": "saas:auth", + "channel": "API requests made with tokens not associated with expected user logins" + }, + { + "name": "azure:signinlogs", + "channel": "TokenIssuanceStart, TokenIssuanceSuccess" + }, + { + "name": "saas:googleworkspace", + "channel": "access_token issued" + }, + { + "name": "m365:unified", + "channel": "TokenIssued, FileAccessed" + }, + { + "name": "AWS:CloudTrail", + "channel": "GetCallerIdentity" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:37.480000+00:00\"}, \"root['x_mitre_log_sources'][16]['name']\": {\"new_value\": \"azure:signinlogs\", \"old_value\": \"azure:signinLogs\"}}}", + "previous_version": "2.0" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--ed0dd8aa-1677-4551-bb7d-8da767617e1b", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.273000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0050", + "external_id": "DC0050" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Windows Registry Key Access", + "description": "The action of opening a specific Windows Registry key, typically to read its associated value. This activity can be used for system configuration, application settings retrieval, and security policies.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4657" + }, + { + "name": "EDR:hunting", + "channel": "Behavioral rule for registry enumeration under credential-related paths" + }, + { + "name": "Autoruns:RegistryScan", + "channel": "Enumerate Winlogon subkeys for unknown or unsigned binaries" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:39.242000+00:00\"}, \"root['description']\": {\"new_value\": \"The action of opening a specific Windows Registry key, typically to read its associated value. This activity can be used for system configuration, application settings retrieval, and security policies.\", \"old_value\": \"The action of opening a specific Windows Registry key, typically to read its associated value. This activity can be used for system configuration, application settings retrieval, and security policies.\\n\\n*Data Collection Measures:*\\n\\n- Windows Event Logs\\n - Event ID 4656 - Handle to an Object was Requested: Logs attempts to open registry keys.\\n - Event ID 4663 - An Object was Accessed: Captures read/write operations on registry keys.\\n - Event ID 4657 - Registry Value Modification: Useful for detecting changes to registry keys after being accessed.\\n- Sysmon\\n - Sysmon Event ID 13 - Registry Value Set: Captures modifications to existing registry keys.\\n- Endpoint Detection and Response (EDR) Solutions\\n - Provide telemetry on registry key access activities, especially when linked to suspicious processes.\", \"diff\": \"--- \\n+++ \\n@@ -1,12 +1 @@\\n The action of opening a specific Windows Registry key, typically to read its associated value. This activity can be used for system configuration, application settings retrieval, and security policies.\\n-\\n-*Data Collection Measures:*\\n-\\n-- Windows Event Logs\\n- - Event ID 4656 - Handle to an Object was Requested: Logs attempts to open registry keys.\\n- - Event ID 4663 - An Object was Accessed: Captures read/write operations on registry keys.\\n- - Event ID 4657 - Registry Value Modification: Useful for detecting changes to registry keys after being accessed.\\n-- Sysmon\\n- - Sysmon Event ID 13 - Registry Value Set: Captures modifications to existing registry keys.\\n-- Endpoint Detection and Response (EDR) Solutions\\n- - Provide telemetry on registry key access activities, especially when linked to suspicious processes.\"}, \"root['x_mitre_log_sources'][0]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4656\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1The action of opening a specific Windows Registry key, typict1The action of opening a specific Windows Registry key, typic
>ally to read its associated value. This activity can be used>ally to read its associated value. This activity can be used
> for system configuration, application settings retrieval, a> for system configuration, application settings retrieval, a
>nd security policies.  *Data Collection Measures:*  - Window>nd security policies.
>s Event Logs     - Event ID 4656 - Handle to an Object was R 
>equested: Logs attempts to open registry keys.     - Event I 
>D 4663 - An Object was Accessed: Captures read/write operati 
>ons on registry keys.     - Event ID 4657 - Registry Value M 
>odification: Useful for detecting changes to registry keys a 
>fter being accessed. - Sysmon     - Sysmon Event ID 13 - Reg 
>istry Value Set: Captures modifications to existing registry 
> keys. - Endpoint Detection and Response (EDR) Solutions     
> - Provide telemetry on registry key access activities, espe 
>cially when linked to suspicious processes. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--7f70fae7-a68d-4730-a83a-f260b9606129", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.273000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0056", + "external_id": "DC0056" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Windows Registry Key Creation", + "description": "Initial construction of a new registry key within the Windows operating system. ", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "WinEventLog:Sysmon", + "channel": "EventCode=12" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:37.143000+00:00\"}, \"root['description']\": {\"new_value\": \"Initial construction of a new registry key within the Windows operating system. \", \"old_value\": \"Initial construction of a new registry key within the Windows operating system. \\n\\n*Data Collection Measures:* \\n\\n- Windows Event Logs\\n - Event ID 4656 - Registry Object Handle Requested: Tracks registry key access, including newly created keys.\\n - Event ID 4657 - Registry Value Modification: Detects modifications to an existing registry key after creation.\\n- Sysmon (System Monitor) for Windows\\n - Sysmon Event ID 12 - Registry Key Created: Logs when a new registry key is created.\\n\", \"diff\": \"--- \\n+++ \\n@@ -1,9 +1 @@\\n Initial construction of a new registry key within the Windows operating system. \\n-\\n-*Data Collection Measures:* \\n-\\n-- Windows Event Logs\\n- - Event ID 4656 - Registry Object Handle Requested: Tracks registry key access, including newly created keys.\\n- - Event ID 4657 - Registry Value Modification: Detects modifications to an existing registry key after creation.\\n-- Sysmon (System Monitor) for Windows\\n- - Sysmon Event ID 12 - Registry Key Created: Logs when a new registry key is created.\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Initial construction of a new registry key within the Windowt1Initial construction of a new registry key within the Window
>s operating system.   *Data Collection Measures:*   - Window>s operating system. 
>s Event Logs     - Event ID 4656 - Registry Object Handle Re 
>quested: Tracks registry key access, including newly created 
> keys.     - Event ID 4657 - Registry Value Modification: De 
>tects modifications to an existing registry key after creati 
>on. - Sysmon (System Monitor) for Windows     - Sysmon Event 
> ID 12 - Registry Key Created: Logs when a new registry key  
>is created.  
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.273000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0063", + "external_id": "DC0063" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Windows Registry Key Modification", + "description": "Changes made to an existing registry key or its values. These modifications can include altering permissions, modifying stored data, or updating configuration settings.\n\n*Data Collection Measures:*\n\n- Windows Event Logs\n - Event ID 4657 - Registry Value Modified: Logs changes to registry values, including modifications to startup entries, security settings, or system configurations.\n- Sysmon (System Monitor) for Windows\n - Sysmon Event ID 13 - Registry Value Set: Captures changes to specific registry values.\n - Sysmon Event ID 14 - Registry Key & Value Renamed: Logs renaming of registry keys, which may indicate evasion attempts.\n- Endpoint Detection and Response (EDR) Solutions\n - Monitor registry modifications for suspicious behavior.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Windows Registry", + "channel": "None" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4657" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "StubPath value written under HKLM\\SOFTWARE\\Microsoft\\Active Setup\\Installed Components" + }, + { + "name": "m365:unified", + "channel": "MacroSecuritySettingsChanged or SafeModeDisabled" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + }, + { + "name": "WinEventLog:Security", + "channel": "modification to Winlogon registry keys such as Shell, Notify, or Userinit" + }, + { + "name": "WinEventLog:Security", + "channel": "Registry key modification HKLM\\Software\\Policies\\Microsoft\\Windows NT\\DNSClient\\EnableMulticast" + }, + { + "name": "macos:unifiedlog", + "channel": "g_CiOptions modification or SIP state change" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "Autoruns reports DLLs in AppInit_DLLs key" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_data_source_ref": "", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-22 18:34:46.572000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/datacomponents/DC0063\", \"old_value\": \"https://attack.mitre.org/data-components/DC0063\"}, \"root['x_mitre_log_sources'][3]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\", \"new_path\": \"root['x_mitre_log_sources'][2]['channel']\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][1]\": {\"name\": \"WinEventLog:Sysmon\", \"channel\": \"EventCode=13\"}, \"root['x_mitre_log_sources'][4]\": {\"name\": \"WinEventLog:Sysmon\", \"channel\": \"EventCode=14\"}, \"root['x_mitre_log_sources'][5]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4670\"}}}", + "previous_version": "2.0" + } + ], + "revocations": [], + "deprecations": [], + "deletions": [] + }, + "detectionstrategies": { + "additions": [], + "major_version_changes": [], + "minor_version_changes": [], + "other_version_changes": [], + "patches": [ + { + "type": "x-mitre-detection-strategy", + "id": "x-mitre-detection-strategy--7c1262bb-c0d1-4e0c-bab8-a232f7bed9d5", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-23 17:50:38.555000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0897", + "external_id": "DET0897" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Detection of Selective Exclusion", + "x_mitre_analytic_refs": [ + "x-mitre-analytic--098f0607-df17-4291-a1b1-a8e3374c075a" + ], + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-23 20:53:44.184000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/detectionstrategies/DET0897\", \"old_value\": \"https://attack.mitre.org/detection-strategies/DET0897\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-detection-strategy", + "id": "x-mitre-detection-strategy--ad21a251-e824-4368-a04c-8a480ee653cc", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-23 17:54:46.514000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0898", + "external_id": "DET0898" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Detection of Spoofed User-Agent", + "x_mitre_analytic_refs": [ + "x-mitre-analytic--b73489af-2e95-4f41-b82e-327a84da2a1d", + "x-mitre-analytic--acabb18b-e2d6-4531-92bb-4165f0a16595", + "x-mitre-analytic--29ca0e06-e848-44cd-821a-24576276a8af" + ], + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-23 19:55:18.990000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/detectionstrategies/DET0898\", \"old_value\": \"https://attack.mitre.org/detection-strategies/DET0898\"}}}", + "previous_version": "1.0" + } + ], + "revocations": [], + "deprecations": [], + "deletions": [] + }, + "analytics": { + "additions": [], + "major_version_changes": [], + "minor_version_changes": [], + "other_version_changes": [], + "patches": [ + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--f4af0b1b-db51-4266-8b02-2cdfcb191f60", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0001#AN0001", + "external_id": "AN0001" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0001", + "description": "Detects access attempts to cloud instance metadata endpoints (e.g., 169.254.169.254) from virtual machines or containerized workloads. This includes both direct access and SSRF exploitation patterns.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "AWS:VPCFlowLogs", + "channel": "Outbound connection to 169.254.169.254 from EC2 workload" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--b33d36e3-d7ea-4895-8eed-19a08a8f7c4f", + "name": "AWS:CloudTrail", + "channel": "GetInstanceIdentityDocument" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "ebpf:syscalls", + "channel": "Process within container accesses link-local address 169.254.169.254" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Adjust temporal window for correlation of access attempts and SSRF triggers" + }, + { + "field": "UserContext", + "description": "Tune based on expected roles that access metadata APIs (e.g., root, service accounts)" + }, + { + "field": "RequestHeaderMatch", + "description": "Customize detection for HTTP Host headers indicating SSRF" + } + ], + "x_mitre_platforms": [ + "IaaS" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['name']\": {\"new_value\": \"AWS:CloudTrail\", \"old_value\": \"CloudTrail:GetInstanceIdentityDocument\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--ee4e3e61-e138-498b-93bf-3a5f8fea691c", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0002#AN0002", + "external_id": "AN0002" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0002", + "description": "Detects non-standard processes (e.g., PowerShell, python.exe, rundll32.exe) making outbound connections using publish/subscribe protocols (e.g., MQTT, AMQP) over non-browser, encrypted channels, often beaconing to message brokers.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Flow", + "channel": "mqtt.log / xmpp.log (custom log feeds)" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "UnusualProcessList", + "description": "Detect suspicious processes initiating outbound pub/sub connections" + }, + { + "field": "TimeWindow", + "description": "Define beaconing interval used for temporal correlation" + }, + { + "field": "ProtocolPortList", + "description": "Custom MQTT/XMPP port use in non-standard ranges (e.g., 1883, 5222, 5672)" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--bbd003ec-4208-48bb-9ad5-b9dd627fdd14", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 17:36:06.423000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0004#AN0009", + "external_id": "AN0009" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0009", + "description": "Abnormal modification of the PATH environment variable or registry keys controlling system paths, combined with execution of binaries named after legitimate system tools from user-writable directories. Defender correlates registry modifications, file creation of suspicious binaries, and process execution paths inconsistent with baseline system directories.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Security", + "channel": "EventCode=4657" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "MonitoredRegistryKeys", + "description": "PATH environment keys under HKCU and HKLM to monitor for changes." + }, + { + "field": "SuspiciousBinaryList", + "description": "List of high-value system binaries commonly hijacked (e.g., net.exe, python.exe, powershell.exe)." + }, + { + "field": "TimeWindow", + "description": "Correlation window between PATH modification and execution of a hijacked binary." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 17:36:06.423000+00:00\", \"old_value\": \"2025-10-22 18:36:42.025000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4657\", \"old_value\": \"EvenCode=4657\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--bd8beea8-48c8-41dc-8991-f8c739d10c70", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0005#AN0014", + "external_id": "AN0014" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0014", + "description": "Execution of renamed common utilities (e.g., `bash`, `nc`, `python`, `sh`) from atypical directories or with names intended to deceive defenders or EDRs.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "auditd:SYSCALL", + "channel": "execve" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--639e87f3-acb6-448a-9645-258f20da4bc5", + "name": "linux:osquery", + "channel": "event-based" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "linux:syslog", + "channel": "cron activity" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ExecutionPath", + "description": "Path anomalies such as execution from /dev/shm, /tmp, or user home directories" + }, + { + "field": "ParentProcessContext", + "description": "Unusual lineage such as scripts invoking renamed tools" + }, + { + "field": "TimeWindow", + "description": "Correlate between file rename and immediate execution" + } + ], + "x_mitre_platforms": [ + "Linux" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"cron activity\", \"old_value\": \"/var/log/syslog or journalctl\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--9ec9d296-173f-4e47-8bc4-d20d558e6e18", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0009#AN0021", + "external_id": "AN0021" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0021", + "description": "Adversary manipulates dependencies/dev tools used by developers or CI: a package manager (npm/yarn/pnpm, pip/pipenv, nuget/dotnet, chocolatey/winget, maven/gradle) or a compiler/IDE downloads or restores content; files are written under project paths and execution paths (node_modules, packages, .nuget, .gradle, .m2, %AppData%\\npm, %UserProfile%\\.cargo\\bin, temp build dirs). First run of newly written components triggers scripts (preinstall/postinstall), shell/PowerShell spawning, or loader DLLs, followed by network egress to non-approved registries/CDNs.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--639e87f3-acb6-448a-9645-258f20da4bc5", + "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational", + "channel": "Invalid/Unsigned image when developer tool launches newly installed binaries" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a", + "name": "NSM:Flow", + "channel": "First-time outbound connections to package registries or unknown hosts immediately after restore/build" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlate file write by package manager to first execution and egress (default 90 minutes)." + }, + { + "field": "ApprovedRegistries", + "description": "Allow-listed registries (e.g., registry.npmjs.org, pypi.org, nuget.org, maven.apache.org, company proxies/CDNs)." + }, + { + "field": "DevHosts", + "description": "Limit analytics to engineering endpoints/CI agents to reduce noise." + }, + { + "field": "TrustedPublishers", + "description": "Code-signing publishers acceptable for dev tools." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][3]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--3e852bb9-785d-4bc4-9f7e-b7e43a5d8bc8", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0011#AN0030", + "external_id": "AN0030" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0030", + "description": "Processes generating large outbound connections with disproportionate send/receive ratios, often to uncommon ports or hosts, potentially inserting meaningless data into protocol payloads.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=10" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Flow", + "channel": "TCP/UDP" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "PayloadEntropyThreshold", + "description": "Tunable threshold for Shannon entropy of network payloads." + }, + { + "field": "TimeWindow", + "description": "Duration of outbound data transfer to evaluate disproportionate upload size." + }, + { + "field": "UserContext", + "description": "Filter based on user accounts allowed to generate outbound traffic." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--c233a50c-0fdb-412b-85f6-8ff71a3539b9", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0013#AN0037", + "external_id": "AN0037" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0037", + "description": "Access to browser artifact locations (e.g., Chrome, Edge, Firefox) by processes like PowerShell, cmd.exe, or unknown tools, followed by file reads, decoding, or export operations indicating enumeration of bookmarks, autofill, or history databases.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TargetPathRegex", + "description": "Location of browser data folders like %APPDATA%\\Google\\Chrome\\User Data or %APPDATA%\\Mozilla\\Firefox" + }, + { + "field": "ParentProcess", + "description": "Used to exclude known browser maintenance or backup processes" + }, + { + "field": "ScriptBlockPattern", + "description": "Used to detect suspicious PowerShell commands targeting browser data" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--7cb2010a-e502-4117-94f3-fa3bd8d64a34", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0014#AN0040", + "external_id": "AN0040" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0040", + "description": "Detects staging of sensitive files into temporary or public directories, compression with 7zip/WinRAR, or batch copy prior to exfiltration.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "StagingDirectoryList", + "description": "Temp folders or user profile staging directories" + }, + { + "field": "CompressionToolList", + "description": "7z.exe, rar.exe, zip.exe paths" + }, + { + "field": "TimeWindow", + "description": "Temporal bounds for detecting batch staging activities" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--e622500c-4217-466c-955c-82ef3217653a", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0014#AN0043", + "external_id": "AN0043" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0043", + "description": "Detects virtual disk expansion or file copy operations to cloud buckets or mounted volumes from isolated instances.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--58ef998c-f3bf-4985-b487-b1005f5c05d1", + "name": "AWS:CloudTrail", + "channel": "GetObject, CopyObject" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "gcp:audit", + "channel": "Write operations to storage" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "CloudBucketList", + "description": "Staging bucket or mount point for data" + }, + { + "field": "InstanceTag", + "description": "Behavior restricted to specific ephemeral instances" + }, + { + "field": "ObjectWriteThreshold", + "description": "Volume or size of files pushed in burst" + } + ], + "x_mitre_platforms": [ + "IaaS" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"GetObject, CopyObject\", \"old_value\": \"PutObject, CopyObject\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--00449d4c-48c7-4977-bf38-86fbc4e79285", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0021#AN0061", + "external_id": "AN0061" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0061", + "description": "Adversary disables or stops critical services (e.g., Exchange, SQL, AV, endpoint monitoring) using native utilities or API calls, often preceding destructive actions (T1485, T1486). Behavioral chain: Elevated execution context + stop-service or sc.exe or ChangeServiceConfigW + terminated or disabled service + possible follow-up file manipulation.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--39b9db72-8b48-4595-a18d-db5bbba3091b", + "name": "WinEventLog:Security", + "channel": "EventCode=4672" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--5297a638-1382-4f0c-8472-0d21830bf705", + "name": "WinEventLog:System", + "channel": "EventCode=7036" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--74fa567d-bc90-425c-8a41-3c703abb221c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=4" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Time span between elevated privilege use and critical service stop" + }, + { + "field": "ServiceName", + "description": "Service names of interest (e.g., MSExchangeIS, SQLSERVERAGENT)" + }, + { + "field": "ParentProcess", + "description": "Upstream process lineage leading to service stop" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][3]['name']\": {\"new_value\": \"WinEventLog:Sysmon\", \"old_value\": \"WinEventLog:sysmon\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--f2064dd1-8cdb-472e-b187-8d1ef18fb059", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0022#AN0065", + "external_id": "AN0065" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0065", + "description": "Adversary stages a lure that references a remote resource (e.g., LNK/SCF/Office template). When the user opens/renders the file or a shell enumerates icons, the host automatically attempts SMB or WebDAV authentication to the attacker host. The chain is: (1) lure file is created or modified in a user-exposed location \u2192 (2) user or system accesses the lure \u2192 (3) host makes outbound NTLM (SMB 139/445 or WebDAV over 80/443) to an untrusted destination \u2192 (4) repeated attempts from multiple users/hosts or from privileged workstations.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Flow", + "channel": "HTTP/WebDAV requests that contain NTLMSSP or PROPFIND/MOVE/OPTIONS with Authorization: NTLM" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a", + "name": "NSM:Flow", + "channel": "Outbound connections to TCP 139,445 and HTTP/HTTPS to WebDAV endpoints from workstation subnets" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "UserLocations", + "description": "Folders where lures are most effective (Desktop, Public, Downloads, Temp, Cache, Start Menu, Startup). Adjust to enterprise layout." + }, + { + "field": "LureExtensions", + "description": "File types commonly abused (.lnk, .scf, .url, .doc/.xls/.ppt/.pdf/.html). Extend for your tooling and languages." + }, + { + "field": "UntrustedCIDR/DNS", + "description": "Org-specific list of external/unknown networks or domains; used to suppress sanctioned file servers and WebDAV gateways." + }, + { + "field": "TimeWindow", + "description": "Correlation horizon (e.g., 15\u201330 minutes) between file access and outbound NTLM attempt." + }, + { + "field": "WorkstationZones", + "description": "Asset/zone tags that distinguish workstations from servers; helps flag workstation\u2192workstation SMB, which is often abnormal." + }, + { + "field": "OfficeTemplatePaths", + "description": "Paths to Office templates to catch template injection references and abnormal loads." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--dc0bf4ca-1d65-46ee-b4b1-d8f73a6e0cda", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0025#AN0071", + "external_id": "AN0071" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0071", + "description": "Abuse of trusted Electron apps (Teams, Slack, Chrome) to spawn child processes or execute payloads via malicious command-line arguments (e.g., --gpu-launcher) and modified app resources (.asar). Behavior chain: suspicious parent process (Electron app) \u2192 unusual command-line args \u2192 child process creation \u2192 optional DLL/network artifacts.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlation window tying app launch, file tampering, child process, and network events (5\u201310 minutes typical)." + }, + { + "field": "UserContext", + "description": "Flag admin/service accounts versus standard users executing Electron apps." + }, + { + "field": "AllowedElectronApps", + "description": "Baseline of Electron-based executables expected in the enterprise." + }, + { + "field": "AllowedChildProcesses", + "description": "Whitelist normal child processes (chrome.exe \u2192 crashpad_handler.exe) versus anomalies (powershell.exe)." + }, + { + "field": "ElectronAppDomainAllowlist", + "description": "Approved service domains for Teams, Slack, etc. to suppress benign traffic." + }, + { + "field": "AsarIntegrityHash", + "description": "Expected hash/signature of app.asar resources to detect tampering." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][3]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--8129e7b8-eaa1-4459-ba70-ebf6d68ca16c", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0025#AN0072", + "external_id": "AN0072" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0072", + "description": "Abuse of Linux Electron binaries by modifying app.asar or config JS files and spawning unexpected child processes (bash, curl, python).", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "auditd:SYSCALL", + "channel": "execve: Electron-based binary spawning shell or script interpreter" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "AsarIntegrityCheck", + "description": "Baseline of expected asar package signatures per app." + }, + { + "field": "SuspiciousChildProcesses", + "description": "Flag shells/python spawned from Electron parent." + } + ], + "x_mitre_platforms": [ + "Linux" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=11\", \"old_value\": \"Modification of .asar in /opt or ~/.config directories\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--ffe7278f-7cd1-402f-a3a7-dcc7a363b031", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0026#AN0074", + "external_id": "AN0074" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0074", + "description": "Correlated registry modifications under Print Processors path, followed by DLL file creation within the system print processor directory, and DLL load by spoolsv.exe. Malicious execution often occurs during service restart or system boot, with SYSTEM-level privileges.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=10" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlate Registry + DLL Write + Module Load within a short boot or spooler restart window (e.g., 5 minutes)." + }, + { + "field": "PrintProcessorDirectory", + "description": "System-specific path derived from GetPrintProcessorDirectory API call; may differ across Windows versions or configurations." + }, + { + "field": "DLLNamePattern", + "description": "Some environments may use custom or non-standard DLL naming conventions for print processors. Allowlist known values." + }, + { + "field": "SignedImageValidation", + "description": "Check Authenticode signature and issuer chain for loaded DLLs to reduce false positives." + }, + { + "field": "ServiceRestartTrigger", + "description": "Monitor for spoolsv.exe restart events that trigger malicious print processor loading." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--04fe83c3-d8d3-4c96-91a4-9167fa8f405a", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0027#AN0075", + "external_id": "AN0075" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0075", + "description": "Detects unexpected or high-volume HTTP/S/WebSocket communication from suspicious processes (e.g., PowerShell, rundll32) using uncommon user agents or mimicking browser traffic to unusual domains or IPs.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Flow", + "channel": "http.log, ssl.log" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ProcessNameExclusions", + "description": "Filter out legitimate browser/network utilities" + }, + { + "field": "UserAgentAnomalies", + "description": "Detect non-browser user-agents or spoofed headers" + }, + { + "field": "OutboundByteRatioThreshold", + "description": "Flag when outbound > inbound volume by 90%+" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--c699a4ee-83dd-48d8-94ae-658204066ae9", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0028#AN0080", + "external_id": "AN0080" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0080", + "description": "Processes invoking network-intensive child processes or uploading large data volumes, often from non-standard user or system contexts, with evidence of long-duration TCP/UDP sessions to unusual destinations.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Bandwidth anomalies should be assessed over 5-15 min or hourly windows depending on environment size." + }, + { + "field": "DestinationCountry", + "description": "Some organizations whitelist traffic to countries based on geolocation." + }, + { + "field": "ProcessName", + "description": "Legitimate processes using high bandwidth (e.g., backup tools) must be excluded." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--bf6b3f42-a7a5-4e6d-840a-e892aa74916c", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0031#AN0089", + "external_id": "AN0089" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0089", + "description": "Execution of binaries with invalid digital signatures, where metadata claims code is signed but validation fails. Behavior is often correlated with suspicious parent processes or unexpected execution paths.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--639e87f3-acb6-448a-9645-258f20da4bc5", + "name": "WinEventLog:Windows Defender", + "channel": "Operational log" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "SignatureValidationResult", + "description": "Allow tuning to include 'invalid', 'expired', or 'untrusted root' based on environment tolerance" + }, + { + "field": "ParentProcessName", + "description": "Helps tune false positives by limiting to suspicious parent process executions" + }, + { + "field": "TimeWindow", + "description": "Defines correlation window between metadata check and process execution" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--6b5b9cd2-f6ba-4ed5-bea2-30edbf85501e", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0033#AN0094", + "external_id": "AN0094" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0094", + "description": "Defenders can observe suspicious replacement or tampering of system accessibility binaries (e.g., utilman.exe, sethc.exe, osk.exe) and anomalous modifications to registry keys used to redirect accessibility programs (such as IFEO keys). Additionally, execution of cmd.exe or other suspicious binaries triggered from the login screen by SYSTEM can be correlated as part of a behavior chain.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--639e87f3-acb6-448a-9645-258f20da4bc5", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=15" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Time between registry modification and suspicious binary execution (e.g., < 1 hour) can be tuned." + }, + { + "field": "TargetBinaryNames", + "description": "Specific binaries monitored (e.g., utilman.exe, sethc.exe) can be adjusted per OS version and risk tolerance." + }, + { + "field": "ParentProcess", + "description": "Parent process of cmd.exe (e.g., winlogon.exe) may vary across legitimate and adversarial cases." + }, + { + "field": "UserContext", + "description": "Context of SYSTEM account execution vs. administrative sessions may influence tuning." + }, + { + "field": "CommandLineContains", + "description": "Tunable patterns such as launching cmd.exe, powershell, or LOLBins from accessibility binaries." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--27bd3e33-9a61-4dfb-9fba-205a6c880264", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0035#AN0100", + "external_id": "AN0100" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0100", + "description": "Suspicious processes initiating encrypted HTTPS connections to common web service domains, followed by abnormal data upload behavior or automated posting behavior indicative of C2 bidirectional traffic.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "etw:Microsoft-Windows-WinINet", + "channel": "HTTPS Inspection" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Timeframe for evaluating multiple network connections tied to the same process" + }, + { + "field": "DomainPattern", + "description": "Regex or string patterns used to identify common Web service infrastructure (e.g., *.googleapis.com)" + }, + { + "field": "PayloadSizeThreshold", + "description": "Minimum data upload size before flagging anomaly" + }, + { + "field": "ProcessNameExclusionList", + "description": "Known benign updaters or service processes to reduce false positives" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=1\", \"old_value\": \"Event ID 1\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--c4eb93f1-0288-4884-bdbc-800e7a8e87c3", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0037#AN0105", + "external_id": "AN0105" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0105", + "description": "Detects unauthorized access to web browser credential stores (e.g., Chrome Login Data, Edge Credential Locker) by processes other than the browser itself. Correlates file reads of credential databases with subsequent API calls to `CryptUnprotectData` or memory inspection attempts.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=10" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "MonitoredPaths", + "description": "Browser-specific credential storage paths such as Chrome Login Data, IE Credential Locker" + }, + { + "field": "TimeWindow", + "description": "Correlation window between file read and process memory/API access" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4656, 4663\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--7cf1b4ad-95e8-4bf0-8b2f-fc3c14938656", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0039#AN0109", + "external_id": "AN0109" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0109", + "description": "Correlate high-frequency or anomalous DNS query activity with processes that do not normally generate network requests (e.g., Office apps, system utilities). Detect pseudo-random or high-entropy domain lookups indicative of domain generation algorithms (DGAs).", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "EntropyThreshold", + "description": "Adjust based on environment to differentiate DGAs from legitimate CDNs" + }, + { + "field": "TimeWindow", + "description": "Interval for correlating bursts of DNS queries from the same process" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba\", \"name\": \"WinEventLog:Sysmon\", \"channel\": \"EventCode=3, 22\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba\", \"name\": \"WinEventLog:Sysmon\", \"channel\": \"EventCode=22\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077\", \"name\": \"WinEventLog:Sysmon\", \"channel\": \"EventCode=1\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077\", \"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=1\"}}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--e9f451b7-1b9e-420e-983a-3442547b7180", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0042#AN0118", + "external_id": "AN0118" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0118", + "description": "Detects abuse of verclsid.exe to execute COM objects by monitoring process creation, CLSID arguments, DLLs or scriptlet engines loaded into memory, and If the CLSID points to remote SCT/HTA content, verclsid.exe makes outbound connections.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "AllowedCLSIDs", + "description": "Baseline CLSIDs frequently invoked by verclsid.exe in normal shell extension verification." + }, + { + "field": "ParentProcessFilter", + "description": "Unusual parents (e.g., winword.exe, excel.exe) spawning verclsid.exe should be treated as suspicious." + }, + { + "field": "TimeWindow", + "description": "Correlation window between verclsid.exe start, module load, and network activity." + }, + { + "field": "ExternalIPRange", + "description": "Restrict detection to external IPs not in approved ranges to cut noise." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-22 18:38:17.503000+00:00\"}, \"root['x_mitre_log_source_references'][3]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--db45c19b-d9d6-4794-8b49-ba232cca34b0", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0044#AN0123", + "external_id": "AN0123" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0123", + "description": "Installation of a new browser extension followed by suspicious file writes or outbound network connections to untrusted domains by the browser process.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "UserContext", + "description": "Extension installation by privileged or domain users may require higher scrutiny" + }, + { + "field": "BrowserExecutablePath", + "description": "Custom or portable browsers may not match default paths" + }, + { + "field": "ExtensionInstallPath", + "description": "Installation paths may vary by version or user profile" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=22\"}, \"root['x_mitre_log_source_references'][3]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--11cd0577-97e6-4def-a86b-fe167ae4e33d", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0047#AN0130", + "external_id": "AN0130" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0130", + "description": "Detection focuses on processes that attempt to locate, access, or exfiltrate local Outlook data files (.pst/.ost) using file system access, native Windows utilities (e.g., PowerShell, WMI), or remote access tools with file browsing capabilities. The behavior chain includes directory enumeration, file access, optional compression or staging, and network transfer.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TargetFilePathPattern", + "description": "Regex or wildcard patterns for sensitive Outlook file paths (.ost/.pst) depending on organizational deployment." + }, + { + "field": "TimeWindow", + "description": "Timeframe used to correlate related file access, process creation, and exfiltration events." + }, + { + "field": "UserContext", + "description": "Limit detection to user accounts not normally interacting with Outlook file locations (e.g., service accounts, low-privileged users)." + }, + { + "field": "ProcessAllowList", + "description": "Filter known legitimate Outlook-accessing processes to reduce false positives." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}, \"root['x_mitre_log_source_references'][3]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--c42179a8-71c5-41ba-bbfa-d6c1a93e729b", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0048#AN0131", + "external_id": "AN0131" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0131", + "description": "Detects adversaries accessing remote mail systems (e.g., Exchange Online, O365) using stolen credentials or OAuth tokens, followed by scripted access to mailbox contents via PowerShell, AADInternals, or unattended API queries. Detection focuses on abnormal logon sessions, user agents, IP locations, and scripted or tool-based email data access.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "azure:signinlogs", + "channel": "Abnormal sign-in from scripting tools (PowerShell, AADInternals)" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa", + "name": "m365:purview", + "channel": "MailItemsAccessed & Exchange Audit" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "UserAgentPattern", + "description": "Filters user agents like 'PowerShell', 'AADInternals', 'python-requests' which can vary depending on script/tool." + }, + { + "field": "TimeWindow", + "description": "Defines the temporal correlation window between login, command execution, and outbound email access." + }, + { + "field": "KnownIPLocations", + "description": "Defines baseline geo/IP address ranges to suppress known corporate access." + }, + { + "field": "PrivilegedUserList", + "description": "Defines the accounts considered privileged (admin, execs) and worthy of tighter thresholds." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}, \"root['x_mitre_log_source_references'][3]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--d71c4839-8d23-41f4-b59a-8bd2c3517d1e", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0049#AN0133", + "external_id": "AN0133" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0133", + "description": "Detects attempts to clear RDP/network history and modify network configuration artifacts through command execution, registry key deletion, firewall rule changes, and suspicious file deletions (e.g., Default.rdp, registry edits to Terminal Server Client keys).", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "EDR:cli", + "channel": "Command Line Telemetry" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--d2ff4b56-8351-4ed8-b0fb-d8605366005f", + "name": "WinEventLog:Security", + "channel": "Firewall Rule Modification" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TargetPathRegex", + "description": "Filter file/registry paths like *\\Terminal Server Client\\* or *Default.rdp*" + }, + { + "field": "TimeWindow", + "description": "Correlate command/registry edits within close proximity to suspicious connection activity" + }, + { + "field": "UserContext", + "description": "Detect cleanup behavior from non-interactive or SYSTEM accounts" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--7263a8a8-a06f-4bdc-a021-3529ad683f9d", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0050#AN0137", + "external_id": "AN0137" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0137", + "description": "An adversary writes or drops a malicious Office Add-in (e.g., WLL, XLL, COM) to a trusted directory or modifies registry keys to load malicious add-ins on Office application launch. Upon user opening Word or Excel, the add-in is automatically loaded, triggering execution of the payload, often spawning scripting engines or anomalous child processes.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=2" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "AddInExtension", + "description": "Malicious add-ins may have varying extensions (.wll, .xll, .dll, .vsto)" + }, + { + "field": "TrustedPath", + "description": "Office trusted add-in paths may differ across enterprise configurations" + }, + { + "field": "RegistryPath", + "description": "Registry keys used to load add-ins may be version- and app-specific" + }, + { + "field": "ChildProcessName", + "description": "Office processes spawning mshta.exe, powershell.exe, or rundll32.exe are abnormal" + }, + { + "field": "TimeWindow", + "description": "Add-in loading may occur only during Office launch windows" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][3]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--620cae28-1874-462d-a2e4-47ddd75098ea", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0051#AN0139", + "external_id": "AN0139" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0139", + "description": "Creation or modification of files in directories known to be excluded from AV scanning (e.g., C:\\Windows\\Temp, Exchange server directories, or default AV exclusions). Defender perspective: correlate file creation with execution behavior or anomalous parent processes writing to excluded paths.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ExcludedPaths", + "description": "List of directories excluded from scanning in the environment (customizable per organization)." + }, + { + "field": "ProcessAllowlist", + "description": "Legitimate processes typically writing to excluded paths to minimize false positives." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--0bf5b548-50d0-4e73-bb3c-413cbdfafd97", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0054#AN0147", + "external_id": "AN0147" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0147", + "description": "Sequence of internal email sent from a recently compromised user account (preceded by abnormal logon or device activity), with attachments or links leading to execution or credential harvesting. Defender observes: internal mail delivery to peers with high entropy attachments, followed by click events, process initiation, or credential prompts.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--a953ca55-921a-44f7-9b8d-3d40141aa17e", + "name": "WinEventLog:Security", + "channel": "EventCode=4625" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--39b9db72-8b48-4595-a18d-db5bbba3091b", + "name": "WinEventLog:Security", + "channel": "EventCode=4672" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa", + "name": "m365:unified", + "channel": "SendOnBehalf, MessageSend, ClickThrough, MailItemsAccessed" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Expected time between internal email and link execution or file dropper" + }, + { + "field": "UserContext", + "description": "Baseline logon locations and device usage for sender accounts" + }, + { + "field": "AttachmentEntropyThreshold", + "description": "Entropy value over which attachment is considered suspicious" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4624, 4648\", \"old_value\": \"EventCode=4624\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--5e3f407f-192b-4e6f-aab0-e0682da3a4a9", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0054#AN0151", + "external_id": "AN0151" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0151", + "description": "Outlook or Word used to forward suspicious internal attachments with macro content. Defender observes attachment forwarding, auto-opening behaviors, or macro prompt interactions.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa", + "name": "m365:unified", + "channel": "SendOnBehalf, MessageSend, AttachmentPreviewed" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:Security", + "channel": "EventCode=4103, 4104, 4105, 4106" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "MacroExecutionWindow", + "description": "Timing between mail open and macro invocation" + }, + { + "field": "AttachmentNameHeuristics", + "description": "Patterns of known internal spearphishing lures (e.g., invoice, HR_policy)" + } + ], + "x_mitre_platforms": [ + "Office Suite" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--bf5772b8-86b4-4d73-bbff-6abb5da9edac", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0055#AN0152", + "external_id": "AN0152" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0152", + "description": "Detection of adversary attempts to enumerate Group Policy settings through suspicious command execution (gpresult), PowerShell enumeration (Get-DomainGPO, Get-DomainGPOLocalGroup), and abnormal LDAP queries targeting groupPolicyContainer objects. Defenders observe unusual process lineage, script execution, or LDAP filter activity against domain controllers.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--5c6de881-bc70-4070-855a-7a9631a407f7", + "name": "WinEventLog:Security", + "channel": "EventCode=4661" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Flow", + "channel": "query: High-volume LDAP traffic with filters targeting groupPolicyContainer attributes" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Defines the correlation window to link suspicious PowerShell activity, gpresult execution, and LDAP enumeration." + }, + { + "field": "UserContext", + "description": "Identifies accounts expected to perform GPO enumeration (administrators vs. standard users)." + }, + { + "field": "CommandLinePatterns", + "description": "Patterns for detecting suspicious gpresult or PowerShell cmdlets; tunable to reduce noise in environments where these tools are common." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['name']\": {\"new_value\": \"WinEventLog:PowerShell\", \"old_value\": \"WinEventLog:Powershell\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--55ec66de-8146-4fd0-a423-0954d6ba33ef", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0058#AN0158", + "external_id": "AN0158" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0158", + "description": "Detection of a process or script that accesses a common web service to retrieve content containing obfuscated indicators of a secondary C2 server (dead drop resolver behavior).", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "etw:Microsoft-Windows-NDIS-PacketCapture", + "channel": "TLS Handshake/Network Flow" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TargetDomain", + "description": "FQDN or IP for the hosting site of the dead drop (e.g., pastebin.com, twitter.com)" + }, + { + "field": "TimeWindow", + "description": "Defines how close in time the suspicious network and process behavior must occur" + }, + { + "field": "UserContext", + "description": "Filter by user or system accounts to reduce noise" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--dc4096a9-b89d-4bef-b20d-58cf5e87f6bf", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0058#AN0159", + "external_id": "AN0159" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0159", + "description": "Detection of a process or script that accesses a common web service to retrieve content containing obfuscated indicators of a secondary C2 server (dead drop resolver behavior).", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "auditd:SYSCALL", + "channel": "connect" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Flow", + "channel": "HTTP/TLS Logs" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TargetDomain", + "description": "Dead drop hosting domain (e.g., GitHub, Google Docs)" + }, + { + "field": "PayloadEntropyThreshold", + "description": "Detects high entropy in payloads signaling obfuscation" + }, + { + "field": "TimeWindow", + "description": "Causal proximity between access to resolver and follow-up connections" + } + ], + "x_mitre_platforms": [ + "Linux" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"connect\", \"old_value\": \"netconnect\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--64d6b35c-4785-4e2b-bc93-1f54f626a7a7", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0059#AN0162", + "external_id": "AN0162" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0162", + "description": "Correlate unauthorized or anomalous file modifications, deletions, or metadata changes with suspicious process execution or API calls. Detect abnormal changes to structured data (e.g., database files, logs, financial records) outside expected business process activity.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=2" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--639e87f3-acb6-448a-9645-258f20da4bc5", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=15" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "MonitoredFilePaths", + "description": "List of critical data directories or files; environment-specific tuning required." + }, + { + "field": "TimeWindow", + "description": "Threshold for correlating process execution with rapid data changes." + }, + { + "field": "AuthorizedProcesses", + "description": "Expected processes permitted to modify business-critical data." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][3]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4656,4663\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--f20d9241-84cc-4393-b2fb-798241da73fa", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0060#AN0165", + "external_id": "AN0165" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0165", + "description": "Unusual or uncommon processes initiate network connections to external destinations followed by file creation (tools downloaded).", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ParentProcessName", + "description": "Tune for known good updaters (e.g., ChromeUpdate, OneDrive)" + }, + { + "field": "DestinationIPCategory", + "description": "Allow filtering by internal vs external IP blocks" + }, + { + "field": "FilePathRegex", + "description": "Focus on uncommon file drop paths (e.g., C:\\Users\\Public\\)" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--3ac58f14-32d6-4ce2-8aa7-e7c429dd6405", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0061#AN0170", + "external_id": "AN0170" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0170", + "description": "Detects modification of registry keys used for default file handlers, followed by anomalous process execution from user-initiated file opens. This includes tracking changes under HKCU and HKCR for file extension mappings, and correlating them with new or suspicious handler paths launching unusual child processes (e.g., PowerShell, cmd, wscript).", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--39b9db72-8b48-4595-a18d-db5bbba3091b", + "name": "WinEventLog:Security", + "channel": "EventCode=4672" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Defines how long after the registry modification to correlate a suspicious process execution" + }, + { + "field": "UserContext", + "description": "Tune to ignore known admin or installer behavior in specific user profiles" + }, + { + "field": "SuspiciousHandlerPathRegex", + "description": "Pattern match for suspicious handler paths (e.g., powershell.exe, rundll32.exe)" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13,14\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--12849ba4-39da-48c9-bf3d-c51a6cc3f85b", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0066#AN0178", + "external_id": "AN0178" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0178", + "description": "Behavioral chain: (1) a user-facing app (browser/Office/email client) launches a URL or handles a link, then (2) the same process lineage makes an outbound connection to an untrusted domain/IP, (3) a file is downloaded or unpacked to a user-writable location shortly after the click. Optional enrichment: subsequent child execution by LOLBINs.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Flow", + "channel": "Suspicious URL patterns, uncommon TLDs, short-lived domains, URL shorteners; HTTP method GET/POST" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlation window (e.g., 15m) between link click / first egress / file write." + }, + { + "field": "BrowserParents", + "description": "Processes considered link sources: chrome.exe, msedge.exe, firefox.exe, winword.exe, outlook.exe, teams.exe." + }, + { + "field": "UserPaths", + "description": "User-writable directories to monitor (%USERPROFILE%\\Downloads, %TEMP%, %APPDATA%\\*, OneDrive caches)." + }, + { + "field": "SuspiciousTLDs", + "description": "High-risk TLD and domain list (e.g., .top .xyz .monster; newly observed domains/NOD)." + }, + { + "field": "AllowedCDNs", + "description": "Corporate CDNs/update hosts to reduce false positives." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--80e9341d-7ea4-4684-8f27-54566e996ce6", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0067#AN0182", + "external_id": "AN0182" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0182", + "description": "PowerShell or script execution with parameters that suppress errors or ignore user interrupts, such as `-ErrorAction SilentlyContinue`. Defender perspective: detecting discrepancies between suppressed error arguments and continued execution behavior.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "MonitoredCmdlets", + "description": "List of PowerShell cmdlets where suppressed error handling is suspicious (e.g., Invoke-Expression, Invoke-WebRequest)." + }, + { + "field": "ErrorActionThreshold", + "description": "Frequency of suppressed error actions within time window that should trigger detection." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--09ef4725-8e20-452d-b08c-f7db3cbee174", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0068#AN0184", + "external_id": "AN0184" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0184", + "description": "Adversary installs or modifies IIS components (ISAPI filters, extensions, or modules) using DLL files registered via configuration changes or administrative tools like AppCmd.exe. These components intercept or manipulate HTTP requests/responses for persistence or C2.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa", + "name": "WinEventLog:System", + "channel": "Changes to applicationhost.config or DLLs loaded by w3wp.exe" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--66531bc6-a509-4868-8314-4d599e91d222", + "name": "WinEventLog:Microsoft-IIS-Configuration", + "channel": "Module or ISAPI filter registration events" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Adjustable time frame for detecting chained events (e.g., config change + module load)" + }, + { + "field": "UserContext", + "description": "Scope detection to specific users or roles allowed to modify IIS components" + }, + { + "field": "WatchedPaths", + "description": "Specific directories such as %windir%\\System32\\inetsrv\\ for DLL monitoring" + }, + { + "field": "DLLNameEntropyThreshold", + "description": "Entropy or name patterns to flag suspicious DLLs registered as components" + }, + { + "field": "ParentProcessName", + "description": "Restrict to DLLs loaded by w3wp.exe or invoked via AppCmd.exe" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--61d89912-f74e-4fde-ae7a-591e8c7c5739", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0069#AN0185", + "external_id": "AN0185" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0185", + "description": "Chain: (1) a new external device is recognized by Windows (USB/Thunderbolt/PCIe) or a new block device appears; (2) within a short window, the same user/session spawns processes or the OS mounts a new volume; (3) optional follow-on activity such as HID keystroke injection, DMA driver load, or new network interface MAC on DHCP. Correlate Security EID 6416 / Kernel-PnP with sysmon and DHCP/network metadata.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa", + "name": "WinEventLog:Security", + "channel": "EventCode=6416" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3551476e-14f5-4e48-a518-e82135329e03", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=6" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d6e6b3b-4aa8-40e1-8c47-91db0f313d9f", + "name": "WinEventLog:System", + "channel": "Kernel-PnP 410/400 device install, disk added" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a", + "name": "wineventlog:dhcp", + "channel": "DHCP Lease Granted" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TrustedDeviceVIDPID", + "description": "Vendor/Product IDs that are approved (e.g., keyboards, mice). Unknown/rare VID:PID raise risk." + }, + { + "field": "ExpectedBusTypes", + "description": "Allow-listed bus types for server classes (e.g., USB disabled on DCs)." + }, + { + "field": "TimeWindow", + "description": "Correlation window between device recognition and follow-on process/mount/network activity (e.g., 10m\u201360m)." + }, + { + "field": "TrustedMACs", + "description": "Known NIC/USB-NIC MAC addresses allowed by policy." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][5]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=22\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--7efd6a7b-d7c0-4922-a1df-c492c0a2d3f8", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0071#AN0194", + "external_id": "AN0194" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0194", + "description": "Detects file transfers or mounting operations from remote hosts followed by write actions into a local staging directory, often using SMB or remote shell activity.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--f5468e67-51c7-4756-9b4f-65707708e7fa", + "name": "WinEventLog:Microsoft-Windows-SMBClient/Security", + "channel": "EventCode=31001" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "CommandLine=copy-item or robocopy from UNC path" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "StagingDirectory", + "description": "Common directories such as C:\\Temp, Downloads, or hidden folders used for remote staging" + }, + { + "field": "RemotePathPatterns", + "description": "UNC paths like \\\\10.* or \\\\domain\\share indicating lateral data staging" + }, + { + "field": "CopyToolPatterns", + "description": "Usage of robocopy, xcopy, copy-item, or scheduled tasks performing cross-host copies" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=31001\", \"old_value\": \"EventID=31001\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--696b98e8-10fd-4c7a-bb80-302baca34e60", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0071#AN0198", + "external_id": "AN0198" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0198", + "description": "Detects remote write activity across cloud VMs or object storage buckets within the same region/account that correlate with data aggregation across hosts.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--58ef998c-f3bf-4985-b487-b1005f5c05d1", + "name": "AWS:CloudTrail", + "channel": "GetObject, CopyObject" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "AWS:VPCFlowLogs", + "channel": "Traffic between instances" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "esxi:hostd", + "channel": "process execution across cloud VM" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "BucketNamePatterns", + "description": "Destination naming convention used for staging (e.g., temp-store)" + }, + { + "field": "IAMContext", + "description": "IAM role or user performing multi-host write ops" + }, + { + "field": "TransferWindow", + "description": "Burst of high-volume inter-VM transfers indicating staging" + } + ], + "x_mitre_platforms": [ + "IaaS" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"GetObject, CopyObject\", \"old_value\": \"PutObject, CopyObject\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--6dae9309-90a7-4b4e-b764-9486a7ba4390", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0072#AN0199", + "external_id": "AN0199" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0199", + "description": "Detects adversary use of logon script configuration via Group Policy or user object attributes, followed by script execution post-authentication. Behavior includes modification of script path or file, then process execution under user logon context.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9f387817-df83-432a-b56b-a8fb7f71eedd", + "name": "WinEventLog:System", + "channel": "EventCode=1502, 1503" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "script_path_keywords", + "description": "Defenders may tune for known script locations such as NETLOGON, SYSVOL, or \\domain\\sysvol\\*.bat/.ps1" + }, + { + "field": "execution_time_window", + "description": "May be scoped to user logon hours or first X minutes post-authentication" + }, + { + "field": "user_context", + "description": "Organizations may focus on specific users/groups with high privilege or remote access" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4670, 4663\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4624, 4648\", \"old_value\": \"EventCode=4624\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_source_references'][4]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--d27b0089-2c39-4b6c-84ff-303e48657e77\", \"name\": \"WinEventLog:DirectoryService\", \"channel\": \"EventID 5136\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--ca56c2df-0338-4325-964a-0f775d986277", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0075#AN0204", + "external_id": "AN0204" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0204", + "description": "Anomalous process (e.g., `rundll32`, `svchost`, `cmd`) initiates connections to internal peer hosts not seen in typical communication baselines, used to proxy or forward traffic internally, often using SMB, RPC, or high ports.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a", + "name": "Windows Firewall Log", + "channel": "SMB over high port" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "InternalConnectionPattern", + "description": "Tune based on known host-to-host communications that are rare (e.g., workstation-to-workstation)." + }, + { + "field": "DestinationPort", + "description": "Focus on unusual internal traffic on ports like 1080, 8080, 4444, or SMB over non-standard ports." + }, + { + "field": "TimeWindow", + "description": "Correlate unusual traffic bursts with new process execution." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--cf404364-1397-4f0f-9c21-cd534880722a", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0077#AN0212", + "external_id": "AN0212" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0212", + "description": "Execution of file transfer or network access activity through non-primary interfaces (e.g., WiFi, Bluetooth, cellular) by processes not typically associated with such behavior (e.g., rundll32, powershell, regsvr32).", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "WinEventLog:System", + "channel": "EventCode=5005 (WLAN), EventCode=302 (Bluetooth)" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "InterfaceType", + "description": "Filter for specific interface categories (e.g., WiFi, Bluetooth, 4G)." + }, + { + "field": "FileSizeThreshold", + "description": "Tunable for environment-specific large file access events pre-transfer." + }, + { + "field": "TimeWindow", + "description": "Temporal correlation window for file read followed by network activity." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--3c320df0-2a99-4bc4-b0f4-7af1675ccdb9", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0079#AN0216", + "external_id": "AN0216" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0216", + "description": "Detection of anomalous RDP or remote service session activity where a logon session is hijacked rather than newly created. Indicators include mismatched user credentials vs. active session tokens, service session takeovers without corresponding successful logon events, or RDP shadowing activity without user consent.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ExpectedUserSessionMap", + "description": "Mapping of users to hosts they are expected to access; deviations indicate possible hijacking." + }, + { + "field": "TimeWindow", + "description": "Threshold for detecting rapid pivoting via hijacked sessions." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--17290910-5b25-477a-a0c0-c2661ff2585e", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0080#AN0219", + "external_id": "AN0219" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0219", + "description": "Adversary sends crafted HTTP/S (or other service) input to an Internet-facing app (IIS/ASP.NET, API, device portal). Chain: (1) abnormal request patterns to public endpoint \u2192 (2) elevated 4xx/5xx or unusual methods/paths \u2192 (3) server process (w3wp.exe/other service) spawns shell/LOLbins or loads non-standard modules \u2192 (4) optional outbound callback from the host/container.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa", + "name": "ApplicationLog:IIS", + "channel": "IIS W3C logs in C:\\inetpub\\logs\\LogFiles\\W3SVC* (spikes in 5xx, RCE/SQLi/path traversal/JNDI patterns)" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "PublicVIPs", + "description": "List of public IPs/hostnames that front apps; used to scope web log and Zeek/proxy data." + }, + { + "field": "SuspiciousPatterns", + "description": "Regex set for exploit-like inputs (../, union select, cmd=, ${jndi:, rO0AB (Java serialization), %00, ${env:}, ${${::-j}ndi})." + }, + { + "field": "ErrorRateThreshold", + "description": "Spike threshold for HTTP status 5xx/4xx per client or URI (e.g., >5 in 5m)." + }, + { + "field": "TimeWindow", + "description": "Correlation horizon between request, error, process spawn, and egress (e.g., 15 minutes)." + }, + { + "field": "AllowedChildList", + "description": "Known child processes of app pools (e.g., msbuild.exe in CI) to reduce false positives." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][3]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--865c00d7-fc01-4ce6-8fc8-d7a84f2ded36", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0081#AN0226", + "external_id": "AN0226" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0226", + "description": "Execution of trusted, Microsoft-signed binaries such as `rundll32.exe`, `msiexec.exe`, or `regsvr32.exe` used to execute externally hosted, unsigned, or suspicious payloads through command-line parameters or network retrieval.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ParentProcessName", + "description": "Used to profile unexpected parent-child relationships (e.g., regsvr32.exe not launched by explorer.exe)" + }, + { + "field": "SignedBinaryList", + "description": "List of known signed binaries allowed for execution (e.g., msiexec.exe, regsvr32.exe)" + }, + { + "field": "CommandLineRegex", + "description": "Regex to match suspicious arguments, such as URLs, script paths, or DLL entrypoints" + }, + { + "field": "RemoteDomainAllowlist", + "description": "Filter to suppress activity contacting legitimate enterprise domains" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--273d7b27-6b7d-4017-a7f6-0cd02fd3a128", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0081#AN0227", + "external_id": "AN0227" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0227", + "description": "Execution of trusted system binaries (e.g., `split`, `tee`, `bash`, `env`) used in uncommon sequences or chained behaviors to execute malicious payloads or perform actions inconsistent with normal system or script behavior.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "auditd:SYSCALL", + "channel": "execve" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "auditd:SYSCALL", + "channel": "connect" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TrustedBinaryList", + "description": "Binaries like `split`, `tee`, `env`, `awk`, `gzip`, often used in benign scripts" + }, + { + "field": "AnomalyScore", + "description": "Outlier model for process tree and command arguments" + } + ], + "x_mitre_platforms": [ + "Linux" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"connect\", \"old_value\": \"open or connect\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--78c505c6-25a1-4cc5-b44a-0574aa019f01", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0082#AN0229", + "external_id": "AN0229" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0229", + "description": "Adversary modifies internal UI messages (e.g., login banners, desktop wallpapers) or hosted intranet web pages by creating or altering content files using scripts or unauthorized access. Often preceded by privilege escalation or web shell deployment.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=2" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "FilePathPattern", + "description": "Location of web content or system UI config files that may vary across deployments (e.g., %SystemRoot%\\Web, %APPDATA%\\wallpaper.jpg)" + }, + { + "field": "TimeWindow", + "description": "Allowed hours for file/content modification events; defacement likely occurs during off-hours" + }, + { + "field": "UserContext", + "description": "System or domain accounts used to perform the modifications may be anomalous" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4670, 4663\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--8c881d82-21c3-482c-8895-c240360eec8e", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0085#AN0235", + "external_id": "AN0235" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0235", + "description": "An adversary running with SYSTEM-level privileges executes commands or accesses registry keys to dump the SAM hive or directly reads sensitive local files from the config directory. This behavior often involves sequential access to HKLM\\SAM, HKLM\\SYSTEM, and creation of .save or .dmp files, enabling offline hash extraction.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=2" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "CommandLinePattern", + "description": "Detectable variations include `reg save`, `reg.exe save`, or PowerShell equivalents for dumping SAM/SYSTEM hives." + }, + { + "field": "TargetFilePath", + "description": "Defenders can tune based on dump file path patterns (e.g., `%TEMP%\\sam.save`, `C:\\Users\\Public\\*.dmp`)." + }, + { + "field": "RegistryPath", + "description": "Tune for HKLM\\SAM, HKLM\\SYSTEM or access via direct \\Device\\Harddisk paths." + }, + { + "field": "TimeWindow", + "description": "Temporal gap between SAM and SYSTEM hive dumping can be tuned (e.g., 3 minutes)." + }, + { + "field": "ParentProcessName", + "description": "Useful for suppressing known-good access (e.g., backup tools)." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--1a0640f0-e286-405f-9ab3-507c1abb77da", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0086#AN0236", + "external_id": "AN0236" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0236", + "description": "Monitor for creation of WMI EventFilter, EventConsumer, and FilterToConsumerBinding objects through WMI or MOF file execution. Detect command-line execution of `mofcomp.exe`, usage of `Register-WmiEvent` via PowerShell, and anomalous child processes of `WmiPrvSE.exe` that indicate triggered execution. Look for lateral anomalies in process lineage and WMI logging channels.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--05645013-2fed-4066-8bdc-626b2e201dd4", + "name": "WinEventLog:WMI", + "channel": "EventCode=5857, 5858, 5860, 5861" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Defines temporal correlation range between WMI creation and child process execution" + }, + { + "field": "UserContext", + "description": "Tune for specific accounts (e.g., SYSTEM or attacker-controlled users)" + }, + { + "field": "ProcessNameAllowlist", + "description": "Used to exclude known benign consumers triggered via WMI (e.g., backup tools)" + }, + { + "field": "ParentProcessAnomalyThreshold", + "description": "Defines what constitutes anomalous spawning from WmiPrvSE.exe" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['name']\": {\"new_value\": \"WinEventLog:WMI\", \"old_value\": \"WinEventLog:Microsoft-Windows-WMI-Activity/Operational\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=5857, 5858, 5860, 5861\", \"old_value\": \"EventCode=5861\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--e9de9003-46e9-438f-929a-94a33c2eb5bd", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0087#AN0238", + "external_id": "AN0238" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0238", + "description": "Detection of suspicious use of shell utilities or scripts that decode or decrypt a payload and execute it without writing to disk.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "auditd:SYSCALL", + "channel": "execve" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "linux:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "UserContext", + "description": "Normal usage of `base64`, `openssl`, or `gpg` varies by user/role." + }, + { + "field": "ProcessLineage", + "description": "Parent-child process chains may differ across deployments." + }, + { + "field": "TimeWindow", + "description": "Time between decode and execution is implementation-specific." + } + ], + "x_mitre_platforms": [ + "Linux" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=22\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--dbc6d9ca-9502-46a0-a59b-15b050bb539c", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0088#AN0240", + "external_id": "AN0240" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0240", + "description": "Defender observes execution of commands like `tasklist`, `sc query`, `reg query`, or PowerShell WMI/Registry queries targeting known backup products (e.g., Veeam, Acronis, CrashPlan). Behavior often includes parent-child lineage involving PowerShell or cmd.exe with discovery syntax, and enumeration of services, directories, or registry paths tied to backup software.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "KnownBackupVendors", + "description": "List of software vendors to match in command-line or registry queries" + }, + { + "field": "UserContextScope", + "description": "Focus on low-privilege or interactive user contexts rather than service accounts" + }, + { + "field": "SuspiciousParentProcesses", + "description": "Flag execution from scripting tools, interpreters, or LOLBins" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--7924d1b1-a512-425f-b397-9e9b9887b21b", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0089#AN0243", + "external_id": "AN0243" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0243", + "description": "Monitors suspicious usage of Windows API calls like SetWindowsHookEx, GetKeyState, or polling functions within non-UI service processes, combined with Registry or driver modifications.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=10" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--5297a638-1382-4f0c-8472-0d21830bf705", + "name": "WinEventLog:System", + "channel": "EventCode=7045" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TargetImage", + "description": "Scope to sensitive GUI/session processes like winlogon.exe or osk.exe" + }, + { + "field": "AccessMask", + "description": "Can be tuned to 0x1fffff for full-access injection detection" + }, + { + "field": "TimeWindow", + "description": "Tunable for sustained polling or multiple registry edits in short succession" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4656\"}, \"root['x_mitre_log_source_references'][3]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--b355ae5d-3cd6-4594-8bd9-8fed59e02326", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0090#AN0247", + "external_id": "AN0247" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0247", + "description": "Behavioral sequence where removable media is mounted, files are written/updated, and subsequently read/executed on a separate host, suggesting removable-media relay communication.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d6e6b3b-4aa8-40e1-8c47-91db0f313d9f", + "name": "WinEventLog:System", + "channel": "EventCode=1006" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "RemovableDriveLetter", + "description": "Adjust drive letters used in detection (e.g., E:, F:, G:) depending on enterprise usage." + }, + { + "field": "WriteToReadTimeWindow", + "description": "Tunable window for file write on one host followed by file read or execution on another (e.g., within 10 minutes)." + }, + { + "field": "FileNamePattern", + "description": "Common naming schemes for payload, tasking, or exfil files (e.g., task.txt, beacon.log, data.bin)." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-27 15:59:01.140000+00:00\"}, \"root['x_mitre_log_source_references'][0]['name']\": {\"new_value\": \"WinEventLog:System\", \"old_value\": \"WinEventLog:Microsoft-Windows-Partition/Diagnostic\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--ce76c289-b810-44cf-b71e-afc76a70f7bf", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0092#AN0251", + "external_id": "AN0251" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0251", + "description": "Installation or execution of a malicious browser or IDE extension, followed by abnormal registry entries or outbound network connections from the host application", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "Image", + "description": "Path of browser or IDE launching subprocesses\u2014may vary depending on installed applications" + }, + { + "field": "ParentImage", + "description": "Legitimate parent-child process relationships for known safe extensions" + }, + { + "field": "RegistryPath", + "description": "Expected registry keys under HKCU/HKLM for installed extensions" + }, + { + "field": "TimeWindow", + "description": "Tunable interval to correlate extension install with follow-on C2 traffic" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}, \"root['x_mitre_log_source_references'][3]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--5d024a50-97d8-4b81-8cc6-3db4fff2712c", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0093#AN0254", + "external_id": "AN0254" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0254", + "description": "Adversary launches built-in system tools (e.g., whoami, query user, net user) or scripts that enumerate user account information via local execution or remote API queries (e.g., WMI, PowerShell).", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ParentProcessContext", + "description": "Identify if enumeration originates from non-interactive shell or system service" + }, + { + "field": "TimeWindow", + "description": "Tune temporal grouping of enumeration + lateral movement attempts" + }, + { + "field": "UserContext", + "description": "Flag unexpected users issuing enumeration commands (e.g., service accounts)" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--c76d69b2-f1d4-4867-965b-886b6caf95be", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0097#AN0271", + "external_id": "AN0271" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0271", + "description": "Processes using Win32 API calls (e.g., EnumWindows, GetForegroundWindow) or scripting tools (e.g., PowerShell, VBScript) to enumerate open windows. These often appear with reconnaissance or data collection TTPs.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=10" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "AccessedFunction", + "description": "Tune to focus on suspicious function calls (e.g., user32.dll!EnumWindows)." + }, + { + "field": "UserContext", + "description": "Detect behavior from non-interactive or low-privileged users where enumeration is uncommon." + }, + { + "field": "TimeWindow", + "description": "Shorten detection scope to rapid successive window enumeration attempts." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--6fba9520-c6ce-4a8f-8005-d33546a10406", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0098#AN0274", + "external_id": "AN0274" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0274", + "description": "Behavioral chain: (1) An actor creates or modifies a BITS job via bitsadmin.exe, PowerShell BITS cmdlets, or COM; (2) the job performs HTTP(S)/SMB network transfers while the owning user is logged on; (3) upon job completion/error, BITS launches a notify command (SetNotifyCmdLine) from svchost.exe -k netsvcs -s BITS, often establishing persistence by keeping long-lived jobs. The strategy correlates process creation, command/script telemetry, BITS-Client operational events, and network connections initiated by BITS.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--5297a638-1382-4f0c-8472-0d21830bf705", + "name": "WinEventLog:System", + "channel": "EventCode=7036" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlation window linking job creation, transfer, and notify execution (e.g., 30m\u201324h depending on environment and BITS retry behavior)." + }, + { + "field": "ExpectedUpdateHosts", + "description": "Allow-list of corporate update/CDN endpoints that legitimately use BITS (WSUS, MEMCM, vendor updaters)." + }, + { + "field": "SuspiciousCliSwitches", + "description": "BITSAdmin flags of interest (/transfer, /addfile, /SetNotifyCmdLine, /resume, /setcustomheaders, /setminretrydelay)." + }, + { + "field": "NotifyCmdBlockList", + "description": "Known risky binaries or folders (e.g., %TEMP%\\*.exe, powershell.exe, cmd.exe) used as BITS notify commands." + }, + { + "field": "UserContext", + "description": "Scope by interactive users, service accounts, or high-value targets (admins/servers) to reduce benign noise." + }, + { + "field": "ExternalNetCIDRs", + "description": "Definition of external/non-corp destinations for network correlation." + }, + { + "field": "JobLifetimeThreshold", + "description": "Maximum age or retry count for benign jobs before flagging persistence (e.g., >3 days or retry>20)." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4103,4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--f8e77c9a-2b8c-47d2-b44a-23857d246016", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0101#AN0279", + "external_id": "AN0279" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0279", + "description": "Detects invocation of lua or luajit interpreters by users or services outside of expected packages, chained with script drop or memory artifacts.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "auditd:SYSCALL", + "channel": "execve" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--639e87f3-acb6-448a-9645-258f20da4bc5", + "name": "auditd:SYSCALL", + "channel": "PATH" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ExecutablePath", + "description": "Lua interpreter path may vary based on distro or adversary staging." + }, + { + "field": "UserContext", + "description": "May need to exclude service or admin accounts that use Lua legitimately." + } + ], + "x_mitre_platforms": [ + "Linux" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"PATH\", \"old_value\": \"path\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--dd283114-84d8-4b1a-a765-f3a7f378c2d1", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0102#AN0282", + "external_id": "AN0282" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0282", + "description": "Monitors for abnormal process behavior and API calls like SetWindowsHookEx, GetAsyncKeyState, or device input polling commonly used for keystroke logging.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=10" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TargetImage", + "description": "Can be scoped to sensitive GUI processes like explorer.exe or winlogon.exe" + }, + { + "field": "TimeWindow", + "description": "Time threshold for detecting multiple suspicious accesses" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4656\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--5d47e6b2-04fb-45ab-be98-7de1baabf508", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0103#AN0286", + "external_id": "AN0286" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0286", + "description": "Detects network share disconnection attempts using command-line tools like `net use /delete`, PowerShell `Remove-SmbMapping`, and correlation with process lineage and SMB session teardown activity.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Flow", + "channel": "SMB2_LOGOFF/SMB_TREE_DISCONNECT" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Adjustable window to correlate CLI disconnection command with SMB session teardown (e.g., 5 mins)" + }, + { + "field": "UserContext", + "description": "Used to filter on non-interactive users or highly privileged accounts" + }, + { + "field": "ProcessCommandLineRegex", + "description": "Patterns to match `net use \\\\host\\share /delete`, `Remove-SmbMapping`, or suspicious batched disconnections" + }, + { + "field": "NetworkShareNamePattern", + "description": "Tunable list of shares likely targeted (e.g., ADMIN$, C$, IPC$)" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4624, 4648\", \"old_value\": \"EventCode=4624\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--d2a45051-b999-4969-aeb0-d7f83d453976", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0105#AN0292", + "external_id": "AN0292" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0292", + "description": "Use of hash-cracking tools (e.g., John the Ripper, Hashcat) after credential dumping, combined with high CPU usage or GPU invocation via unsigned binaries accessing password hash files", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=10" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "HashToolName", + "description": "Match execution against known cracking toolnames like hashcat.exe, john.exe, etc." + }, + { + "field": "FilePathIndicators", + "description": "Watch for access to common hash dump locations (e.g., SAM, SYSTEM, NTDS.dit)" + }, + { + "field": "ExecutionContext", + "description": "Run context: local interactive user vs. scheduled task or remote session" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-27 15:59:35.823000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=5145, 4663\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--a39fccda-e5ea-49de-80f9-d67ae3b8c799", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0107#AN0298", + "external_id": "AN0298" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0298", + "description": "Correlation of inbound emails with embedded links followed by user-driven browser navigation to suspicious or obfuscated domains. Detection chain includes malicious URL in email \u2192 user click recorded in Office logs \u2192 browser process spawning unusual child processes (e.g., PowerShell, cmd) or download activity.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa", + "name": "m365:unified", + "channel": "Send/Receive: Inbound emails containing embedded or shortened URLs" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "SuspiciousTLDs", + "description": "List of monitored top-level domains commonly abused in phishing (e.g., .xyz, .top, .tk)." + }, + { + "field": "URLShortenerDomains", + "description": "Domains like bit.ly, tinyurl.com flagged for deeper expansion/inspection." + }, + { + "field": "ClickToExecutionWindow", + "description": "Time threshold between URL click and suspicious process execution." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--cfc7b6bc-2ca3-4407-a835-b40bf6a98efc", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0107#AN0301", + "external_id": "AN0301" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0301", + "description": "Detection of OAuth consent phishing or malicious login attempts initiated through spearphishing links. Behavior chain includes inbound email with OAuth URL \u2192 consent page visited \u2192 unusual token grants logged in IdP logs.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa", + "name": "azure:signinlogs", + "channel": "ConsentGrant: Suspicious consent grants to non-approved or unknown applications" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "AllowedApps", + "description": "Whitelisted apps permitted for OAuth consent grants." + }, + { + "field": "AnomalousConsentPatterns", + "description": "Patterns of consent from unusual geographies, devices, or unapproved applications." + } + ], + "x_mitre_platforms": [ + "Identity Provider" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['name']\": {\"new_value\": \"azure:signinlogs\", \"old_value\": \"azure:signinLogs\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--f979bacd-580c-4948-b501-c42dd4a8cb92", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0108#AN0302", + "external_id": "AN0302" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0302", + "description": "Atypical processes (e.g., powershell.exe, regsvr32.exe) encode large outbound traffic using Base64 or other character encodings; this traffic is sent over uncommon ports or embedded in protocol fields (e.g., HTTP cookies or headers).", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Flow", + "channel": "Unusual Base64-encoded content in URI, headers, or POST body" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "PayloadEntropyThreshold", + "description": "Adjust to accommodate legitimate compression or encryption patterns in normal web traffic" + }, + { + "field": "ProcessAllowlist", + "description": "Define expected processes initiating outbound traffic to reduce false positives" + }, + { + "field": "AnomalyScoreThreshold", + "description": "Set threshold for how far traffic deviates from baseline protocol structure or size" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--c83f1d8c-ba54-4f2d-91b8-3006a2180497", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0115#AN0320", + "external_id": "AN0320" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0320", + "description": "Inbound spearphishing attempts delivered via third-party services (e.g., Gmail, LinkedIn messages) leading to malicious file downloads or browser-initiated script execution. Defender view includes correlation of external service logins, unexpected file write operations, and suspicious descendant processes spawned from productivity or browser applications.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "MonitoredServices", + "description": "List of third-party services (e.g., Gmail, LinkedIn, Dropbox) relevant to the organization\u2019s threat profile." + }, + { + "field": "SuspiciousProcessPatterns", + "description": "Process lineage and parent-child execution relationships considered abnormal (e.g., outlook.exe \u2192 powershell.exe)." + }, + { + "field": "TimeWindow", + "description": "Correlates file creation and outbound connection activity within a tunable time period after message receipt." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--d7a82fc6-047b-47a8-8b3c-d6dcab00d56b", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0116#AN0323", + "external_id": "AN0323" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0323", + "description": "Abuse of safe mode via BCD modification, boot configuration utilities (bcdedit.exe, bootcfg.exe), and registry persistence under SafeBoot keys. Defender view: suspicious boot configuration changes correlated with registry edits that enable adversary persistence or disable defenses.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--7f70fae7-a68d-4730-a83a-f260b9606129", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=12" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "SafeBootRegistryPaths", + "description": "Customize monitored registry paths for safe mode service additions." + }, + { + "field": "AllowedAdminTools", + "description": "Whitelist legitimate administrative use of bcdedit/bootcfg for troubleshooting." + }, + { + "field": "TimeWindow", + "description": "Correlate registry modifications and boot configuration commands within a short timeframe." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--5a9c1860-23ae-455e-bcab-0e0f91af5548", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0117#AN0325", + "external_id": "AN0325" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0325", + "description": "Creation or modification of `systemd` service units or cron jobs using deceptive naming and untrusted command paths, often followed by lateral network activity or privilege escalation.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--faa34cf6-cf32-4dc9-bd6a-8f7a606ff65b", + "name": "auditd:CONFIG_CHANGE", + "channel": "/var/log/audit/audit.log" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--74fa567d-bc90-425c-8a41-3c703abb221c", + "name": "linux:osquery", + "channel": "scheduled/real-time" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--7b375092-3a61-448d-900a-77c9a4bde4dc", + "name": "linux:cron", + "channel": "cron activity" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "UnitFilePath", + "description": "Unusual or user-space paths for systemd unit files" + }, + { + "field": "ServiceNameDeviation", + "description": "Detect units with names similar to legitimate ones (e.g., `networks.service` instead of `network.service`)" + }, + { + "field": "ExecStartPath", + "description": "Track uncommon or suspicious binaries in `ExecStart=` directives" + } + ], + "x_mitre_platforms": [ + "Linux" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"cron activity\", \"old_value\": \"/var/log/syslog or journalctl\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--f8c99f4f-f61e-436c-a093-c97969c9b038", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0118#AN0327", + "external_id": "AN0327" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0327", + "description": "Correlates inbound network access to remote service ports (e.g., SMB/RPC 445/135, RDP 3389, WinRM 5985/5986) with near-time instability in the target service (crash, abnormal restart), suspicious child process creation under the service, and post-access lateral-movement behaviors. The chain indicates likely exploitation rather than normal administration.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa", + "name": "WinEventLog:System", + "channel": "EventCode=1000" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=10" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Flow", + "channel": "Inbound connections to 445, 3389, 5985-5986 with high error/connection-reset rate, followed by new outbound sessions from the same host to internal assets within short interval." + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ServicePortSet", + "description": "List of monitored service ports (default: 445,135,3389,5985,5986,1433,3306)." + }, + { + "field": "TimeWindow", + "description": "Correlation window between inbound access and crash/child-process (default: 10 minutes)." + }, + { + "field": "AllowedAdminCIDRs", + "description": "Known management networks to suppress benign admin traffic." + }, + { + "field": "MinConnErrorRate", + "description": "Percent of failed/aborted connections to treat as anomalous (default: 30%)." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=1000\", \"old_value\": \"EventCode=7031,7034,1000,1001\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--a7666a4d-ece8-4e5b-ae85-d2987f14b950", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0119#AN0331", + "external_id": "AN0331" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0331", + "description": "Detects execution of image viewers or PowerShell scripts accessing or decoding files with mismatched MIME headers or embedded script-like byte patterns; often correlated with suspicious parent-child process lineage and outbound connections.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ParentProcessImage", + "description": "Tune to identify image editors/viewers invoking script interpreters (e.g., `mspaint.exe` > `powershell.exe`)" + }, + { + "field": "MimeHeaderMismatchTolerance", + "description": "Adjust tolerance for image file headers that do not match file extensions or content structure" + }, + { + "field": "TimeWindow", + "description": "Define the temporal range to correlate decoding \u2192 execution \u2192 network beaconing" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--7d0595b9-eca7-488d-bbc2-ed02ff4ced9b", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0120#AN0334", + "external_id": "AN0334" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0334", + "description": "Correlated user account modification (reset, disable, deletion) events with anomalous process lineage (e.g., PowerShell or net.exe from an interactive session), especially outside of IT admin change windows or by non-admin users.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--d27b0089-2c39-4b6c-84ff-303e48657e77", + "name": "WinEventLog:Security", + "channel": "EventCode=4723, 4724, 4740" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "UserContext", + "description": "Account performing the operation (e.g., Domain Admins vs. local users)" + }, + { + "field": "TimeWindow", + "description": "Alert only on actions outside of maintenance windows" + }, + { + "field": "ParentProcessName", + "description": "Detect suspicious process lineage (e.g., powershell.exe launching net.exe)" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4723, 4724, 4740\", \"old_value\": \"EventCode=4723, 4724, 4726, 4740\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--ba6c8c55-ee38-4219-a426-a3f1e04c7a8a", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0120#AN0338", + "external_id": "AN0338" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0338", + "description": "O365 UnifiedAuditLog entries for Remove-Mailbox or Set-Mailbox with account disable or delete actions correlated with suspicious login locations or MFA bypass.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--d6257b8e-869c-41c0-8731-fdca40858a91", + "name": "m365:unified", + "channel": "Remove-Mailbox, Set-Mailbox" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--a953ca55-921a-44f7-9b8d-3d40141aa17e", + "name": "m365:signinlogs", + "channel": "Sign-in from anomalous location or impossible travel condition" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "RoleAssignment", + "description": "Determine if operation was delegated to expected admin group" + }, + { + "field": "GeoThreshold", + "description": "Trigger on unusual geographic login sources" + } + ], + "x_mitre_platforms": [ + "Office Suite" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['name']\": {\"new_value\": \"m365:signinlogs\", \"old_value\": \"m365:signin\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--c223f997-8323-40c2-98c9-38a8a1779db4", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0122#AN0341", + "external_id": "AN0341" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0341", + "description": "Behavioral correlation of privileged registry key creation under the W32Time TimeProviders path combined with a new DLL written to disk and potential process activity by LocalService. Indicates abuse of Time Providers for persistence.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "RegistryPathScope", + "description": "May need to be tuned to only monitor `W32Time\\TimeProviders` subkey path for performance optimization" + }, + { + "field": "UserContext", + "description": "Should focus on activity from administrative or SYSTEM accounts" + }, + { + "field": "TimeWindow", + "description": "Controls correlation window between registry modification and DLL drop" + }, + { + "field": "DllPathEntropyThreshold", + "description": "Used for anomaly scoring on DLL path patterns (e.g., random names or temp directories)" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--198d4196-25f0-4e28-a95b-c89709f452ab", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0123#AN0342", + "external_id": "AN0342" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0342", + "description": "Detects removable drive insertion followed by unusual file access, compression, or staging activity by unauthorized users or unexpected processes.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d6e6b3b-4aa8-40e1-8c47-91db0f313d9f", + "name": "WinEventLog:System", + "channel": "EventCode=1006, 10001" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "DriveTypeFilter", + "description": "Filter on removable (e.g., USB) drives only." + }, + { + "field": "ProcessNameExclusionList", + "description": "Exclude known, approved backup or sync utilities." + }, + { + "field": "TimeWindow", + "description": "Limit correlation of file access and device mount to a defined window (e.g., <5 minutes)." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}, \"root['x_mitre_log_source_references'][3]['channel']\": {\"new_value\": \"EventCode=1006, 10001\", \"old_value\": \"EventCode=1006,10001\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--861ee805-c979-44c9-8b0c-86bd3a6f5872", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0124#AN0345", + "external_id": "AN0345" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0345", + "description": "Process invokes a standard encoder (e.g., PowerShell -enc, certutil -encode, base64 via .NET/Invoke-Expression) or emits long Base64/hex literals \u2192 shortly followed by outbound network egress with high bytes_out:bytes_in ratio or HTTP headers/payloads containing Base64/MIME blocks.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9f387817-df83-432a-b56b-a8fb7f71eedd", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a", + "name": "M365Defender:DeviceNetworkEvents", + "channel": "NetworkConnection: bytes_sent >> bytes_received anomaly" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "PayloadEntropyThreshold", + "description": "Shannon entropy cutoff to consider payload suspicious (e.g., > 4.5\u20135.0 for HTTP body)." + }, + { + "field": "B64LengthThreshold", + "description": "Min continuous Base64 token length in command lines/script blocks to alert (e.g., > 100 chars)." + }, + { + "field": "TimeWindow", + "description": "Correlation window between encoding event and egress (default 10m)." + }, + { + "field": "KnownAdminTools", + "description": "Legitimate tools (e.g., backup agents) that routinely encode/compress data." + }, + { + "field": "BytesOutToInRatio", + "description": "Minimum ratio to treat flow as asymmetric (e.g., \u2265 4:1)." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4103, 4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--904100f0-1af9-4ded-89be-dfda7180bcbc", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0124#AN0346", + "external_id": "AN0346" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0346", + "description": "Shell/utility (base64, xxd -p, od, openssl enc -base64, python/perl base64 libraries) encodes data \u2192 subsequent outbound connections (curl/wget/bash TCP, socat, python requests) with high asymmetry or Base64/MIME blobs in HTTP/DNS payloads.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "auditd:SYSCALL", + "channel": "execve of base64|openssl|xxd|python|perl with arguments matching Base64 flags" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Flow", + "channel": "http: HTTP body or headers contain long Base64 sections; gzip/deflate + Base64" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "EncodingToolsAllowList", + "description": "Build/backup jobs that legitimately call base64/openssl." + }, + { + "field": "EntropyThreshold", + "description": "Shannon entropy for payloads (e.g., >4.5)." + }, + { + "field": "TimeWindow", + "description": "Join window between exec and egress (default 10m)." + }, + { + "field": "OutInRatio", + "description": "Bytes_out / bytes_in threshold (default 4)." + } + ], + "x_mitre_platforms": [ + "Linux" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--e3d982ec-2729-4e98-b340-affa13096fd6", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0127#AN0355", + "external_id": "AN0355" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0355", + "description": "Adversary renames LOLBINs or deploys binaries with spoofed file names, internal PE metadata, or misleading icons to appear legitimate. File creation is followed by execution or service registration inconsistent with known usage.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--5297a638-1382-4f0c-8472-0d21830bf705", + "name": "WinEventLog:System", + "channel": "EventCode=7045" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "OriginalFilenameMismatch", + "description": "Compare executable file name with PE metadata OriginalFilename field" + }, + { + "field": "KnownSystemUtilityPaths", + "description": "Tune based on expected installation directories for signed binaries" + }, + { + "field": "TimeWindow", + "description": "Correlation window between file creation and service/process execution" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['name']\": {\"new_value\": \"WinEventLog:System\", \"old_value\": \"WinEventLog:Security\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--b3bad14e-39a8-4e90-b3e3-46974fd9c2bd", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0128#AN0360", + "external_id": "AN0360" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0360", + "description": "Suspicious use of scripting parameters or registry edits to hide process windows (e.g., powershell.exe -WindowStyle Hidden, or registry modifications pushing window positions off screen). Defender view: correlation of hidden execution with anomalous process lineage or hVNC-like CreateDesktop API calls.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "HiddenProcessScope", + "description": "Restrict to processes where hidden execution is unexpected (e.g., PowerShell, cmd, wscript)." + }, + { + "field": "ParentProcessCorrelation", + "description": "Correlate hidden execution with suspicious parent processes to reduce false positives." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--8f0ac116-4c8a-4819-b7c0-744e05d672c9", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0129#AN0363", + "external_id": "AN0363" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0363", + "description": "Adversary enumeration of domain accounts using net.exe, PowerShell, WMI, or LDAP queries from non-domain controllers or non-admin endpoints.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Flow", + "channel": "LDAP Bind/Search" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "CommandLinePattern", + "description": "Detect variations of 'net user /domain', 'Get-ADUser', 'Get-ADGroupMember'." + }, + { + "field": "TimeWindow", + "description": "Tune detection for bursts of enumeration commands or search queries." + }, + { + "field": "SourceHost", + "description": "Restrict detection to non-DC or non-admin systems where such commands are unexpected." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--1543bc4a-7614-417a-85b9-d67e3da0350c", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0131#AN0367", + "external_id": "AN0367" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0367", + "description": "Detects unusual outbound file transfer behavior using protocols like FTP, SMB, SMTP, or DNS, involving non-standard processes, off-hour activity, or uncommonly high volume.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "DataVolumeThresholdMB", + "description": "Set threshold for outbound volume (e.g., >50MB in a single connection)." + }, + { + "field": "ProtocolAllowList", + "description": "Allow-listed protocols in use for specific machines or users (e.g., FTP allowed for backups)." + }, + { + "field": "TimeWindow", + "description": "Define allowed time-of-day windows (e.g., flag after-hours file transfer)." + }, + { + "field": "ParentProcessAnomaly", + "description": "Identify anomalous parent-child process relationships (e.g., `winword.exe` spawning `ftp.exe`)." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--8dbd751b-a2cf-418a-b409-daae78a250f8", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0131#AN0370", + "external_id": "AN0370" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0370", + "description": "Detects access to cloud APIs or CLI tools to move or sync files from sensitive buckets to external endpoints using protocols like HTTPS or S3 APIs.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--58ef998c-f3bf-4985-b487-b1005f5c05d1", + "name": "AWS:CloudTrail", + "channel": "GetObject, CopyObject" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a", + "name": "AWS:VPCFlowLogs", + "channel": "Outbound data flows" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "IAMRoleContext", + "description": "Detect unauthorized use of roles for cloud storage manipulation." + }, + { + "field": "GeoDestinationThreshold", + "description": "Alert on outbound flows to geo-locations not seen in training baseline." + } + ], + "x_mitre_platforms": [ + "IaaS" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"GetObject, CopyObject\", \"old_value\": \"PutObject, GetObject, CopyObject, DeleteObject\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--aef3d563-19f5-4d52-b7ad-4c4abadcb568", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0135#AN0379", + "external_id": "AN0379" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0379", + "description": "Detects unauthorized use of SMTP/IMAP/POP3 by suspicious binaries (e.g., PowerShell, rundll32) to exfiltrate data or beacon via email, often bypassing proxy or content filters.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Flow", + "channel": "smtp.log" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ProcessImageName", + "description": "Limit to uncommon clients (e.g., scripts or CLI tools using .NET SMTP libraries)" + }, + { + "field": "DestPortFilter", + "description": "Typically 25, 587, 993, 995, or 465 \u2013 flag anomalies" + }, + { + "field": "AttachmentType", + "description": "Flag suspicious attachments (e.g., .zip, .7z, .bin)" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--f3478623-5b5c-482e-96f1-6b225ff8fa70", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0138#AN0388", + "external_id": "AN0388" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0388", + "description": "Execution of InstallUtil.exe from .NET framework directories with arguments specifying non-standard or attacker-supplied assemblies, especially when followed by suspicious child process creation or script execution. Detection also includes correlation of newly created binaries prior to InstallUtil invocation and anomalous command-line usage compared to historical baselines.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "InstallUtilPathRegex", + "description": "Regex pattern for InstallUtil.exe in .NET directories; tune to exclude known good administrative scripts" + }, + { + "field": "AssemblyPathRegex", + "description": "Patterns for identifying suspicious assemblies (e.g., in temp folders, user profiles)" + }, + { + "field": "ChildProcessList", + "description": "List of suspicious child processes spawned from InstallUtil.exe (e.g., cmd.exe, powershell.exe, rundll32.exe)" + }, + { + "field": "TimeWindow", + "description": "Time correlation window between file creation of assembly and its execution via InstallUtil.exe" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--b1ee9791-91f8-4788-9e08-c40eedbcf08b", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0140#AN0392", + "external_id": "AN0392" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0392", + "description": "Detects adversary behavior deleting artifacts (e.g., dropped payloads, evidence files) using native or external utilities (e.g., del, erase, SDelete). Detects deletion events correlated with unusual process lineage or timing post-execution.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--e905dad2-00d6-477c-97e8-800427abd0e8", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=23" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Defines correlation window after suspicious binary execution or login session." + }, + { + "field": "FilePathPattern", + "description": "Focuses on deletion of temp files, malware staging dirs, or known indicators." + }, + { + "field": "UserContext", + "description": "Privilege level or impersonated user deleting sensitive files." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--704bd588-a82b-4139-92ef-6dc6a48581c8", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0143#AN0400", + "external_id": "AN0400" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0400", + "description": "Processes that typically do not perform cryptographic operations loading symmetric encryption libraries (e.g., bcryptprimitives.dll, aes.dll), then initiating outbound connections with high-entropy payloads. Defender correlates process creation, DLL load, and anomalous encrypted traffic patterns.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "AllowedCryptoProcesses", + "description": "Processes normally expected to use symmetric crypto (e.g., disk encryption, secure messaging)." + }, + { + "field": "EntropyThreshold", + "description": "Minimum payload entropy score for flagging unusual encrypted sessions." + }, + { + "field": "TimeWindow", + "description": "Correlation window between module load and encrypted connection creation." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--fd614a66-7e99-4a69-9070-3c11036f0335", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0144#AN0405", + "external_id": "AN0405" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0405", + "description": "Detects forged Kerberos Golden Tickets by correlating anomalous Kerberos ticket lifetimes, unexpected encryption types (e.g., RC4 in modern domains), malformed fields in logon/logoff events, and TGS requests without preceding TGT requests. Also monitors for abnormal patterns of access associated with elevated privileges across multiple systems.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--39b9db72-8b48-4595-a18d-db5bbba3091b", + "name": "WinEventLog:Security", + "channel": "EventCode=4672, 4634" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--02d090b6-8157-48da-98a2-517f7edd49fc", + "name": "WinEventLog:Security", + "channel": "EventCode=4769" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=10" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TicketLifetimeThreshold", + "description": "Kerberos TGT ticket lifetime exceeding default domain duration; tunable to environment-specific policies." + }, + { + "field": "AllowedEncryptionTypes", + "description": "Valid encryption algorithms for Kerberos tickets; anomalies (e.g., RC4) may indicate forgery." + }, + { + "field": "PrivilegedAccountPatterns", + "description": "Baseline of privileged accounts expected to perform Kerberos operations; deviations indicate suspicious activity." + }, + { + "field": "ProcessAllowlist", + "description": "Expected processes interacting with lsass.exe; deviations may indicate credential dumping." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4672, 4634\", \"old_value\": \"EventCode=4624, 4634, 4672, 4768, 4769\"}, \"root['x_mitre_log_source_references'][1]['name']\": {\"new_value\": \"WinEventLog:Security\", \"old_value\": \"WinEventLog:Kerberos\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4769\", \"old_value\": \"EventCode=4769, 4768\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--df0f8f0a-1e92-415d-b15e-63cea928973a", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0145#AN0406", + "external_id": "AN0406" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0406", + "description": "Detection of firewall tampering by monitoring processes executing netsh, PowerShell Set-NetFirewallProfile, or sc stop mpssvc. Registry modifications under HKLM\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy also indicate adversarial actions.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "MonitoredCommands", + "description": "List of admin tools and scripts allowed to legitimately modify firewall settings." + }, + { + "field": "AlertThreshold", + "description": "Number of firewall rule changes within a time window before triggering alert." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--3cb835e5-ded1-42c4-a5cc-38911078b0a5", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0148#AN0418", + "external_id": "AN0418" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0418", + "description": "Forged SAML tokens can be observed as authentication attempts with valid signatures but missing expected preceding Kerberos or authentication events. Defenders may correlate SAML assertions with absent Event IDs 4769, 1200, or 1202, or tokens issued with abnormal lifetimes, issuers, or claims compared to baseline.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--39b9db72-8b48-4595-a18d-db5bbba3091b", + "name": "azure:signinlogs", + "channel": "SAML-based login with anomalous issuer or NotOnOrAfter lifetime" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--a953ca55-921a-44f7-9b8d-3d40141aa17e", + "name": "WinEventLog:Security", + "channel": "EventCode=4769, 1200, 1202" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TokenLifetimeThreshold", + "description": "Defines the maximum expected lifetime of a SAML token (e.g., >1 hour considered anomalous)." + }, + { + "field": "TrustedIssuerList", + "description": "List of approved SAML issuers and certificate thumbprints." + } + ], + "x_mitre_platforms": [ + "Identity Provider" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--39b9db72-8b48-4595-a18d-db5bbba3091b\", \"name\": \"azure:signinlogs\", \"channel\": \"SAML-based login with anomalous issuer or NotOnOrAfter lifetime\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--39b9db72-8b48-4595-a18d-db5bbba3091b\", \"name\": \"azure:signinLogs\", \"channel\": \"SAML-based login with anomalous issuer or NotOnOrAfter lifetime\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--a953ca55-921a-44f7-9b8d-3d40141aa17e\", \"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4769, 1200, 1202\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--a953ca55-921a-44f7-9b8d-3d40141aa17e\", \"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4769,1200,1202\"}}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--5d2820b1-af59-4ca2-9f9e-b5bc76f55395", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0148#AN0420", + "external_id": "AN0420" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0420", + "description": "Forged SAML tokens may be used on Windows systems to authenticate to federated apps without normal Kerberos activity. Defenders may detect anomalous event correlation, where access to SaaS/O365 via SAML occurs without prior TGT requests or user logons.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--5f7c9def-0ddf-423b-b1f8-fb2ddeed0ce3", + "name": "WinEventLog:ADFS", + "channel": "Token issuance events showing anomalous claims or issuers" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ClaimAnomalyThreshold", + "description": "Number of unusual claims in a SAML token (e.g., excessive privileges)." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4624, 4648\", \"old_value\": \"EventCode=4624\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--d265376d-3cdc-4e95-a8ea-4c4278860218", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0149#AN0423", + "external_id": "AN0423" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0423", + "description": "Detects data access or staging events followed by outbound data flows using unencrypted protocols (e.g., FTP, HTTP) initiated by unexpected processes or to rare destinations.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Flow", + "channel": "http.log, ftp.log" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "UnencryptedProtocolList", + "description": "Set of protocols considered suspicious for outbound data exfiltration (e.g., FTP, HTTP)." + }, + { + "field": "DataTransferSizeThreshold", + "description": "Defines what amount of outbound data is considered abnormal for a host/user." + }, + { + "field": "ParentProcessDenylist", + "description": "Processes that should not launch FTP/HTTP clients (e.g., winword.exe launching ftp.exe)." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--7edc8ff6-0616-4fab-a7b7-1bd3d08cc0b1", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 17:35:05.178000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0150#AN0428", + "external_id": "AN0428" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0428", + "description": "Detection of raw access to physical drives, modification of boot records (MBR/VBR), and suspicious file creation or alteration within the EFI System Partition (ESP). Correlates privileged process execution with low-level disk modification and unexpected driver or firmware interactions.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--73ff2dcc-24b1-4368-b9dc-706dd9e68354", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=9" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "KnownGoodMBRHashes", + "description": "Baseline hashes of clean MBR/VBR sectors for comparison" + }, + { + "field": "ESPFileWhitelist", + "description": "Approved EFI executables within ESP directories" + }, + { + "field": "TimeWindow", + "description": "Correlation window between privileged access, raw disk modification, and EFI file creation" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 17:35:05.178000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_source_references'][1]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--0f72bf50-35b3-419d-ab95-70f9b6a818dd\", \"name\": \"WinEventLog:Security\", \"channel\": \"4673, 4674\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--bd34c127-9956-4616-999d-229f30512f74", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0151#AN0430", + "external_id": "AN0430" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0430", + "description": "Untrusted or unusual process/script (cmd.exe, powershell.exe, w32tm.exe, net.exe, custom binaries) queries system time/timezone (e.g., w32tm /tz, net time \\\\host, Get-TimeZone, GetTickCount API) and (optionally) is followed within a short window by time-based scheduling or conditional execution (e.g., schtasks /create, at.exe, PowerShell Start-Sleep with large values).", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=10" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e", + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "High-frequency or suspicious sequence of QueryPerformanceCounter/GetTickCount API calls from a non-standard process lineage" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--f42df6f0-6395-4f0c-9376-525a031f00c3", + "name": "WinEventLog:TaskScheduler", + "channel": "EventCode=106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--7b375092-3a61-448d-900a-77c9a4bde4dc", + "name": "WinEventLog:TaskScheduler", + "channel": "Task registration/execution shortly after a time discovery event" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--ee575f4a-2d4f-48f6-b18b-89067760adc1", + "name": "EDR:Telemetry", + "channel": "Process lineage and API usage enrichment (GetSystemTime, GetTimeZoneInformation, NtQuerySystemTime)" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlation window (e.g., 5\u201315 minutes) between time discovery and follow-on scheduling/conditional actions." + }, + { + "field": "AllowedParents", + "description": "Legitimate parent processes (e.g., corporate scripts, management agents) that frequently call time APIs." + }, + { + "field": "CommandlineKeywordList", + "description": "Extend/restrict keyword list for time queries (e.g., custom PS functions, .NET calls)." + }, + { + "field": "UserContextScope", + "description": "Restrict to non-service, non-administrative, or newly created/rare users." + }, + { + "field": "ProcessPrevalenceThreshold", + "description": "Frequency threshold to exclude common estate-wide benign usage." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][4]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4103\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--9f2278c6-2e45-42fb-a1f9-00f02d496c53", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0151#AN0431", + "external_id": "AN0431" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0431", + "description": "A process (often spawned by a shell, interpreter, or malware implant) executes time discovery via commands (date, timedatectl, hwclock, cat /etc/timezone, /proc/uptime) or direct syscalls (time(), clock_gettime) and is (optionally) followed by scheduled task creation/modification (crontab, at) or conditional sleep logic.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "auditd:SYSCALL", + "channel": "type=EXECVE or SYSCALL for /bin/date, /usr/bin/timedatectl, /sbin/hwclock, /bin/cat /etc/timezone, /bin/cat /proc/uptime" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e", + "name": "auditd:SYSCALL", + "channel": "Rules capturing clock_gettime, time, gettimeofday syscalls when enabled" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--a953ca55-921a-44f7-9b8d-3d40141aa17e", + "name": "linux:syslog", + "channel": "sudo/date/timedatectl execution by non-standard users" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--7b375092-3a61-448d-900a-77c9a4bde4dc", + "name": "linux:cron", + "channel": "cron activity" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "AuditRulesSyscalls", + "description": "Scope of syscalls (time, clock_gettime, gettimeofday) monitored; may be performance-sensitive." + }, + { + "field": "AllowedBinaries", + "description": "List of legitimate automation/orchestration tools frequently querying time." + }, + { + "field": "TimeWindow", + "description": "Correlation window (e.g., 5\u201320 minutes) to link time discovery to follow-on cron/at changes." + }, + { + "field": "UserContextScope", + "description": "Ignore root-owned maintenance agents if desired; focus on interactive or newly created users." + } + ], + "x_mitre_platforms": [ + "Linux" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][3]['name']\": {\"new_value\": \"linux:cron\", \"old_value\": \"linux::cron\"}, \"root['x_mitre_log_source_references'][3]['channel']\": {\"new_value\": \"cron activity\", \"old_value\": \"crontab or at job created within TimeWindow post time discovery\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--98bd8e15-68ea-43a3-982b-66fcd1142c9a", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0153#AN0436", + "external_id": "AN0436" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0436", + "description": "Unusual processes (e.g., powershell.exe, wscript.exe, mshta.exe) posting data to webhook endpoints (Discord, Slack, webhook.site) using HTTP POST/PUT requests. Defender perspective: suspicious process lineage followed by outbound HTTPS traffic to webhook domains.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "WebhookDomains", + "description": "Domains to monitor such as discord.com/api/webhooks, slack.com/api, webhook.site." + }, + { + "field": "UploadSizeThreshold", + "description": "Threshold for abnormal data sent via webhook requests." + }, + { + "field": "ApprovedApps", + "description": "List of approved business apps using webhooks to reduce noise." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--86dbac4c-1cba-4056-84a1-604eefbb11ac", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0154#AN0441", + "external_id": "AN0441" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0441", + "description": "Unusual screensaver (.scr) executions correlated with recent registry modifications to HKCU\\Control Panel\\Desktop values such as SCRNSAVE.exe, ScreenSaveTimeout, and ScreenSaveActive. Detection focuses on PE image paths not consistent with known legitimate screensavers and triggered after user inactivity timeout.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Adjust the user inactivity threshold that defines 'screensaver trigger window'; shorter timeouts may increase sensitivity." + }, + { + "field": "SuspiciousPathRegex", + "description": "Allow tuning based on expected paths for legitimate .scr files vs suspicious locations (e.g., user temp directories)." + }, + { + "field": "ParentProcessAllowList", + "description": "Allowlisting known legitimate initiators of .scr files (e.g., user32.dll context) to reduce false positives." + }, + { + "field": "RegistryEditorProcessName", + "description": "Monitor for registry modification performed by unusual processes (e.g., powershell.exe, reg.exe)." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--4ab972bf-623b-418b-9647-2c3a56b55083", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0157#AN0444", + "external_id": "AN0444" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0444", + "description": "Detects Kerberoasting attempts by monitoring for anomalous Kerberos TGS requests (Event ID 4769) with RC4 encryption (etype 0x17), accounts requesting an unusual number of service tickets in a short period, or service accounts targeted outside normal usage baselines. Also correlates suspicious process activity (e.g., Mimikatz invoking LSASS access) with Kerberos ticket anomalies.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--02d090b6-8157-48da-98a2-517f7edd49fc", + "name": "WinEventLog:Security", + "channel": "EventCode=4769" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=10" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--39b9db72-8b48-4595-a18d-db5bbba3091b", + "name": "WinEventLog:Security", + "channel": "EventCode=4672" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TGSRequestThreshold", + "description": "Number of TGS requests per account within a defined window; higher than baseline may indicate Kerberoasting." + }, + { + "field": "AllowedEncryptionTypes", + "description": "Permitted Kerberos encryption algorithms; RC4 (etype 0x17) usage in modern environments is suspicious." + }, + { + "field": "ServiceAccountBaselines", + "description": "Expected SPNs requested by specific accounts; anomalies may indicate adversarial targeting." + }, + { + "field": "TimeWindow", + "description": "Correlation window for bursts of TGS requests; adjustable to reduce false positives." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4624, 4648\", \"old_value\": \"EventCode=4624\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--f27c0482-fbea-47a3-9b19-7302a058a9e5", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0158#AN0445", + "external_id": "AN0445" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0445", + "description": "Detection of msiexec.exe execution where command-line arguments reference remote MSI packages, UNC paths, HTTP/HTTPS URLs, or DLLs, correlated with subsequent module loads and/or network connections to previously unseen destinations. The behavioral chain links process creation of msiexec.exe with suspicious parameters, network activity to retrieve payloads, and module loading indicative of malicious installation or DLL execution.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "SuspiciousCommandlinePatterns", + "description": "Patterns for identifying malicious msiexec.exe usage (e.g., UNC paths, external domains, DLL execution flags)" + }, + { + "field": "SuspiciousDestinationList", + "description": "List of external domains or IP ranges considered suspicious for msiexec network connections" + }, + { + "field": "TimeWindow", + "description": "Time range in seconds/minutes for correlating msiexec.exe execution with module load and network activity" + }, + { + "field": "LegitimateMSIHashes", + "description": "Hash list of MSI packages considered known-good to reduce false positives" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--e1e76ffd-b452-429e-8ea0-a25ba877a2b5", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0159#AN0446", + "external_id": "AN0446" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0446", + "description": "Detection of USB-based remote access hardware (e.g., TinyPilot, PiKVM) attached to the host via drive or peripheral enumeration, triggering vendor identifiers or unusual EDID announcements.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d6e6b3b-4aa8-40e1-8c47-91db0f313d9f", + "name": "WinEventLog:System", + "channel": "EventCode=2003" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "VendorID", + "description": "Device vendor strings may need tuning to include additional remote hardware sources." + }, + { + "field": "SerialNumber", + "description": "Serial numbers for known implants can vary per campaign and may need expansion." + }, + { + "field": "TimeWindow", + "description": "Adjust the detection window for peripheral enumeration based on environment and operating hours." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['name']\": {\"new_value\": \"WinEventLog:System\", \"old_value\": \"WinEventLog:Microsoft-Windows-DriverFrameworks-UserMode/Operational\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--ae82099a-0baf-4887-953c-67ef5e2d4470", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0161#AN0455", + "external_id": "AN0455" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0455", + "description": "Cause\u2192effect chain: (1) a user or service spawns a shell/PowerShell that queries local/domain password policy via commands/cmdlets (e.g., `net accounts`, `Get-ADDefaultDomainPasswordPolicy`, `secedit /export`); (2) optional directory/LDAP reads from DCs; (3) same principal performs adjacent Discovery or credential-related actions within a short window. Correlate sysmon process creation with PowerShell ScriptBlock and Security logs.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--5c6de881-bc70-4070-855a-7a9631a407f7", + "name": "WinEventLog:Security", + "channel": "EventCode=4662" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlation window between policy query and adjacent suspicious activity (e.g., 15\u201330 minutes)." + }, + { + "field": "PrivilegedUserAllowList", + "description": "Accounts (e.g., Helpdesk) allowed to run policy queries routinely." + }, + { + "field": "HostRoleScope", + "description": "Limit alerts on DCs/management servers; raise on user workstations/VDI." + }, + { + "field": "PS_ScriptBlockPatterns", + "description": "Cmdlet/function names to treat as high-signal in your environment." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--98d733c2-370b-4cd0-8ec6-226a1ca19604", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0162#AN0462", + "external_id": "AN0462" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0462", + "description": "Adversary installs/uses packet-capture or raw-socket capability (WinPcap/Npcap, wpcap/packet DLLs or raw socket attach) and sets a filter. A crafted inbound packet is observed; within a short window the host process that loaded capture libraries initiates an outbound connection (e.g., reverse shell) to the packet origin.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--5297a638-1382-4f0c-8472-0d21830bf705", + "name": "WinEventLog:System", + "channel": "EventCode=7045" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3551476e-14f5-4e48-a518-e82135329e03", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=6" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Flow", + "channel": "Single, low-volume inbound packet (REJ/S0/OTH or uncommon dport/protocol) from src_ip followed by outbound SF connection to src_ip." + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Seconds to correlate inbound trigger \u2192 process library load/driver start \u2192 outbound connect (default 120s)." + }, + { + "field": "CaptureLibIndicators", + "description": "DLL/driver names to match (wpcap.dll, packet.dll, npcap.sys, npf.sys) \u2013 extend for EDR drivers in your fleet." + }, + { + "field": "AllowedInstallers", + "description": "Signed/expected processes allowed to install/start Npcap (software distribution tools)." + }, + { + "field": "ReversePorts", + "description": "Likely egress ports to watch after trigger (4444, 53, 80/443, 8080, high ephemeral)." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--01b79770-a269-4b4d-bf09-a4760bae9c94", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0165#AN0469", + "external_id": "AN0469" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0469", + "description": "Detects PowerShell `Clear-History` invocation or deletion of `ConsoleHost_history.txt` to erase past PowerShell session history.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--e905dad2-00d6-477c-97e8-800427abd0e8", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=23" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "HistoryFilePath", + "description": "Path to PSReadLine file, typically in APPDATA." + }, + { + "field": "UserContext", + "description": "User account or role performing deletion (e.g., low-priv user deleting history)." + }, + { + "field": "CommandPattern", + "description": "Support detection of `Clear-History` and variations." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--c94b2c2b-8885-4f5e-abec-e80ab0a24f21", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0166#AN0472", + "external_id": "AN0472" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0472", + "description": "Adversary registers a malicious Microsoft Exchange transport agent DLL (.NET assembly), configures it via PowerShell or Exchange Management Shell, and persists code execution by manipulating email processing logic based on rules or headers.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa", + "name": "WinEventLog:Application", + "channel": "Exchange Transport Service loads unusual .NET assembly or errors upon transport agent execution" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "May need tuning based on frequency of Exchange agent updates in environment." + }, + { + "field": "AssemblyPath", + "description": "Specific DLL paths used by Exchange for registered agents may vary between deployments." + }, + { + "field": "CmdletInvocationThreshold", + "description": "Tunable threshold for repeated use of transport agent management cmdlets." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--305c684a-2b36-4209-9d00-778ed16de763", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0171#AN0484", + "external_id": "AN0484" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0484", + "description": "Forged web cookies on Windows endpoints can be detected by monitoring unusual modifications of browser cookie stores (e.g., Chrome SQLite DB, Edge cache) by processes outside of browsers, followed by authentication events to SaaS or IaaS services. Defenders may observe processes writing directly to cookie storage paths or injecting tokens into browser sessions.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "BrowserCookiePaths", + "description": "List of monitored cookie file paths on Windows systems." + }, + { + "field": "ProcessWhitelist", + "description": "Approved processes allowed to write to browser cookie stores." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4624, 4648\", \"old_value\": \"EventCode=4624\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--7b981ab1-eb5f-4ad0-a819-90db819a4431", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0171#AN0485", + "external_id": "AN0485" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0485", + "description": "On Linux, defenders may observe forged cookie activity as unauthorized modifications to browser cookie databases (e.g., ~/.mozilla/firefox/*/cookies.sqlite, ~/.config/chromium/Default/Cookies) or scripted injection of session tokens. Suspicious usage includes curl/wget commands embedding forged cookies in headers, correlated with abnormal session activity in SaaS or IaaS logs.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "auditd:SYSCALL", + "channel": "Unusual processes accessing or modifying cookie databases" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "CredentialFilePaths", + "description": "Paths to cookie/session storage files to monitor." + } + ], + "x_mitre_platforms": [ + "Linux" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--8c03988c-3387-48e4-8013-7b9d223b8911", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0173#AN0489", + "external_id": "AN0489" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0489", + "description": "High-frequency, repetitive service requests (e.g., HTTP, TLS renegotiation) originating from a single or small set of source IPs targeting endpoint web services or application ports, leading to exhaustion of CPU or memory on targeted Windows services.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa", + "name": "WinEventLog:Application", + "channel": "Unexpected spikes in request volume, application-level errors, or thread pool exhaustion in web or API logs" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6", + "name": "Windows:perfmon", + "channel": "Sustained CPU/memory exhaustion by service process (e.g., w3wp.exe)" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Defines burst threshold (e.g., 1 min, 5 min) for connection spikes" + }, + { + "field": "TargetServicePort", + "description": "Specific ports/services likely to be abused (e.g., 80, 443, 8080)" + }, + { + "field": "CPUThreshold", + "description": "Level of sustained CPU usage considered anomalous for a given service" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--35701083-a327-4f68-a426-13751b9743c3", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0176#AN0498", + "external_id": "AN0498" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0498", + "description": "Correlated evidence of anomalous browser/network behavior (suspicious external resource fetches and script injection patterns) followed by atypical child processes, ephemeral execution contexts, memory modification or process injection, and unexpected file drops. Defender sees network requests to previously unseen/suspicious domains or resources + browser process spawning unusual children or loading unsigned modules + file writes or registry changes shortly after those requests.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa", + "name": "WinEventLog:Application", + "channel": "Browser or plugin/application logs showing script errors, plugin enumerations, or unusual extension load events" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--d5fca4e4-e47a-487b-873f-3d22f8865e96", + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "Memory Modification / Unmapped module load or suspicious RWX allocations in the process space of a browser process" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Flow", + "channel": "http.request: HTTP requests and responses for specific script resources, unexpected content-types (application/octet-stream for script URLs), suspicious referrers, or obfuscated javascript resources" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlation time window between suspicious network fetch and subsequent process/file events. Tweak for environment latency and caching; default 2 minutes." + }, + { + "field": "KnownGoodDomainsList", + "description": "Allowlist of high-volume, benign domains used by corporate sites or CDNs to reduce false positives." + }, + { + "field": "PayloadEntropyThreshold", + "description": "Entropy threshold for downloaded script/binary content to surface likely obfuscated/packed payloads." + }, + { + "field": "UserContext", + "description": "Exclude or treat differently known administrative service accounts or build machines versus end-user contexts." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4624, 4648\", \"old_value\": \"EventCode=4624\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--7c91d6c7-4591-41b1-9c08-0c0660b07d24", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0178#AN0504", + "external_id": "AN0504" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0504", + "description": "Detection of VNC service or executable starting unexpectedly, followed by user session creation and interactive desktop activity (mouse/keyboard simulation).", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a", + "name": "NSM:Flow", + "channel": "port 5900 inbound" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlate VNC process with user logon activity within defined time span" + }, + { + "field": "VNCBinaryList", + "description": "Trackable VNC executable names (e.g., vncserver.exe, winvnc.exe)" + }, + { + "field": "LogonType", + "description": "Limit detection to interactive logons (type 10)" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4624, 4648\", \"old_value\": \"EventCode=4624\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--d14cc347-9e27-479d-8347-1a5950cdd70c", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0179#AN0507", + "external_id": "AN0507" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0507", + "description": "Detection of adversary enumeration of domain or local group memberships via native tools such as net.exe, PowerShell, or WMI. This activity may precede lateral movement or privilege escalation.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "CommandLineRegex", + "description": "Regex filters for matching suspicious group enumeration commands (e.g., 'net group', 'Get-ADGroupMember')." + }, + { + "field": "TimeWindow", + "description": "Time threshold for correlating group discovery with subsequent suspicious activity (e.g., lateral movement)." + }, + { + "field": "UserContext", + "description": "Whether the user performing discovery is in a sensitive group or running under unusual context (e.g., non-admin querying Domain Admins)." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--8a2537c3-9e9a-482d-81e2-281f88cf8878", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0182#AN0513", + "external_id": "AN0513" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0513", + "description": "Process or script enumerates network shares via CLI (net view/net share, PowerShell Get-SmbShare/WMI) or OS APIs (NetShareEnum/ srvsvc.NetShareEnumAll RPC) \u2192 bursts of outbound SMB/RPC connections (445/139, \\\\host\\IPC$ / srvsvc) to many hosts inside a short window \u2192 optional follow-on file listing or copy operations.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--b9a1578e-8653-4103-be23-cb52e0b1816e", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=17" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e", + "name": "etw:Microsoft-Windows-RPC", + "channel": "rpc_call: srvsvc.NetShareEnum / NetShareEnumAll from non-admin or unusual processes" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "BurstHostThreshold", + "description": "Minimum number of unique destination hosts over SMB within TimeWindow to treat as scanning (e.g., \u22655)." + }, + { + "field": "TimeWindow", + "description": "Correlation window between the discovery process start and SMB fan-out (default 10m)." + }, + { + "field": "AllowedDiscoveryAccounts", + "description": "Service/admin accounts legitimately running inventory scripts." + }, + { + "field": "PipeNameAllowList", + "description": "Pipes (e.g., \\PIPE\\spoolss) normally accessed by management agents; exclude from alerts." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}, \"root['x_mitre_log_source_references'][3]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4103\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--4416c78b-902b-4baa-9a5d-26f0b7e5d78d", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0184#AN0520", + "external_id": "AN0520" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0520", + "description": "Monitors sequences involving deletion/modification of logs, registry keys, scheduled tasks, or prefetch files following suspicious process activity or elevated access escalation.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--e905dad2-00d6-477c-97e8-800427abd0e8", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=23" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa", + "name": "WinEventLog:Security", + "channel": "EventCode=1102" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlate indicator removal within X mins after persistence/setup activities" + }, + { + "field": "TargetFilePathPattern", + "description": "Customize detection to log file paths or common registry hives" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--705168ad-1701-453c-9aea-c75029492b89", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0187#AN0535", + "external_id": "AN0535" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0535", + "description": "Detection of attempts to disable or tamper with Windows Event Logging. This includes stopping or disabling the EventLog service, modifying registry keys related to EventLog and Autologger, using `auditpol` or `wevtutil` to disable categories or clear audit policies, and detecting suspicious gaps or resets in event logs. Defenders observe registry changes, service state changes, process execution of disabling commands, and anomalies in event record sequences.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--74fa567d-bc90-425c-8a41-3c703abb221c", + "name": "WinEventLog:System", + "channel": "EventCode=7035" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa", + "name": "WinEventLog:Security", + "channel": "EventCode=1102" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "AuthorizedAdminAccounts", + "description": "List of accounts authorized to legitimately modify audit policies or disable services." + }, + { + "field": "TimeWindow", + "description": "Correlation window between registry modification, service stop, and audit policy commands." + }, + { + "field": "ServiceNames", + "description": "Customizable set of monitored services such as EventLog, Sysmon, or custom loggers." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--2c94147a-a556-4fa1-92f8-d3c4367f6f2e", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0189#AN0540", + "external_id": "AN0540" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0540", + "description": "Detection of known tools or malware flagged by antivirus, followed by a near-term drop of a similar binary with modified signature and resumed activity (execution, C2, or persistence).", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa", + "name": "WinEventLog:Application", + "channel": "EventCode=1000" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "AVAlertMessage", + "description": "Vendor-specific signature string or detection message that can be correlated to threat intel context." + }, + { + "field": "TimeWindow", + "description": "The time between AV alert and similar file/process activity (e.g., 5\u201330 minutes)" + }, + { + "field": "FilenameSimilarityThreshold", + "description": "String or hash similarity thresholds between original and modified binary." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=1000\", \"old_value\": \"EventCode=1000-1026\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--a09ed72b-be04-475f-8c0a-11ed47b40bd1", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0192#AN0551", + "external_id": "AN0551" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0551", + "description": "Suspicious creation or modification of inbox rules through PowerShell (New-InboxRule, Set-InboxRule) to automatically delete, move, or hide emails. Defender perspective: unusual rule activity correlated with mailbox access and filtering patterns.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:Security", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa", + "name": "m365:unified", + "channel": "New-InboxRule or Set-InboxRule events recorded in Exchange Online" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "SuspiciousKeywords", + "description": "Keywords like 'phish', 'malware', 'suspicious' used in inbox rules to hide emails." + }, + { + "field": "UserContext", + "description": "Scope mailbox monitoring to high-value users such as executives or admins." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--e08eb9fa-4a45-434b-9776-277bd545f1f7", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0193#AN0555", + "external_id": "AN0555" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0555", + "description": "Identify unauthorized creation, deletion, or modification of business-critical stored data such as Office documents, database files, and log archives. Detect anomalous processes modifying stored data outside of expected workflows (e.g., non-database processes modifying database files).", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--e905dad2-00d6-477c-97e8-800427abd0e8", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=23" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--639e87f3-acb6-448a-9645-258f20da4bc5", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=15" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "MonitoredDirectories", + "description": "Paths to sensitive stored data files such as database directories or email archives." + }, + { + "field": "AuthorizedProcesses", + "description": "List of legitimate processes expected to create, delete, or modify stored data." + }, + { + "field": "TimeWindow", + "description": "Threshold for correlating multiple suspicious file operations within a short period." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][3]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4656,4663\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--edfec58e-e591-4057-a906-1baf3674d80b", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0195#AN0559", + "external_id": "AN0559" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0559", + "description": "Execution of built-in tools (e.g., ipconfig, route, netsh) or PowerShell/WMI queries to enumerate IP, MAC, interface status, or routing configuration.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ParentProcess", + "description": "Filter known/legit CLI chains (e.g., explorer.exe \u2192 cmd.exe) to reduce FP" + }, + { + "field": "UserContext", + "description": "Target executions by non-admin or unexpected users" + }, + { + "field": "TimeWindow", + "description": "Cluster enumeration commands within short time windows" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--e5cb92b6-75b0-4eed-aa1e-4ea529f50fbb", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0196#AN0564", + "external_id": "AN0564" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0564", + "description": "Suspicious outbound HTTPS connections where the TLS Server Name Indication (SNI) does not match the HTTP Host header, indicating potential use of domain fronting to mask C2 traffic via CDNs.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Connections", + "channel": "TLS handshake + HTTP headers" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "SNIHostMismatch", + "description": "Define acceptable mismatch ratio between SNI and HTTP Host fields based on legitimate domain usage patterns." + }, + { + "field": "CDNAllowList", + "description": "Whitelist of known safe CDN front-end domains (e.g., `cdn.company.com`)." + }, + { + "field": "ProcessInitiator", + "description": "Filter for suspicious initiators of domain fronting, e.g., scripting engines, lolbins, unknown binaries." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--171803bb-8aa7-42df-861a-18d6d694f909", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0197#AN0568", + "external_id": "AN0568" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0568", + "description": "A non-standard process (or script-hosted process) loads camera/video-capture libraries (e.g., avicap32.dll, mf.dll, ksproxy.ax), opens the Camera Frame Server/device, writes video/image artifacts (e.g., .mp4/.avi/.yuv) to unusual locations, and optionally initiates outbound transfer shortly after.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--ee575f4a-2d4f-48f6-b18b-89067760adc1", + "name": "WinEventLog:Microsoft-Windows-Windows Camera Frame Server/Operational", + "channel": "Process session start/stop events for camera pipeline by unexpected executables" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlation window (e.g., 0\u201320 minutes) between device access, file creation, and egress." + }, + { + "field": "AllowedProcesses", + "description": "Known legitimate camera consumers (e.g., Teams.exe, zoom.exe, obs64.exe) to suppress." + }, + { + "field": "VideoExtensions", + "description": "List of extensions to flag (.mp4, .avi, .mov, .yuv, .mkv, .h264) \u2013 tune for your estate." + }, + { + "field": "RarePathRegex", + "description": "Regex for unusual storage locations (e.g., %TEMP%\\*, C:\\Windows\\Tasks\\*, user profile hidden dirs)." + }, + { + "field": "MinFileSizeMB", + "description": "Minimum size to reduce FP from thumbnails/snapshots." + }, + { + "field": "ParentProcessAllowList", + "description": "Service/agent parents permitted to broker camera access." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}, \"root['x_mitre_log_source_references'][4]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4656\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--9f3aea30-e100-432a-8aa0-959bd7f4e069", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0200#AN0576", + "external_id": "AN0576" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0576", + "description": "Cause\u2192effect chain: (1) A user or service launches an indirection utility (e.g., forfiles.exe, pcalua.exe, wsl.exe, scriptrunner.exe, ssh.exe with -o ProxyCommand/LocalCommand). (2) That utility spawns a secondary program/command (PowerShell, cmd, msiexec, regsvr32, curl, arbitrary EXE) and/or opens outbound network connections. (3) Optional precursor modification of SSH config to persist LocalCommand/ProxyCommand. Correlate process creation, command/script content, file access to %USERPROFILE%\\.ssh\\config, and network connections from the utility or its child.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlation window between indirect launcher and spawned child/network activity (e.g., 10\u201330 minutes)." + }, + { + "field": "AllowedUtilities", + "description": "Utilities permitted on admin/Jumphosts (forfiles, wsl, ssh) to reduce noise." + }, + { + "field": "HighRiskChildren", + "description": "Child images that indicate abuse (powershell.exe, cmd.exe, rundll32.exe, regsvr32.exe, mshta.exe, msiexec.exe, curl.exe, bitsadmin.exe)." + }, + { + "field": "UserContext", + "description": "Raise severity when the actor is a standard/interactive user on a workstation rather than a server or CI agent." + }, + { + "field": "DestCIDRs", + "description": "Known-good egress networks for SSH/WSL activity to suppress expected admin automations." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--61729716-59f3-433e-a678-101c18040851", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 17:13:52.357000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0204#AN0580", + "external_id": "AN0580" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0580", + "description": "Detects suspicious registry modifications under `HKLM\\SYSTEM\\CurrentControlSet\\Control\\Print\\Monitors\\*\\Driver`, DLL loads by `spoolsv.exe` of non-standard or unsigned modules, and abnormal usage of the `AddMonitor` API by non-installation processes. This pattern often indicates an attempt to persist a malicious DLL via the print monitor mechanism, particularly when correlated with creation of files in `C:\\Windows\\System32` not tied to known patches or installations.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e", + "name": "WinEventLog:Application", + "channel": "API call to AddMonitor invoked by non-installer process" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TargetDLLDirectory", + "description": "Expected directory path for legitimate monitor DLLs (e.g., C:\\Windows\\System32)" + }, + { + "field": "SignedImageValidation", + "description": "Enable/disable signature validation on DLLs loaded by spoolsv.exe" + }, + { + "field": "UserContextScope", + "description": "Define whether only SYSTEM/user installs are expected to make changes to the port monitor registry keys" + }, + { + "field": "TimeWindow", + "description": "Timeframe between registry modification and subsequent spoolsv.exe DLL load" + }, + { + "field": "AddMonitorCallContext", + "description": "Filter on calling process of AddMonitor API to detect anomalies outside installer/updater" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 17:13:52.357000+00:00\", \"old_value\": \"2025-10-27 16:01:17.493000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=13\", \"old_value\": \"13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--8986f2ab-2e6d-4c68-99ac-6a1c5f29fb7b", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0209#AN0589", + "external_id": "AN0589" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0589", + "description": "Registry read access associated with suspicious or non-interactive processes querying system config, installed software, or security settings.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TargetRegistryPath", + "description": "Focus detection on registry hives or keys likely to reveal environment info (e.g., HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion)." + }, + { + "field": "ParentProcess", + "description": "May tune for suspicious parent processes such as cmd.exe, wscript.exe, or mshta.exe." + }, + { + "field": "TimeWindow", + "description": "Controls how closely registry access must follow process creation for correlation." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--c7706ddb-cf88-41c7-981b-a5e1bf6cfcfc", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0210#AN0590", + "external_id": "AN0590" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0590", + "description": "Detection of suspicious logon behavior using valid domain accounts across multiple hosts, off-hours, or simultaneous sessions from geographically distant locations.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--39b9db72-8b48-4595-a18d-db5bbba3091b", + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4625, 4768, 4769" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Tune for detection of off-hours or abnormal logon spikes." + }, + { + "field": "UserContext", + "description": "Scope to sensitive domain accounts (e.g., Domain Admins)." + }, + { + "field": "LogonType", + "description": "Distinguish between interactive, service, and network logons." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--1e9fdc71-d073-403a-9ee9-bab091318454", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0213#AN0596", + "external_id": "AN0596" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0596", + "description": "Adversary uses a process to establish outbound connections that transmit uniform packet sizes at a consistent interval, avoiding threshold-based network alerts.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a", + "name": "NSM:Flow", + "channel": "NetFlow/sFlow/PCAP" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "PacketSizeThreshold", + "description": "Minimum repetitive size in bytes to consider as anomalous behavior (e.g., 512B or 1024B)" + }, + { + "field": "IntervalRepeatWindow", + "description": "Timeframe over which repeated, evenly spaced transfers are flagged" + }, + { + "field": "KnownServicePorts", + "description": "Common ports expected to exhibit protocol behavior; outliers flagged if not matching expected usage" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--1155df11-eee4-4fdf-a354-15eda0e90d4c", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0215#AN0602", + "external_id": "AN0602" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0602", + "description": "High-frequency file write operations using uncommon extensions, followed by ransom note creation, registry tampering, or shadow copy deletion. Often uses CLI tools like vssadmin, wbadmin, cipher, or PowerShell.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=2" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "FileExtension", + "description": "Non-standard or randomly generated file extensions may indicate encrypted content." + }, + { + "field": "TargetFolder", + "description": "Focus on user document folders, network shares, or system paths like %System32%." + }, + { + "field": "TimeWindow", + "description": "Correlate rapid writes and renames within seconds across high file count." + }, + { + "field": "CommandLine", + "description": "Flag common ransomware tools or functions (vssadmin delete shadows /all /quiet)." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=2\", \"old_value\": \"EvenCode=2\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--67ff7cc5-7b9b-4d15-b115-b55c3d164c64", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0220#AN0616", + "external_id": "AN0616" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0616", + "description": "Detects USB device insertion followed by high-volume or sensitive file access and staging activity by suspicious processes or accounts.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d6e6b3b-4aa8-40e1-8c47-91db0f313d9f", + "name": "WinEventLog:System", + "channel": "EventCode=2003" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "SensitiveFilePathRegex", + "description": "Match data staging or export paths (e.g., *.docx, *.csv, *.db) to USB volume letters." + }, + { + "field": "UserContext", + "description": "Limit to users who do not normally use removable devices (e.g., service accounts)." + }, + { + "field": "TimeWindow", + "description": "Correlate events within a short period following USB insert (e.g., 5\u201310 minutes)." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--5aaad268-48fb-4826-9f68-b666e1b4a3bf", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0221#AN0619", + "external_id": "AN0619" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0619", + "description": "Unusual or unauthorized processes accessing microphone APIs (e.g., winmm.dll, avrt.dll) followed by audio file writes to user-accessible or temp directories.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=10" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Time span in which the process accesses audio APIs and writes files, to reduce false positives." + }, + { + "field": "TargetProcess", + "description": "Set of approved processes known to legitimately use microphone (e.g., Zoom, Teams)." + }, + { + "field": "WriteDirectory", + "description": "Allowlist of paths where legitimate apps store audio (e.g., user media folders)." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['name']\": {\"new_value\": \"WinEventLog:Security\", \"old_value\": \"WinEventlog:Security\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--e6f38f76-4e60-4b8a-881c-5d3f206e912c", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0222#AN0622", + "external_id": "AN0622" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0622", + "description": "Abuse of mmc.exe to execute non-Microsoft or user-staged .msc files and malicious COM CLSIDs. Behavioral chain: (1) suspicious mmc.exe invocation with /a or -Embedding and non-standard .msc path \u2192 (2) COM activation of non-baseline CLSIDs by mmc.exe \u2192 (3) mmc.exe loads non-baseline DLLs (user-writable/UNC/unsigned) \u2192 (4) optional network/DNS activity from mmc.exe.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--7f70fae7-a68d-4730-a83a-f260b9606129", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=12" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e", + "name": "WinEventLog:Microsoft-Windows-COM/Operational", + "channel": "CLSID activation events where ProcessName=mmc.exe and CLSID not in allowed baseline" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlation window (e.g., 5\u201310 minutes) tying .msc creation \u2192 mmc.exe start \u2192 module loads \u2192 COM/net activity." + }, + { + "field": "AllowedMSCList", + "description": "Set of Microsoft-supplied .msc names/paths allowed in the environment to suppress noise." + }, + { + "field": "SuspiciousMSCPathRegex", + "description": "Regex for user-writable and network paths indicating risky .msc staging (Users, AppData, Downloads, Desktop, UNC)." + }, + { + "field": "AllowedCLSIDs", + "description": "Baseline of CLSIDs expected to be activated by mmc.exe; alert on unknown/new." + }, + { + "field": "ParentProcessAllowList", + "description": "Expected parents for mmc.exe (explorer.exe, services) vs. unusual (powershell, wscript, office apps)." + }, + { + "field": "SignedToUnsignedTransition", + "description": "Flag when signed mmc.exe results in loading unsigned DLLs." + }, + { + "field": "ExternalIPAllowlist", + "description": "Approved external ranges/domains to exclude when mmc.exe makes network requests." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][4]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}, \"root['x_mitre_log_source_references'][6]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}, \"root['x_mitre_log_source_references'][7]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--8a7a7e80-c28e-42b2-a222-c1d75932c986", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0224#AN0628", + "external_id": "AN0628" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0628", + "description": "Detects anomalous use of COM objects for execution, such as Office applications spawning scripting engines, enumeration of COM interfaces via registry queries, or processes loading atypical DLLs through COM activation. Correlates process creation, module loads, and registry queries to flag suspicious COM-based code execution or persistence.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--ed0dd8aa-1677-4551-bb7d-8da767617e1b", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "COMObjectAllowList", + "description": "Legitimate COM CLSIDs and ProgIDs used by enterprise applications, to reduce false positives." + }, + { + "field": "ParentProcessExclusions", + "description": "Expected parent-child process relationships (e.g., explorer.exe spawning dllhost.exe)." + }, + { + "field": "TimeWindow", + "description": "Threshold for correlating COM object execution with subsequent process creation or DLL load." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4656\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--5028303d-22d6-490c-b053-015e877d5829", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0225#AN0629", + "external_id": "AN0629" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0629", + "description": "Unauthorized creation or modification of DLLs loaded by LSASS, abnormal registry values under LSA extensions, and anomalous DLL load activity into the lsass.exe process context\u2014correlated during boot or logon events.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Security", + "channel": "EventCode=3033" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3551476e-14f5-4e48-a518-e82135329e03", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=6" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=2" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--7f70fae7-a68d-4730-a83a-f260b9606129", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=12" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlate DLL file creation/modification with LSASS execution within a configurable timeframe (e.g., 5 min)" + }, + { + "field": "ImagePathPattern", + "description": "Tune based on known legitimate LSASS plugin DLL paths" + }, + { + "field": "SignatureValidation", + "description": "Flag unsigned DLLs loaded into lsass.exe or those signed by unexpected publishers" + }, + { + "field": "RegistryKeyScope", + "description": "Scope to specific registry keys: HKLM\\SYSTEM\\CurrentControlSet\\Control\\Lsa\\Authentication Packages" + }, + { + "field": "FileHashAllowList", + "description": "Exclude known-good LSASS plugin DLLs based on cryptographic hash" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['name']\": {\"new_value\": \"WinEventLog:Sysmon\", \"old_value\": \"WinEventLog:System\"}, \"root['x_mitre_log_source_references'][5]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--9ea7f21e-700f-4900-a1d4-dfc171d399fe", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0227#AN0633", + "external_id": "AN0633" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0633", + "description": "Processes initiating outbound connections on uncommon ports or using protocols inconsistent with the assigned port. Correlating process creation with subsequent network connections reveals anomalies such as svchost.exe or Office applications using high, atypical ports.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Security", + "channel": "EventCode=5156, 5157" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "PortThresholds", + "description": "Define what constitutes a 'non-standard port' based on organizational baselines (e.g., allow 443/80/22 but flag 8088/587/3389 changes)." + }, + { + "field": "ProcessAllowList", + "description": "Processes normally allowed to use non-standard ports (e.g., custom apps)." + }, + { + "field": "TimeWindow", + "description": "Correlate process creation and network activity within N seconds." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=5156, 5157\", \"old_value\": \"EventCode=5156\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--f13ff1ad-5c7b-4136-b5cb-7a5663c3c54f", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0228#AN0637", + "external_id": "AN0637" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0637", + "description": "Initial process initiates outbound connection to first-stage C2, receives payloads or commands, then spawns or injects into a second process that establishes a new outbound connection to an unrelated destination (second-stage C2).", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlate two-stage behavior occurring within a short window (e.g., 1-5 minutes)" + }, + { + "field": "ParentProcess", + "description": "Tune to exclude known legitimate updaters and management agents" + }, + { + "field": "DestinationHostname", + "description": "May be customized to exclude known corporate domains and CDNs" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--cd91348f-296f-4007-a853-6d06d8175210", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0229#AN0641", + "external_id": "AN0641" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0641", + "description": "Enumeration of global address lists or email account metadata via PowerShell cmdlets (e.g., Get-GlobalAddressList) or MAPI/RPC from non-admin, non-mailserver systems.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "CommandLinePattern", + "description": "Match variations of Get-GlobalAddressList, Get-Recipient, and related cmdlets." + }, + { + "field": "HostRole", + "description": "Suppress expected usage on Exchange servers or known IT admin consoles." + }, + { + "field": "TimeWindow", + "description": "Detect bulk execution patterns in short intervals, often used during recon." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--5a5d5ff5-e2bb-4ba9-9f95-504c86b1a1cf", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0234#AN0648", + "external_id": "AN0648" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0648", + "description": "Processes accessing LSASS memory or SAM registry hives outside of trusted security tools, often followed by file creation or lateral movement. Detects unauthorized access to sensitive OS subsystems for credential extraction.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=10" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--5c6de881-bc70-4070-855a-7a9631a407f7", + "name": "WinEventLog:Security", + "channel": "EventCode=4662" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "AccessMask", + "description": "Set to detect full access rights (0x1F0FFF) or modify based on tool behavior." + }, + { + "field": "TimeWindow", + "description": "Define how soon access to LSASS is followed by suspicious file or registry activity." + }, + { + "field": "ParentProcessFilter", + "description": "Allowlist known security tools or system processes accessing LSASS." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--e7be37f1-88f9-45e3-91d0-1ff37bc94892", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0235#AN0651", + "external_id": "AN0651" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0651", + "description": "Detect the creation or modification of common media file formats (e.g., .jpg, .png, .wav) following suspicious process activity like compression or encryption, especially when paired with lateral movement or exfiltration behavior.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Flow", + "channel": "Session Transfer Content" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "FileExtensionFilter", + "description": "Allows tuning of monitored file types (e.g., .jpg, .png, .docx)." + }, + { + "field": "PayloadEntropyThreshold", + "description": "Threshold for flagging potential hidden data in outbound payloads." + }, + { + "field": "ExecutionToExfilTimeWindow", + "description": "Time window between media creation and network transmission." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--eb6edb6d-9684-4ef7-96b2-13c087276d80", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0235#AN0653", + "external_id": "AN0653" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0653", + "description": "Abnormal usage of Preview, ImageMagick, or binary editors to alter images/documents, followed by exfiltration or outbound connections with mismatched file MIME types or payload structure.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "macos:unifiedlog", + "channel": "File creation" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "macos:osquery", + "channel": "process_events" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Flow", + "channel": "C2 exfiltration" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ParentProcessBaseline", + "description": "Allow tuning based on expected apps calling image-editing tools." + }, + { + "field": "TimeDelta", + "description": "Gap between file manipulation and outbound connection." + } + ], + "x_mitre_platforms": [ + "macOS" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['name']\": {\"new_value\": \"macos:unifiedlog\", \"old_value\": \"macos:unified\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--db6995d9-68ab-4638-a430-c0a8d2daf306", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0236#AN0655", + "external_id": "AN0655" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0655", + "description": "Detection of spearphishing attachments by correlating suspicious email delivery with subsequent file creation and abnormal process execution (e.g., Office spawning PowerShell or CMD). Behavior chain includes inbound email metadata \u2192 attachment stored on disk \u2192 process execution \u2192 outbound network activity.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa", + "name": "m365:unified", + "channel": "Send/Receive: Inbound emails with attachments from suspicious or spoofed senders" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "AttachmentExtensions", + "description": "List of high-risk extensions to monitor (e.g., .exe, .js, .vbs, .docm, .xlsm)." + }, + { + "field": "SuspiciousParentChildPairs", + "description": "Process lineage patterns considered malicious (e.g., winword.exe \u2192 powershell.exe)." + }, + { + "field": "TimeWindow", + "description": "Correlation window between email receipt, file creation, and process execution." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][3]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--d02dbf1d-b6e9-4c3c-84a2-f70fec797504", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0238#AN0662", + "external_id": "AN0662" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0662", + "description": "Adversary modifies website or application-hosted content via unauthorized file changes or script injections, often by exploiting web servers or CMS access.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa", + "name": "WinEventLog:Application", + "channel": "Unexpected web application errors or CMS logs showing modification to index.html, default.aspx, or other public-facing files" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "target_filenames", + "description": "Environment-specific naming of defacement-prone files like 'index.html', 'main.css', 'app.js'." + }, + { + "field": "TimeWindow", + "description": "Detection based on rapid sequence of file writes and script injections within short time intervals." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--bd893675-a17e-4c3b-bec4-ffbad6986c73", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0238#AN0666", + "external_id": "AN0666" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0666", + "description": "Adversary uses compromised instance credentials or web application access to deface content hosted in S3 buckets, Azure Blob Storage, or GCP Buckets.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "CloudTrail:PutObject", + "channel": "PutObject" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--58ef998c-f3bf-4985-b487-b1005f5c05d1", + "name": "AWS:CloudTrail", + "channel": "GetObject, CopyObject" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "BucketNameRegex", + "description": "Patterns of S3 or GCP buckets used for static website hosting may vary by organization." + }, + { + "field": "IAMRoleContext", + "description": "Some uploads may appear benign unless enriched with user/role metadata." + } + ], + "x_mitre_platforms": [ + "IaaS" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"GetObject, CopyObject\", \"old_value\": \"GetObject\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--c448cbb5-1256-4a00-8582-1759fb5a6e56", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 18:12:53.100000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0240#AN0671", + "external_id": "AN0671" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0671", + "description": "Monitor for abnormal certificate enrollment and usage activity in Active Directory Certificate Services (AD CS), registry access to certificate storage locations, and unusual process executions that attempt to export or access private keys.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--02d090b6-8157-48da-98a2-517f7edd49fc", + "name": "WinEventLog:Security", + "channel": "EventCode=4768" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--ed0dd8aa-1677-4551-bb7d-8da767617e1b", + "name": "WinEventLog:Security", + "channel": "EventCode=4657" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "EKU_Thresholds", + "description": "Organizations may tune which Extended Key Usage (EKU) values are considered risky." + }, + { + "field": "TimeWindow", + "description": "Defines how quickly multiple certificate enrollments from the same entity should trigger correlation alerts." + }, + { + "field": "LogonContext", + "description": "Differentiate between service accounts and interactive user accounts to reduce false positives." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 18:12:53.100000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4768\", \"old_value\": \"EventCode=4886, 4887, 4899, 4900, 4768, 4624\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--af8d3a12-dafb-4e40-8017-7d20d9e77d55", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0240#AN0674", + "external_id": "AN0674" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0674", + "description": "Monitor for abnormal certificate enrollment events in identity platforms, unexpected use of token-signing certificates, and unusual CA configuration modifications.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--5b8b466b-2c81-4fe7-946f-d677a74ae3db", + "name": "azure:signinlogs", + "channel": "Add certificate credential, Update certificate credential" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa", + "name": "m365:unified", + "channel": "certificate added or modified in application credentials" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "GeoContext", + "description": "Detect certificate-related changes occurring from unusual geographic locations." + }, + { + "field": "Thresholds", + "description": "Adjust enrollment/issuance request volume thresholds per tenant size." + } + ], + "x_mitre_platforms": [ + "Identity Provider" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['name']\": {\"new_value\": \"azure:signinlogs\", \"old_value\": \"azure:SigninLogs\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--88ece783-08bc-41e6-a000-a63f540768cc", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0241#AN0675", + "external_id": "AN0675" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0675", + "description": "Detects forged Kerberos Silver Tickets by identifying anomalous Kerberos service ticket activity such as malformed fields in logon events, TGS requests without interaction with the KDC, and access attempts using service accounts outside expected hosts/resources. Also monitors suspicious processes accessing LSASS memory for credential dumping.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--39b9db72-8b48-4595-a18d-db5bbba3091b", + "name": "WinEventLog:Security", + "channel": "EventCode=4672, 4634" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--02d090b6-8157-48da-98a2-517f7edd49fc", + "name": "WinEventLog:Kerberos", + "channel": "Kerberos TGS-REQ anomalies without KDC validation (Silver Ticket behavior)" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=10" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ServiceAccountScope", + "description": "Expected mapping of service accounts to specific resources; deviations may indicate Silver Ticket use." + }, + { + "field": "TicketValidationBaseline", + "description": "Expected TGS issuance patterns including KDC validation; anomalies may signal forged tickets." + }, + { + "field": "ProcessAllowlist", + "description": "Known processes that legitimately interact with LSASS; others may indicate dumping attempts." + }, + { + "field": "TimeWindow", + "description": "Correlate Kerberos requests within a tunable timeframe to reduce false positives." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4672, 4634\", \"old_value\": \"EventCode=4624, 4634, 4672, 4769\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--d869b672-c3e9-446c-9e7a-c9ce5888794c", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0242#AN0677", + "external_id": "AN0677" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0677", + "description": "Database client execution (e.g., sqlcmd.exe, isql.exe) by users or from locations not tied to enterprise automation or backups. Often followed by creation of .sql/.bak/.csv files, registry artifacts for ODBC/JDBC drivers, or encrypted ZIPs. Defender sees SQL tools launched by explorer.exe, Powershell, or odd parent processes, plus file writes in user temp locations.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "KnownDBToolPaths", + "description": "Directories where legitimate database tools are installed" + }, + { + "field": "ExportExtensionPatterns", + "description": "List of file extensions commonly used for DB exports" + }, + { + "field": "MaxTransferVolume", + "description": "Threshold for outbound data volume that may suggest large DB dumps" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--8180320e-ab62-44e5-afae-eba6ba23d769", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0246#AN0687", + "external_id": "AN0687" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0687", + "description": "Behavior chain involving unexpected API calls to capture keyboard input, driver loads for keyloggers, or remote use of smart card authentication via logon sessions not initiated by local user interaction", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=10" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "AccessMask", + "description": "Tunable based on what memory-level access the keylogger uses (e.g., 0x10 for read)" + }, + { + "field": "ProcessNameExclusions", + "description": "Legitimate accessibility tools may use similar API calls (e.g., Magnifier.exe)" + }, + { + "field": "TimeWindow", + "description": "Define how quickly access + registry mod + smart card use must co-occur" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170\", \"name\": \"WinEventLog:Sysmon\", \"channel\": \"EventCode=13, 14\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170\", \"name\": \"WinEventLog:Sysmon\", \"channel\": \"EventCode=13\"}}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6\", \"name\": \"WinEventLog:Sysmon\", \"channel\": \"EventCode=10\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6\", \"name\": \"WinEventLog:Sysmon\", \"channel\": \"EventCode=10, 7\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5\", \"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4624, 4648\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5\", \"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4624 with LogonType=9 or smartcard logon\"}}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--5d4419cc-6925-4f7d-a247-e0a4634fea90", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0247#AN0690", + "external_id": "AN0690" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0690", + "description": "Detects creation of cloud instances, services, or resources in normally unused or unsupported regions, especially following initial account access or credential use from known regions. Correlates resource provisioning across regions with absence of historical usage and alerting from standard logging services (e.g., GuardDuty not enabled in that region).", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--f8213cde-6b3a-420d-9ab7-41c9af1a919f", + "name": "AWS:CloudTrail", + "channel": "RunInstances" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--59ec10d9-546b-4b8e-bccb-fa85f71e5055", + "name": "AWS:CloudTrail", + "channel": "CreateBucket" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--b5d0492b-cda4-421c-8e51-ed2b8d85c5d0", + "name": "CloudTrail:GetCallerIdentity", + "channel": "GetCallerIdentity" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "AWS:VPCFlowLogs", + "channel": "High outbound traffic from new region resource" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "UnusedRegionList", + "description": "List of regions historically unused by the organization (can vary per tenant/project)" + }, + { + "field": "TimeWindow", + "description": "Time interval for correlating activity following account access" + }, + { + "field": "AllowedServiceList", + "description": "Whitelist of services allowed in secondary/DR regions" + }, + { + "field": "OutboundTrafficThreshold", + "description": "Volume threshold to flag suspicious outbound activity" + } + ], + "x_mitre_platforms": [ + "IaaS" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['name']\": {\"new_value\": \"AWS:CloudTrail\", \"old_value\": \"CloudTrail:RunInstances\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--7b711402-12f7-4985-93df-2693eaf9ebdb", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0248#AN0692", + "external_id": "AN0692" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0692", + "description": "IAAS (Cloud images/VMs): A new VM/instance is launched from a non-approved or newly-seen image (AMI/GCP Image/Azure Image). On first boot, cloud-init/user-data or embedded agents download code, spawn system utilities, or open outbound C2/mining traffic. The analytic correlates Instance/Image Creation \u2192 Instance Start \u2192 in-guest Process/Command Execution and/or anomalous network traffic.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--f8213cde-6b3a-420d-9ab7-41c9af1a919f", + "name": "AWS:CloudTrail", + "channel": "RunInstances" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--b5b0e8ae-7436-4951-950a-7b83c4dd3f2c", + "name": "azure:activity", + "channel": "Microsoft.Compute/virtualMachines/write: imageReference publisher NOT IN allowlist OR plan is new/unknown" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Flow", + "channel": "New VM egress to crypto-mining pools or non-approved Internet ranges within minutes of boot" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ApprovedImageCatalog", + "description": "Set of golden images/owners and digest/IDs allowed to launch." + }, + { + "field": "UserDataInspection", + "description": "Whether to alert when userData/cloud-init contains exec or download directives." + }, + { + "field": "FirstBootWindow", + "description": "Time after start considered first-boot (e.g., \u226430m) for correlation." + }, + { + "field": "VMTagScope", + "description": "Restrict detection to prod or internet-facing subnets to reduce noise." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['name']\": {\"new_value\": \"AWS:CloudTrail\", \"old_value\": \"CloudTrail:RunInstances\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"RunInstances\", \"old_value\": \"RunInstances: AMI not in allowlist OR AMI owner != enterprise owner/account\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--4c744ac0-ba25-4b42-8397-9b398ba55eb8", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0250#AN0694", + "external_id": "AN0694" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0694", + "description": "Defenders observe command-line executions or API-based registry reads targeting sensitive paths like HKLM or HKCU with keyword filters such as 'password', 'cred', or 'logon'. Typically performed by Reg.exe, PowerShell, custom binaries, or offensive tools such as Cobalt Strike. Correlation with process ancestry and command-line arguments indicates suspicious credential discovery activity.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--ed0dd8aa-1677-4551-bb7d-8da767617e1b", + "name": "EDR:hunting", + "channel": "Behavioral rule for registry enumeration under credential-related paths" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "KeywordMatch", + "description": "List of strings searched in registry queries (e.g., password, credential, login). May need to expand for localized OS or app-specific terms." + }, + { + "field": "ParentProcessFilter", + "description": "Parent process used for registry access. Can tune for suspicious ancestry (e.g., cmd.exe > reg.exe vs. services.exe > reg.exe)." + }, + { + "field": "TimeWindow", + "description": "Time-based correlation window for detecting chained activity between registry reads and subsequent credential use or exfiltration." + }, + { + "field": "RegistryHiveScope", + "description": "HKLM vs. HKCU vs. others. May limit scope to user or system context depending on risk appetite." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--4cf44d48-1a0f-45a4-9a25-8bee9677ab52", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0254#AN0702", + "external_id": "AN0702" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0702", + "description": "Monitor for anomalies in transmitted data streams, including mismatched file integrity checks, API interception, or man-in-the-middle modifications. Detect unexpected use of APIs that handle network I/O where transmitted data integrity could be manipulated.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--639e87f3-acb6-448a-9645-258f20da4bc5", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=15" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "IntegrityBaseline", + "description": "Hash baselines or digital signature references to validate transmitted data." + }, + { + "field": "MonitoredPorts", + "description": "List of ports/services where data integrity validation is enforced." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--13810047-61f4-4cd0-aeda-6727d652da90", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0255#AN0705", + "external_id": "AN0705" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0705", + "description": "Monitor for use of native utilities such as wevtutil.exe or PowerShell cmdlets (Get-WinEvent, Get-EventLog) to enumerate or export logs. Unusual access to security or system event channels, especially by non-administrative users or processes, should be correlated with subsequent file export or network transfer activity.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "WhitelistedAdminTools", + "description": "Expected log management scripts executed by administrators should be excluded from alerts." + }, + { + "field": "TimeWindow", + "description": "Correlate enumeration attempts with file export or network transfer within a defined timeframe." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4656\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--c7172412-6e48-45a0-a1c5-2eae892c1fc7", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0257#AN0712", + "external_id": "AN0712" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0712", + "description": "Detects extraction or mounting of container/archive files (e.g., .iso, .vhd, .zip) that originated from the Internet but whose contained files lack Zone.Identifier MOTW tagging. Correlates file creation metadata with subsequent execution of unsigned or untrusted binaries launched outside SmartScreen or Protected View.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--639e87f3-acb6-448a-9645-258f20da4bc5", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=15" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "WatchedExtensions", + "description": "Adjust monitored file types (e.g., .iso, .vhd, .zip, .gz, .rar) based on enterprise usage" + }, + { + "field": "TimeWindow", + "description": "Defines correlation window between extraction/mount and first execution of inner files" + }, + { + "field": "TrustedExtractionTools", + "description": "Whitelist known enterprise archivers and deployment mechanisms to reduce false positives" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--fe1e10ae-ddd2-40f0-8e62-3db88c0c8c68", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0259#AN0714", + "external_id": "AN0714" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0714", + "description": "Adversary installation or use of RMM software (e.g., TeamViewer, AnyDesk, ScreenConnect) followed by outbound beaconing or remote session establishment", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--d2ff4b56-8351-4ed8-b0fb-d8605366005f", + "name": "WinEventLog:Microsoft-Windows-Windows Firewall With Advanced Security/Firewall", + "channel": "new rule allowing inbound or outbound connections for remote desktop software" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "Image", + "description": "RMM software can vary; defenders should update rules to account for additional binaries (e.g., ConnectWise, Zoho Assist)" + }, + { + "field": "DestinationPort", + "description": "RMM software may use configurable or random high ports outside of standard (e.g., 7070, 5650)" + }, + { + "field": "ParentImage", + "description": "Expected parent process may vary in different enterprise contexts" + }, + { + "field": "TimeWindow", + "description": "Correlation window for install-to-beacon or process-to-network event should match operational environment" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--d1eafedb-ac64-46b0-972d-8f8759fc11b3", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0260#AN0718", + "external_id": "AN0718" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0718", + "description": "Forged web credentials may manifest as anomalous SAML token issuance, OpenID Connect token minting, or Zimbra pre-auth key usage. Defenders may see tokens issued without normal authentication events, multiple valid tokens generated simultaneously, or signing anomalies in IdP logs.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--5f7c9def-0ddf-423b-b1f8-fb2ddeed0ce3", + "name": "azure:signinlogs", + "channel": "SAML/OIDC tokens issued without corresponding MFA or password validation" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--ff93f688-d7a4-49cf-9c79-a14454da8428", + "name": "NSM:Connections", + "channel": "Pre-authentication keys generated or token signing anomalies" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TokenLifetimeThreshold", + "description": "Limit the maximum time temporary tokens are valid." + }, + { + "field": "ExpectedAuthFlows", + "description": "Define normal authentication flows (e.g., password+MFA) to baseline token issuance." + } + ], + "x_mitre_platforms": [ + "Identity Provider" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['name']\": {\"new_value\": \"azure:signinlogs\", \"old_value\": \"azure:signinLogs\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--ff0d2f8d-1fff-4bda-94e6-c0cd50abe6ed", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0260#AN0719", + "external_id": "AN0719" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0719", + "description": "Forged web credentials on Windows endpoints may be detected by anomalous browser cookie files, local token cache manipulations, or tools injecting tokens into sessions. Defenders may observe processes accessing LSASS or browser credential stores unexpectedly, followed by unusual logon sessions.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=10" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ProcessWhitelist", + "description": "Define expected processes that access LSASS or browser credential files." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4624, 4648\", \"old_value\": \"EventCode=4624\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--9735a0b1-df29-49fe-b0f7-973c0b513e8d", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0260#AN0723", + "external_id": "AN0723" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0723", + "description": "Forged web credentials in Office Suite contexts may appear as abnormal authentication headers in Outlook or Teams traffic, or unexplained OAuth grants in M365/Azure logs. Defenders should correlate token usage events with missing authentication flows and mismatched device/user context.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--5f7c9def-0ddf-423b-b1f8-fb2ddeed0ce3", + "name": "m365:oauth", + "channel": "OAuth grants or tokens issued without expected user consent" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "m365:signinlogs", + "channel": "Token usage events with device/user mismatch" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "OAuthAppAllowlist", + "description": "Approved OAuth apps and flows; flag unapproved or unexpected token grants." + } + ], + "x_mitre_platforms": [ + "Office Suite" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['name']\": {\"new_value\": \"m365:signinlogs\", \"old_value\": \"m365:signin\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--561fb700-686a-4583-96a9-77a55358d357", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0261#AN0724", + "external_id": "AN0724" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0724", + "description": "Detects file reads across locations followed by writes to temp or staging directories, often compressed or encrypted, indicating local staging behavior.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "StagingDirList", + "description": "Paths such as C:\\Temp, C:\\Windows\\Tasks, etc." + }, + { + "field": "ArchivingToolPatterns", + "description": "Matches to 7z.exe, rar.exe, zip.exe, or custom scripts." + }, + { + "field": "TimeWindow", + "description": "How long to correlate file reads followed by compression." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--f47f256d-686f-4553-85e2-bd4d156da1e7", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0262#AN0728", + "external_id": "AN0728" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0728", + "description": "Monitor DNS query results where subsequent connections use derived or unusual port numbers not explicitly resolved, especially when tied to suspicious processes. Correlate Sysmon DNS logs (Event ID 22) with process creation and socket activity.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "PortDeviationThreshold", + "description": "Deviation from common service ports (e.g., >1024 when DNS resolved service expects 80/443)" + }, + { + "field": "TimeWindow", + "description": "Correlation window between DNS response and network connection (e.g., 5 minutes)" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba\", \"name\": \"WinEventLog:Sysmon\", \"channel\": \"EventCode=3, 22\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba\", \"name\": \"WinEventLog:Sysmon\", \"channel\": \"EventCode=22\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077\", \"name\": \"WinEventLog:Sysmon\", \"channel\": \"EventCode=1\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077\", \"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=1\"}}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--ddbf61e2-7dad-40ef-90ef-7bec707b50fd", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0266#AN0737", + "external_id": "AN0737" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0737", + "description": "Detects mailbox manipulation or deletion via PowerShell (e.g., Remove-MailboxExportRequest), file deletion from Outlook data stores (Unistore.db), or tampering with quarantined mail logs.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--e905dad2-00d6-477c-97e8-800427abd0e8", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=23" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa", + "name": "m365:exchange", + "channel": "Transport Rule Modification" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "MailstorePath", + "description": "Outlook files in AppData\\Local\\Comms\\Unistore\\data" + }, + { + "field": "TransportRuleNames", + "description": "Target suspicious rule changes (e.g., header removal)" + }, + { + "field": "PowerShellCommandMatch", + "description": "Regex match on `Remove-MailboxExportRequest` and similar Exchange cmdlets" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--a789e535-cab9-49b4-9685-c10a5d3642b4", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0267#AN0741", + "external_id": "AN0741" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0741", + "description": "Persistent high CPU utilization combined with suspicious command-line execution (e.g., mining tools or obfuscated scripts) and outbound connections to mining/proxy networks.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6", + "name": "Windows:perfmon", + "channel": "High sustained CPU usage by a single process" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Duration threshold for sustained CPU activity (e.g., >15 minutes)" + }, + { + "field": "DestinationIPList", + "description": "Known mining pool IPs or proxy service endpoints" + }, + { + "field": "ExecutableNamePatterns", + "description": "Regex list of suspicious or known mining tools" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--8e1872c2-906c-4cf8-b0c7-afd448fe1c0b", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0267#AN0744", + "external_id": "AN0744" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0744", + "description": "Sudden spikes in cloud VM CPU usage with outbound traffic to mining pools and unauthorized instance creation.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--f8213cde-6b3a-420d-9ab7-41c9af1a919f", + "name": "AWS:CloudTrail", + "channel": "RunInstances" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6", + "name": "AWS:CloudWatch", + "channel": "Sustained EC2 CPU usage above normal baseline" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a", + "name": "AWS:VPCFlowLogs", + "channel": "Outbound flow logs to known mining pools" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "CPUUtilizationThreshold", + "description": "CloudWatch alarm trigger for sustained CPU" + }, + { + "field": "UnusualRegionList", + "description": "Instances launched in unexpected regions" + } + ], + "x_mitre_platforms": [ + "IaaS" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['name']\": {\"new_value\": \"AWS:CloudWatch\", \"old_value\": \"CloudWatch:Metrics\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--34c5e959-876b-4851-8ebf-bfaf97e9e609", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0269#AN0750", + "external_id": "AN0750" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0750", + "description": "Logon via RDP or WMI by a user account followed by uncommon command execution, file manipulation, or lateral network connections.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlation window between remote login and post-access activity" + }, + { + "field": "LogonUser", + "description": "Limit to service accounts or privileged users for higher fidelity" + }, + { + "field": "RemoteHostList", + "description": "Allowlisting known admin jumpboxes or deployment tools" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4624, 4648\", \"old_value\": \"EventCode=4624 (LogonType=10 or 3), EventCode=4648\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--f403ae40-31ff-4550-b21f-e1c24315276d", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0270#AN0755", + "external_id": "AN0755" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0755", + "description": "Adversary modifies Group Policy Objects (GPOs), domain trust, or directory service objects via GUI, CLI, or programmatic APIs. Behavior includes creation/modification of GPOs, delegation permissions, trust objects, or rogue domain controller registration.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--5b8b466b-2c81-4fe7-946f-d677a74ae3db", + "name": "WinEventLog:Security", + "channel": "EventCode=5136" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ObjectDN", + "description": "Filter to specific AD containers (e.g., CN=Policies,CN=System,DC=domain,DC=com) for GPOs." + }, + { + "field": "AttributeModified", + "description": "Focus on high-risk attributes such as gPCFileSysPath, ntSecurityDescriptor." + }, + { + "field": "TimeWindow", + "description": "Correlate changes with suspicious process creation or privileged user logon." + }, + { + "field": "UserContext", + "description": "Alert on unexpected user or service account modifying domain policy." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=5136\", \"old_value\": \"EventCode=5136,5137,5138,5139,5141\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4670\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--40882c73-344f-4138-894e-049b9bb1f460", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0271#AN0757", + "external_id": "AN0757" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0757", + "description": "Detects anomalous process access to LSASS on domain controllers, suspicious module loads of authentication DLLs, and registry or file modifications indicative of Skeleton Key\u2013style patching. Correlates LSASS access attempts with subsequent abnormal logon activity patterns.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=10" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8", + "name": "WinEventLog:System", + "channel": "Unexpected modification to lsass.exe or cryptdll.dll" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "MonitoredDLLs", + "description": "Specific authentication DLLs such as cryptdll.dll and samsrv.dll monitored for tampering." + }, + { + "field": "TimeWindow", + "description": "Correlation window between LSASS memory access, module load, and suspicious logons." + }, + { + "field": "UserContext", + "description": "Baseline expected accounts performing domain controller logon operations." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4624, 4648\", \"old_value\": \"EventCode=4624\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--81233639-a08b-4a56-a5d4-ac2f9ae94a2b", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0273#AN0759", + "external_id": "AN0759" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0759", + "description": "Processes that normally do not initiate network connections establishing outbound encrypted TLS/SSL sessions, especially with asymmetric traffic volumes (client sending more than receiving) or non-standard certificate chains. Defender observations correlate process creation with unexpected network encryption libraries being loaded.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "AllowedEncryptedProcesses", + "description": "Whitelist processes expected to use TLS (e.g., browsers, mail clients)." + }, + { + "field": "EntropyThreshold", + "description": "Payload randomness threshold to distinguish C2 encryption from legitimate traffic." + }, + { + "field": "TimeWindow", + "description": "Correlation window between process creation, module load, and encrypted connection." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--aa12f037-f724-43a6-97ca-e2e706859c1a", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0274#AN0764", + "external_id": "AN0764" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0764", + "description": "Correlation of registry key modification for Run/RunOnce with abnormal parent-child process relationships and outlier execution at user logon or system startup", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ParentProcessName", + "description": "Customize based on expected parent-child process lineage for autostarts" + }, + { + "field": "StartupRegistryPath", + "description": "May vary based on organization policy or installed software" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--667c21d2-2f92-42d6-aaea-b46974f63c8d", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0279#AN0778", + "external_id": "AN0778" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0778", + "description": "Monitor for abnormal creation or modification of Windows services (e.g., via sc.exe, PowerShell, or API calls) that load non-standard executables. Correlate registry changes in service keys with service creation events and process execution to detect service abuse for persistence or execution.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--5297a638-1382-4f0c-8472-0d21830bf705", + "name": "WinEventLog:Security", + "channel": "EventCode=4697" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ServiceAllowlist", + "description": "Known good services and installers that regularly modify or create services" + }, + { + "field": "TimeWindow", + "description": "Threshold for correlating service creation with unusual process execution" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--50658b7e-57c5-4e31-b156-1b294574a9f2", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0282#AN0785", + "external_id": "AN0785" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0785", + "description": "Detection focuses on identifying anomalous regsvr32.exe executions that deviate from normal administrative or system use. Defenders may observe regsvr32.exe loading scriptlets or DLLs from unusual paths (especially temporary directories or remote URLs), command-line arguments invoking /i or /u with suspicious file references, network connections initiated by regsvr32.exe, and unsigned or untrusted DLLs being loaded shortly after regsvr32.exe invocation. Correlated sequences include regsvr32.exe process creation, module load of DLL/scriptlet, and optional outbound network traffic.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "AllowedDLLPaths", + "description": "Directories where DLL loading via regsvr32.exe is expected (e.g., C:\\Windows\\System32)." + }, + { + "field": "ScriptletExtensions", + "description": "File extensions considered suspicious when executed by regsvr32.exe (e.g., .sct, .ocx)." + }, + { + "field": "TimeWindow", + "description": "Timeframe to correlate regsvr32.exe process creation with subsequent module loads and network connections." + }, + { + "field": "ParentProcessWhitelist", + "description": "Parent processes from which regsvr32.exe is expected (e.g., explorer.exe during legitimate COM object registration)." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--c4cabd45-86a2-4842-9171-dff93f6ac737", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0283#AN0786", + "external_id": "AN0786" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0786", + "description": "Detection of suspicious token manipulation chains: use of token-related APIs (e.g., LogonUser, DuplicateTokenEx) or commands (runas) \u2192 spawning of a new process under a different security context (e.g., SYSTEM) \u2192 mismatched parent-child process lineage or anomalies in Event Tracing for Windows (ETW) token/PPID data \u2192 abnormal lateral or privilege escalation activity.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--39b9db72-8b48-4595-a18d-db5bbba3091b", + "name": "WinEventLog:Security", + "channel": "EventCode=4672, 4634" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=10" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e", + "name": "ETW:Token", + "channel": "token_analysis: API calls such as DuplicateTokenEx or ImpersonateLoggedOnUser" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--5b8b466b-2c81-4fe7-946f-d677a74ae3db", + "name": "WinEventLog:Security", + "channel": "EventCode=5136" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlation time between suspicious API usage, runas, and process creation (e.g., 5\u201310m)." + }, + { + "field": "AllowedServiceAccounts", + "description": "Whitelist of service accounts permitted to spawn SYSTEM-level processes." + }, + { + "field": "KnownAdminTools", + "description": "Legitimate administrative utilities that trigger token changes." + }, + { + "field": "ParentProcessAnomalyThreshold", + "description": "Deviation threshold for PPID mismatches detected via ETW." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4672, 4634\", \"old_value\": \"EventCode=4624, 4672\"}, \"root['x_mitre_log_source_references'][4]['name']\": {\"new_value\": \"WinEventLog:Security\", \"old_value\": \"WinEventLog:DirectoryService\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--4e8da615-4d12-4b53-8c7b-06d7c41e22a9", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0284#AN0787", + "external_id": "AN0787" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0787", + "description": "Unexpected processes (e.g., powershell.exe, wscript.exe, office apps) initiating HTTP POST/PUT requests to text storage domains like pastebin.com or hastebin.com, particularly when preceded by file access in sensitive directories. Defender perspective: correlation of process lineage, large clipboard/file read operations, and outbound uploads to text storage services.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TextStorageDomains", + "description": "Domains to monitor such as pastebin.com, hastebin.com, ghostbin.com." + }, + { + "field": "UploadSizeThreshold", + "description": "Minimum data size (e.g., >500KB) to trigger alerts for suspicious uploads." + }, + { + "field": "UserContext", + "description": "User accounts with legitimate business justification for posting to text storage sites." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--0f94823c-ac95-48d8-9716-58f59d39974c", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0285#AN0791", + "external_id": "AN0791" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0791", + "description": "A remote DCOM invocation by a privileged account using RPC (port 135), followed by abnormal process instantiation or module loading on the remote system indicative of code execution.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlate RPC activity with remote process creation within a configurable time window (e.g., 300s)" + }, + { + "field": "UserContext", + "description": "Identify rare or first-time DCOM invocations by specific accounts" + }, + { + "field": "ProcessName", + "description": "List of suspicious executables commonly abused via DCOM (e.g., excel.exe, wmiprvse.exe)" + }, + { + "field": "RemoteHostList", + "description": "Known set of systems that should or should not be invoking DCOM activity" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4624, 4648\", \"old_value\": \"EventCode=4624 (LogonType=3)\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--e4246c20-fbe4-4750-a29e-44e3fe179bf2", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0286#AN0792", + "external_id": "AN0792" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0792", + "description": "Monitor for anomalous email activity originating from Windows-hosted applications (e.g., Outlook) where the sending account name or display name does not match the underlying SMTP address. Detect abnormal volume of outbound messages containing sensitive keywords (e.g., 'payment', 'wire transfer') or anomalous login locations for accounts associated with email sending activity.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa", + "name": "m365:unified", + "channel": "SendOnBehalf/SendAs: Emails sent where the sending identity mismatches account ownership" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "KeywordList", + "description": "Adjust impersonation detection keywords based on local business risk terms (e.g., 'ACH', 'Invoice')." + }, + { + "field": "GeoLocationBaseline", + "description": "Define trusted geographic regions for normal user email activity." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4624, 4648\", \"old_value\": \"EventCode=4624\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--065f2c96-6903-4cd1-a737-99ecf1fdc73e", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0287#AN0797", + "external_id": "AN0797" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0797", + "description": "Cause\u2192effect chain: (1) A client app (browser, Office, PDF/Flash/reader) experiences a crash/abnormal exit or loads from an unusual location, then (2) drops or modifies a file in user-writable paths, and/or (3) spawns an unexpected child (e.g., powershell/cmd/mshta/rundll32/wscript/installer), and (4) establishes outbound C2-like connections shortly after. Correlate application logs, file writes, process lineage, and network egress within a short window.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa", + "name": "WinEventLog:Application", + "channel": "EventCode=1000" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlation window (e.g., 15m) between crash/write/child/network." + }, + { + "field": "HighRiskChildren", + "description": "List of child processes that should rarely spawn from Office/browsers (powershell.exe, cmd.exe, wscript.exe, mshta.exe, rundll32.exe, regsvr32.exe, msiexec.exe, curl.exe)." + }, + { + "field": "UserPaths", + "description": "Writable paths to watch (Downloads, %TEMP%, %APPDATA%, OneDrive, Office startup folders)." + }, + { + "field": "AllowedPlugins", + "description": "Known add-ins/extensions and updater binaries to reduce noise." + }, + { + "field": "EgressAllowlist", + "description": "Known update/CDN domains and proxy egress CIDRs for suppression." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][3]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--344f0add-d372-4e0e-88c6-f48e6b424434", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 17:10:37.357000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0293#AN0814", + "external_id": "AN0814" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0814", + "description": "Detects injection or tampering of DLLs in hybrid identity agents (e.g., AzureADConnectAuthenticationAgentService), registry or configuration changes tied to PTA/AD FS, and anomalous LSASS or AD FS module loads correlated with authentication anomalies.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--5b8b466b-2c81-4fe7-946f-d677a74ae3db", + "name": "WinEventLog:Security", + "channel": "EventCode=5136" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "Anomalous logon without MFA enforcement" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "WatchedServices", + "description": "Hybrid identity services monitored for tampering, e.g., PTA agent, AD FS." + }, + { + "field": "TimeWindow", + "description": "Window correlating DLL/module load events with logon anomalies." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 17:10:37.357000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['name']\": {\"new_value\": \"WinEventLog:Security\", \"old_value\": \"WinEventLog:Directory Service\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--80e4f847-a149-423b-a179-cbcf4afd06b9", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0293#AN0816", + "external_id": "AN0816" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0816", + "description": "Detects API calls registering or updating hybrid identity connectors, modification of cloud-to-on-premises federation trust, and unusual token issuance logs.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--e52d89f9-1710-4708-88a5-cbef77c4cd5e", + "name": "AWS:CloudTrail", + "channel": "UpdateFederationSettings or RegisterHybridConnector" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "MonitoredFederations", + "description": "Federation trusts and connectors relevant to hybrid identity setup." + } + ], + "x_mitre_platforms": [ + "IaaS" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['name']\": {\"new_value\": \"AWS:CloudTrail\", \"old_value\": \"CloudTrail:UpdatePolicy\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--c15f60a8-6e58-460f-8dcf-1bce272b5eaf", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0296#AN0823", + "external_id": "AN0823" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0823", + "description": "Detects suspicious DNS/ARP poisoning attempts, unauthorized modifications to registry/network configuration, or abnormal TLS downgrade activity. Correlates changes in system configuration with subsequent unusual network flows or authentication events.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "MonitoredRegistryPaths", + "description": "Specific network stack and DNS registry keys that vary by enterprise configuration." + }, + { + "field": "DowngradeCipherList", + "description": "List of weak/legacy ciphers tuned per environment for TLS downgrade detection." + }, + { + "field": "TimeWindow", + "description": "Correlation period between config changes and abnormal network connections." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170\", \"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4663, 4670, 4656\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170\", \"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4670\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba\", \"name\": \"WinEventLog:Sysmon\", \"channel\": \"EventCode=3, 22\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba\", \"name\": \"WinEventLog:Sysmon\", \"channel\": \"EventCode=3\"}}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--0669b8b5-8888-45aa-acf8-819dfb7d00a2", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0299#AN0834", + "external_id": "AN0834" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0834", + "description": "Sequential behavioral chain of privilege escalation through permission modification: (1) Process creation of permission-modifying utilities (icacls, takeown, attrib, cacls), (2) Correlation with unusual user context or timing, (3) DACL modification events targeting sensitive files/directories, (4) Subsequent file access or modification attempts indicating successful privilege bypass", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--639e87f3-acb6-448a-9645-258f20da4bc5", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--5b8b466b-2c81-4fe7-946f-d677a74ae3db", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Temporal correlation window for linking permission modification with subsequent access attempts (default: 300 seconds)" + }, + { + "field": "SensitivePathList", + "description": "Environment-specific critical file and directory paths requiring permission change monitoring" + }, + { + "field": "TrustedUserContext", + "description": "Administrative accounts authorized to perform legitimate permission modifications" + }, + { + "field": "BusinessHoursThreshold", + "description": "Time-based threshold for elevated alerting on permission changes outside business hours" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4670\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}, \"root['x_mitre_log_source_references'][4]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4103,4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--12c748a0-3ce9-4fd2-8a65-f4362b69cafd", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0301#AN0841", + "external_id": "AN0841" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0841", + "description": "Execution of files originating from removable media after drive mount, with correlation to file write activity, autorun usage, or lateral spread via staged tools.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d6e6b3b-4aa8-40e1-8c47-91db0f313d9f", + "name": "WinEventLog:System", + "channel": "EventCode=1006" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "WinEventLog:Microsoft-Windows-Windows Defender/Operational", + "channel": "Suspicious file execution on removable media path" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "DriveLetterMatch", + "description": "Detect activity on mounted drives typically used by USB (e.g., E:, F:, G:). Tune based on enterprise usage." + }, + { + "field": "FileExecutionWindow", + "description": "Set timing threshold for execution shortly after drive mount (e.g., < 5 minutes)." + }, + { + "field": "ParentProcess", + "description": "Restrict detection to suspicious process lineage like explorer.exe, powershell.exe, or unsigned binaries." + }, + { + "field": "FileEntropy", + "description": "Use entropy thresholding to detect packed/obfuscated payloads dropped to removable media." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['name']\": {\"new_value\": \"WinEventLog:System\", \"old_value\": \"WinEventLog:Microsoft-Windows-Partition/Diagnostic\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--22ff1717-6ba8-4908-b795-edf0c41a997e", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0302#AN0842", + "external_id": "AN0842" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0842", + "description": "A remote source rapidly touches a short sequence of closed ports (SYN\u2192RST/S0) on a Windows host. Within a short window the host changes firewall state (WFP rule added/modified or service starts listening) and then the same source completes the first successful handshake to the newly opened port.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a", + "name": "WinEventLog:Microsoft-Windows-Windows Firewall With Advanced Security/Firewall", + "channel": "EventCode=2004, 2005, 2006" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Seconds to correlate knock sequence \u2192 rule change \u2192 successful connect (60\u2013300s typical)." + }, + { + "field": "MinSequenceLen", + "description": "Minimum number of distinct destination ports in the sequence (\u22653 by default)." + }, + { + "field": "RuleChangeAllowList", + "description": "Accounts/processes allowed to adjust Windows Firewall (e.g., update agents)." + }, + { + "field": "WatchedPorts", + "description": "Ports of interest to flag when opened (e.g., 22,23,2323,8022,3389,8080)." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=2004, 2005, 2006\", \"old_value\": \"EventCode=2004,2005,2006\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--7b87b63c-0936-48b5-8017-47bf5561e6f9", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0303#AN0847", + "external_id": "AN0847" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0847", + "description": "Enumeration of local users or groups via file access (/etc/passwd) or commands like id, groups.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "auditd:PATH", + "channel": "PATH" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "linux:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "AccessedFile", + "description": "Monitors sensitive file access such as '/etc/passwd', '/etc/group'." + }, + { + "field": "ExecutionScope", + "description": "Restrict detection to user-initiated sessions or specific parent processes." + } + ], + "x_mitre_platforms": [ + "Linux" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"PATH\", \"old_value\": \"path\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--6bb68520-c27e-435a-86b5-eb2ce7841cb2", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0304#AN0850", + "external_id": "AN0850" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0850", + "description": "Exploitation of system or application vulnerability (e.g., CVE-based exploit) followed by service crash, restart, or repeated failure within a short time frame, impacting application/system availability.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa", + "name": "WinEventLog:Application", + "channel": "EventCode=1000" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--5297a638-1382-4f0c-8472-0d21830bf705", + "name": "WinEventLog:System", + "channel": "EventCode=7031, 7034" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Time window between repeated service crashes or restarts (e.g., 5 crashes within 1 hour)" + }, + { + "field": "TargetApplication", + "description": "Critical applications to monitor based on environment (e.g., web server, database, VPN)" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=1000\", \"old_value\": \"EventCode=1000, 1001, 1002\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--ec6e1f3c-e9ff-4944-a426-863eaf9979ea", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0305#AN0854", + "external_id": "AN0854" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0854", + "description": "Adversary modifies GPO containers or files under SYSVOL using LDAP, ADSI, PowerShell (e.g., New-GPOImmediateTask) or GUI tools. This includes directory object changes (e.g., gPCFileSysPath), delegation assignments (SeEnableDelegationPrivilege), and SYSVOL file writes (ScheduledTasks.xml, GptTmpl.inf).", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--5b8b466b-2c81-4fe7-946f-d677a74ae3db", + "name": "WinEventLog:Security", + "channel": "EventCode=5136" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--d27b0089-2c39-4b6c-84ff-303e48657e77", + "name": "WinEventLog:Security", + "channel": "EventCode=4704" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ObjectDN", + "description": "Focus detection on AD paths like CN=Policies,CN=System,DC=domain,DC=com." + }, + { + "field": "TargetFilename", + "description": "Target specific files like ScheduledTasks.xml or GptTmpl.inf in SYSVOL." + }, + { + "field": "TimeWindow", + "description": "Correlate GPO object change and SYSVOL file modification within N seconds." + }, + { + "field": "UserContext", + "description": "Alert on unexpected modification by non-admins or uncommon accounts." + }, + { + "field": "CommandLine", + "description": "Flag usage of GPO manipulation tools like Set-GPRegistryValue, New-GPOImmediateTask." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=5136\", \"old_value\": \"EventCode=5136,5137,5138,5139,5141\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4670\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--0277e29a-af6d-4242-a187-32673328664a", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0307#AN0856", + "external_id": "AN0856" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0856", + "description": "Correlated file access to insecure credential files (e.g., *.env, *.xml, *.ps1) followed by suspicious process execution or authentication using retrieved credentials. Detected through Sysmon logs and Windows Security Event logs.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "FileNamePattern", + "description": "Patterns like *.env, *credential* can be tuned to reduce noise or catch custom implementations" + }, + { + "field": "ProcessAccessScope", + "description": "Defines scope of access (e.g., only untrusted parent processes or high-risk processes)" + }, + { + "field": "TimeWindow", + "description": "Time delta between credential file access and use in logon attempt" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4624, 4648\", \"old_value\": \"EventCode=4624\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--c9be9fb3-460f-42bc-9b56-3bb88839aeab", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 18:16:01.708000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0308#AN0861", + "external_id": "AN0861" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0861", + "description": "Detection focuses on identifying unauthorized or anomalous changes to compute infrastructure components. Defender perspective: monitor for creation, deletion, or modification of instances, volumes, and snapshots outside of approved change management windows; correlate abnormal activity such as rapid snapshot creation followed by new instance mounts, or repeated infrastructure changes by rarely used accounts. Flagging activity linked to unusual geolocation, API client, or automation script is suspicious.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--f8213cde-6b3a-420d-9ab7-41c9af1a919f", + "name": "AWS:CloudTrail", + "channel": "RunInstances" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--1361e324-b594-4c0e-a517-20cee32b8d7f", + "name": "AWS:CloudTrail", + "channel": "TerminateInstances" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--d46272ce-a0fe-4256-855e-738de7bb63ee", + "name": "AWS:CloudTrail", + "channel": "ModifyVolume" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3acecdde-c327-4498-9bb8-33a2e63c6c57", + "name": "AWS:CloudTrail", + "channel": "DeleteVolume, ModifyVolume" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--dad75cc7-5bae-4175-adb4-ca1962d8650e", + "name": "AWS:CloudTrail", + "channel": "CreateVolume" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3da222e6-53f3-451c-a239-0b405c009432", + "name": "AWS:CloudTrail", + "channel": "CreateSnapshot" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--16e07530-764b-4d83-bae0-cdbfc31bf21d", + "name": "AWS:CloudTrail", + "channel": "DeleteSnapshot" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--f1eb6ea9-f3ab-414f-af35-2d5427199984", + "name": "AWS:CloudTrail", + "channel": "ModifySnapshotAttribute" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--b33d36e3-d7ea-4895-8eed-19a08a8f7c4f", + "name": "AWS:CloudWatch", + "channel": "unexpected IAM user or role assuming privileges for instance/snapshot operations" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ChangeWindow", + "description": "Approved maintenance or deployment windows. Helps reduce false positives by distinguishing scheduled activity." + }, + { + "field": "UserContext", + "description": "IAM user, role, or service account performing the operation. Tunable to allowlist known automation services." + }, + { + "field": "RateThreshold", + "description": "Number of infrastructure changes (e.g., snapshot creations) in a defined period. Adjusted based on workload scale." + }, + { + "field": "GeoLocation", + "description": "Region or source IP where changes originate. Useful for tuning alerts to account for multi-region deployments." + } + ], + "x_mitre_platforms": [ + "IaaS" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 18:16:01.708000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--e3ddaba3-282b-4bd0-b316-78b724b79acd", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0309#AN0862", + "external_id": "AN0862" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0862", + "description": "Adversary ships a tampered application or update: an updater/installer (msiexec/setup/update.exe/vendor service) writes or replaces binaries; on first run it spawns scripts/shells or unsigned DLLs and beacons to non-approved update CDNs/hosts. Detection correlates: (1) process creation of installer/updater \u2192 (2) file metadata changes in program paths \u2192 (3) first-run children and module/signature anomalies \u2192 (4) outbound connections to unexpected hosts within a short window.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3551476e-14f5-4e48-a518-e82135329e03", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=6" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--639e87f3-acb6-448a-9645-258f20da4bc5", + "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational", + "channel": "Unsigned or invalid image for newly installed/updated binaries" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a", + "name": "NSM:Flow", + "channel": "First-time egress to non-approved update hosts right after install/update" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlate write\u2192first-run\u2192egress (default 90 minutes)." + }, + { + "field": "ApprovedUpdateHosts", + "description": "Allow-list of vendor update endpoints, enterprise proxy/cache." + }, + { + "field": "ApprovedSigners", + "description": "Code-signing publishers allowed for programs/services." + }, + { + "field": "ProgramPaths", + "description": "Monitored install locations (e.g., C:\\Program Files, C:\\ProgramData, %LOCALAPPDATA%)." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][4]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}, \"root['x_mitre_log_source_references'][5]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=22\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--0be2ac94-5f56-4bdc-bf07-ec9ea08c8bb7", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0312#AN0871", + "external_id": "AN0871" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0871", + "description": "Multi-event correlation of Registry creation under Active Setup with anomalous execution of processes at user logon. Behavioral patterns include creation/modification of HKLM Active Setup keys with non-standard StubPath values, followed by process execution from uncommon paths, unsigned binaries, or unusual parent-child lineage post-user login.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--39b9db72-8b48-4595-a18d-db5bbba3091b", + "name": "WinEventLog:Security", + "channel": "EventCode=4672" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--7f70fae7-a68d-4730-a83a-f260b9606129", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=12" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlate registry change and process execution within a specific user logon session (e.g., 5\u201310 minutes)" + }, + { + "field": "ParentProcessName", + "description": "Expected parent processes for Active Setup launched binaries (e.g., explorer.exe). Deviations may indicate abuse." + }, + { + "field": "StubPathValueEntropy", + "description": "Degree of randomness/uncommonness in StubPath values. High entropy may indicate obfuscation." + }, + { + "field": "SignedBinaryStatus", + "description": "Flag if launched binary in StubPath is unsigned or uncommon for baseline" + }, + { + "field": "RegistryKeyOwner", + "description": "Check which user/context added the Active Setup key to detect privilege abuse" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['name']\": {\"new_value\": \"WinEventLog:Security\", \"old_value\": \"WinEventLog:Microsoft-Windows-Security-Auditing\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--80be1bd7-b4e8-4d1b-b294-56b1c073bbe0", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0315#AN0880", + "external_id": "AN0880" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0880", + "description": "Adversaries create the 'Office Test\\Special\\Perf' registry key and specify a malicious DLL path that is auto-loaded when an Office application starts. This DLL is injected into the Office process memory space and can provide persistent execution without requiring macro enablement.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:Microsoft-Office-Alerts", + "channel": "Unexpected DLL or component loaded at Office startup" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "RegistryPath", + "description": "Path to 'Office test\\Special\\Perf' may vary by Office version, 32/64-bit, or architecture (HKCU vs HKLM)" + }, + { + "field": "DLLPath", + "description": "Injected DLL may reside in different user-writable locations (e.g., %APPDATA%, %TEMP%, or network shares)" + }, + { + "field": "OfficeProcessName", + "description": "Process name (e.g., winword.exe, excel.exe) may vary by Office deployment and usage" + }, + { + "field": "TimeWindow", + "description": "Time between DLL registry creation and first Office execution may vary depending on user activity" + }, + { + "field": "UserContext", + "description": "Malicious DLL may target only specific users, necessitating correlation with interactive logon sessions" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--7c7f0049-96af-4acc-9c58-9f8e661adb63", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0318#AN0895", + "external_id": "AN0895" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0895", + "description": "Processes such as PowerShell, Git, or curl initiating outbound HTTPS POST requests to known code repository APIs (e.g., github.com, gitlab.com) immediately following large file reads. Defender view: correlation between file access of sensitive directories (e.g., Documents, Finance) and abnormal data uploads to repository domains.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "MonitoredDomains", + "description": "List of external code repository domains to monitor (github.com, gitlab.com, bitbucket.org)." + }, + { + "field": "ExfilVolumeThreshold", + "description": "Threshold for outbound data volume per session to flag suspicious uploads." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--d78b4bb3-bd0a-4e43-bc19-0a7b72f6a9d3", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0320#AN0903", + "external_id": "AN0903" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0903", + "description": "Detects usage of commands or binaries (e.g., netstat, PowerShell Get-NetTCPConnection) and WMI or API calls to enumerate local or remote network connections.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "SuspiciousParentProcesses", + "description": "Non-standard binaries launching PowerShell or netstat (e.g., winword.exe spawning powershell.exe)." + }, + { + "field": "TimeWindow", + "description": "Correlates discovery behavior before lateral movement or credential access." + }, + { + "field": "CommandPatternList", + "description": "Regex or keyword patterns to match discovery utilities (e.g., `netstat`, `Get-NetTCPConnection`)." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--99b2296f-dc1c-4b0e-a05a-883a0dbb1535", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0325#AN0922", + "external_id": "AN0922" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0922", + "description": "Unusual process (e.g., `rundll32`, `mshta`, `wscript`, or custom payloads) initiates network connection to external IPs/domains that proxy C2 traffic, often over uncommon ports or high entropy HTTP/S connections.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "WinEventLog:Microsoft-Windows-Windows Defender/Operational", + "channel": "Unusual external domain access" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "DestinationASN", + "description": "Adjust for known benign but high-risk infrastructure (e.g., hosting providers like DigitalOcean, OVH, etc.)." + }, + { + "field": "ParentProcess", + "description": "Detect suspicious lineage\u2014proxy tools launched from script interpreters or LOLBins." + }, + { + "field": "EntropyThreshold", + "description": "Tune based on expected randomness in outbound request payloads." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--b8dea721-8e0d-4bcd-bde4-6609afd595e5", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0326#AN0927", + "external_id": "AN0927" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0927", + "description": "A process/script constructs or references a custom/alphabet translation table (e.g., 64/85/32+ arbitrary chars, XOR/base-N loops) or emits long high-entropy strings that do NOT validate as standard Base64/Hex \u2192 shortly after, the same process (or its child) generates outbound traffic with asymmetric bytes_out:bytes_in, fixed-size beacons, or protocol/header mismatches (e.g., Content-Type says JSON but body fails JSON parse / contains non-standard alphabet).", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9f387817-df83-432a-b56b-a8fb7f71eedd", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a", + "name": "m365:defender", + "channel": "NetworkConnection: high out:in ratio, periodic beacons, protocol mismatch" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "EntropyThreshold", + "description": "Minimum Shannon entropy for the suspected token/payload (e.g., >4.8)." + }, + { + "field": "TokenLengthThreshold", + "description": "Minimum continuous token length to treat as potential non-standard payload (e.g., \u2265120 chars)." + }, + { + "field": "BytesOutToInRatio", + "description": "Out:In ratio considered suspicious (e.g., \u22654:1)." + }, + { + "field": "FixedPacketStdDevThreshold", + "description": "Std. dev. threshold (size or interval) to mark packets as 'uniform' (beacon-like)." + }, + { + "field": "TimeWindow", + "description": "Correlation window from encode routine to egress (default 10m)." + }, + { + "field": "KnownLegitEncoders", + "description": "Legitimate in-house/custom encoders to suppress." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4103, 4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--09125bb1-29eb-4d40-994a-2e1aa7bcd105", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0326#AN0928", + "external_id": "AN0928" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0928", + "description": "Shell scripts or binaries implement custom mapping tables (tr/sed/awk/golang/rust/python encode loops), or emit long high-entropy tokens that fail Base64/Hex validation \u2192 correlated with egress showing asymmetric flow, protocol-mismatch payloads, or DNS/HTTP bodies containing low-diversity-but-long custom alphabets.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "auditd:SYSCALL", + "channel": "execve of interpreters (python, perl), custom binaries, or shell utilities with long arguments containing non-standard tokens" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Flow", + "channel": "http: HTTP bodies/headers contain long tokens with non-standard alphabets or constant-size periodic POSTs" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "EntropyThreshold", + "description": "Payload entropy minimum." + }, + { + "field": "TokenLengthThreshold", + "description": "Length threshold for suspect tokens." + }, + { + "field": "BytesOutToInRatio", + "description": "Asymmetry cutoff for flows." + }, + { + "field": "TimeWindow", + "description": "Correlation join window." + }, + { + "field": "KnownEncoders", + "description": "Legitimate internal tools/agents." + } + ], + "x_mitre_platforms": [ + "Linux" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--63fcb4be-f5c2-47da-951d-cd1b4f1a2cc0", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0327#AN0931", + "external_id": "AN0931" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0931", + "description": "Remote Desktop (RDP) logon by a user followed by unusual process execution, file access, or lateral movement activity within a short timeframe.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--39b9db72-8b48-4595-a18d-db5bbba3091b", + "name": "WinEventLog:Security", + "channel": "EventCode=4778, EventCode=4779" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Temporal threshold to correlate login with post-login activity (e.g., 5 minutes)" + }, + { + "field": "UserContext", + "description": "Tune for non-admin users or service accounts expected to use RDP" + }, + { + "field": "ProcessList", + "description": "Define suspicious post-login processes such as cmd.exe, powershell.exe, certutil.exe" + }, + { + "field": "HostAccessPatterns", + "description": "Scope detection to uncommon or first-time access between source and destination hosts" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4624, 4648\", \"old_value\": \"EventCode=4624 (LogonType=10), EventCode=4648\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--ae250934-772b-43a5-9a29-9cbd92972858", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0328#AN0932", + "external_id": "AN0932" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0932", + "description": "Execution of CMSTP.exe with arguments pointing to suspicious or remote INF/SCT/DLL payloads, optionally followed by outbound network connections to untrusted IPs, process injection via COM interfaces (CMSTPLUA, CMLUAUTIL), registry modifications registering malicious profiles, or creation of suspicious INF/DLL/SCT files prior to execution.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=10" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--7f70fae7-a68d-4730-a83a-f260b9606129", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=12" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "INFPathRegex", + "description": "Regex for identifying suspicious INF files; adjust to suppress known safe profiles" + }, + { + "field": "ExternalIPAllowlist", + "description": "Domains or IP ranges allowed for CMSTP network connections" + }, + { + "field": "COMInterfaceGUIDs", + "description": "Set of auto-elevated COM interface GUIDs to flag (e.g., CMSTPLUA, CMLUAUTIL)" + }, + { + "field": "RegistryKeyAllowlist", + "description": "Known good registry entries for CMSTP profile registration" + }, + { + "field": "TimeWindow", + "description": "Correlate CMSTP execution with subsequent network activity or process creation within N seconds" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}, \"root['x_mitre_log_source_references'][5]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--decb2be7-1a0a-46dd-ab48-cf6258c0185e", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0329#AN0933", + "external_id": "AN0933" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0933", + "description": "Process chains that use native utilities (vssadmin, wbadmin, diskshadow, bcdedit, REAgentC, wmic) with arguments to delete shadow copies, disable recovery, or remove backup catalogs", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--e905dad2-00d6-477c-97e8-800427abd0e8", + "name": "WinEventLog:Microsoft-Windows-Backup", + "channel": "Windows Backup Catalog deletion or catalog corruption" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--74fa567d-bc90-425c-8a41-3c703abb221c", + "name": "WinEventLog:System", + "channel": "Service stopped or RecoveryDisabled set via REAgentC" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Used to track rapid recovery feature changes over short intervals" + }, + { + "field": "CommandLinePattern", + "description": "Can be tuned to catch variations in destructive flags (/all, /quiet, -delete)" + }, + { + "field": "ParentProcessContext", + "description": "Tune based on common parent-child chains (e.g., powershell \u2192 diskshadow)" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][3]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--e50f8247-73da-4461-a560-745ed84f1209", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 18:17:38.273000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0329#AN0937", + "external_id": "AN0937" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0937", + "description": "Cloud API calls disabling snapshot scheduling, backup policies, versioning, followed by DeleteSnapshot/DeleteVolume operations", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--16e07530-764b-4d83-bae0-cdbfc31bf21d", + "name": "AWS:CloudTrail", + "channel": "DeleteSnapshot" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--4c41e296-b8d2-4a37-b789-eb565c87c00c", + "name": "AWS:CloudTrail", + "channel": "DeleteBucket, DeleteDBCluster, DeleteSnapshot, TerminateInstances" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "UserAgent", + "description": "Tune for legitimate backup automation vs unknown tools" + }, + { + "field": "ResourceType", + "description": "Filter only on production images or vaults" + } + ], + "x_mitre_platforms": [ + "IaaS" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 18:17:38.273000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"DeleteBucket, DeleteDBCluster, DeleteSnapshot, TerminateInstances\", \"old_value\": \"PutBackupVaultAccessPolicy\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--e7ce6bda-a4d3-43a4-afa0-34d57c34ef0d", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0338#AN0954", + "external_id": "AN0954" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0954", + "description": "Use of stolen Kerberos tickets or token impersonation resulting in logon sessions from accounts without expected interactive logon events.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Allows tuning of how far apart related logon and process events can be correlated" + }, + { + "field": "UserContext", + "description": "Customize for high-value or service accounts with restricted access policies" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4624, 4648\", \"old_value\": \"EventCode=4624, 4672, 4648\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--367cfbd9-fcfd-4336-863e-b6917ff71cb4", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0338#AN0956", + "external_id": "AN0956" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0956", + "description": "Token replay or impersonation in federated logins without interactive browser session or MFA prompts.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--ff93f688-d7a4-49cf-9c79-a14454da8428", + "name": "azure:signinlogs", + "channel": "TokenIssuanceStart, TokenIssuanceSuccess" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--a953ca55-921a-44f7-9b8d-3d40141aa17e", + "name": "m365:unified", + "channel": "login using refresh_token with no preceding authentication context" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "MFAContextRequired", + "description": "Customize for accounts where MFA must always precede token issuance" + }, + { + "field": "RefreshTokenReuseThreshold", + "description": "Threshold for number of times a refresh token is reused without re-auth" + } + ], + "x_mitre_platforms": [ + "Identity Provider" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['name']\": {\"new_value\": \"azure:signinlogs\", \"old_value\": \"azure:signinLogs\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--8cb0a7da-942b-4771-b9d5-cf558755677a", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0340#AN0962", + "external_id": "AN0962" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0962", + "description": "A user is socially engineered (web page, email, document) to open Run/PowerShell/CMD and paste an obfuscated one-liner. The chain is: (1) user context active in a browser/email/office app \u2192 (2) process creation of a command interpreter with suspicious arguments (base64/Invoke-Expression/web download/pipeline to shell) \u2192 (3) optional file drop in %TEMP% or %APPDATA% \u2192 (4) outbound network connection to an external domain. Events are correlated within a short window and with consistent user/session.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Flow", + "channel": "HTTP(S) requests with User-Agents typical of PowerShell or curl from desktop; or URIs matching paste-inspired payload hosts" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlation horizon from parent app (browser/email/office) to interpreter spawn (e.g., 15 minutes)." + }, + { + "field": "ParentProcessAllowList", + "description": "Legitimate automation that spawns PowerShell/CMD from Office/Email/Browser." + }, + { + "field": "SuspiciousArgPatterns", + "description": "List of command-line substrings indicating pasted one-liners (e.g., '-enc', 'FromBase64String', 'IEX(', 'DownloadString', 'Invoke-WebRequest', 'curl|wget.*\\|\\s*(sh|bash|powershell)')." + }, + { + "field": "WritePaths", + "description": "Directories treated as risky for first-stage drops (%TEMP%, %APPDATA%, %PUBLIC%)." + }, + { + "field": "OutboundCIDRBlockList", + "description": "Internet ranges/domains to alert on for first-run egress." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}, \"root['x_mitre_log_source_references'][3]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--23e84bf6-70d1-4c49-97b8-0fff9c6efa8f", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0342#AN0968", + "external_id": "AN0968" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0968", + "description": "Execution of hh.exe to open a .chm file followed by suspicious child processes or script engine invocation (VBScript, JScript, mshta, powershell). Behavior includes loading a CHM file from untrusted locations, or immediately spawning commands indicative of payload execution.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "CHMPathRegex", + "description": "Regex matching CHM file locations; tune to exclude trusted internal software help files" + }, + { + "field": "ChildProcessList", + "description": "List of suspicious children of hh.exe (powershell.exe, cmd.exe, mshta.exe, wscript.exe)" + }, + { + "field": "NetworkDestinationAllowlist", + "description": "Filter for legitimate update/help servers accessed by hh.exe" + }, + { + "field": "TimeWindow", + "description": "Threshold time between hh.exe execution and suspicious follow-on activity" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][3]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--0de81d5a-ffba-4eba-915d-c4f4d8b30f9a", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0343#AN0969", + "external_id": "AN0969" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0969", + "description": "High-volume packet generation by local processes (e.g., PowerShell, cmd, curl.exe) or network service processes resulting in excessive outbound traffic over short time window, correlated with abnormal resource usage or degraded host responsiveness.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "PacketRateThreshold", + "description": "Defines the burst threshold (e.g., 10,000 pps) above which activity should be flagged as anomalous." + }, + { + "field": "TimeWindow", + "description": "Duration over which to aggregate and analyze flow volume." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--408b2724-079c-4636-9764-52f435726de7", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0343#AN0972", + "external_id": "AN0972" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0972", + "description": "VM or cloud instance generating anomalously high network egress targeting same destination IP or service, especially using stateless protocols.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a", + "name": "AWS:VPCFlowLogs", + "channel": "source instance sends large volume of traffic in short window" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6", + "name": "AWS:CloudWatch", + "channel": "NetworkOut spike beyond baseline" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "InstanceTrafficThreshold", + "description": "Alert when egress exceeds normal usage by X%." + }, + { + "field": "ProtocolType", + "description": "Prioritize alerts on stateless protocols such as UDP and ICMP." + } + ], + "x_mitre_platforms": [ + "IaaS" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['name']\": {\"new_value\": \"AWS:CloudWatch\", \"old_value\": \"CloudWatch:InstanceMetrics\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--11f18771-dd49-45f7-8ef5-05d3426d82d5", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0345#AN0975", + "external_id": "AN0975" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0975", + "description": "Correlate registry modifications (e.g., UAC bypass registry keys), unusual parent-child process relationships (e.g., control.exe spawning cmd.exe), and unsigned elevated process executions with non-standard tokens or elevation flags.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--39b9db72-8b48-4595-a18d-db5bbba3091b", + "name": "WinEventLog:Security", + "channel": "EventCode=4672" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ElevatedProcessPath", + "description": "Paths to monitor for unsigned or unexpected elevated binaries" + }, + { + "field": "ParentProcessName", + "description": "Parent-child execution chains that are suspicious in the local environment" + }, + { + "field": "TimeWindow", + "description": "Time between registry modification and elevated process spawn" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--6385ccc0-f1a9-4198-997e-dec943e88db7", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0345#AN0978", + "external_id": "AN0978" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0978", + "description": "Monitor for unexpected privilege elevation operations via SAML assertion manipulation, role injection, or changes to identity mappings that result in access escalation.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--d27b0089-2c39-4b6c-84ff-303e48657e77", + "name": "azure:signinlogs", + "channel": "unusual role assumption or elevation path" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "AuthorizedRoleMappings", + "description": "Roles or groups that should never be assumed outside designated paths" + }, + { + "field": "TimeWindow", + "description": "Time between assertion issuance and critical privilege use" + } + ], + "x_mitre_platforms": [ + "Identity Provider" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['name']\": {\"new_value\": \"azure:signinlogs\", \"old_value\": \"azure:signinLogs\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--28c16139-9ce1-4dd7-b26a-e257f37e246c", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0348#AN0988", + "external_id": "AN0988" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 0988", + "description": "Identifies suspicious outbound traffic volume mismatches from processes that typically do not generate network activity, particularly over C2 protocols like HTTPS, DNS, or custom TCP/UDP ports, following file or data access.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Flow", + "channel": "Flow/PCAP analysis for outbound payloads" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "DataVolumeThreshold", + "description": "Set threshold for outbound transfer size exceeding typical C2 traffic (e.g., >1MB in <5min)." + }, + { + "field": "KnownBenignProcesses", + "description": "List of approved processes that may exhibit high outbound traffic (e.g., updates)." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}, \"root['x_mitre_log_source_references'][3]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--54ffc701-eb6c-4e3e-8615-0c6f8b327a34", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0352#AN1000", + "external_id": "AN1000" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1000", + "description": "Detects unauthorized Kerberos ticket injection by correlating service ticket (TGS - 4769) requests with absent corresponding account logons (4624) and prior Ticket Granting Ticket (TGT - 4768) activity. Highlights anomalous service ticket generation chains involving unexpected users, hosts, or times, and suspicious injection of tickets via mimikatz-like tooling into LSASS memory. Behavior also includes network lateral movement using Kerberos authentication absent expected interactive logon patterns.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--a953ca55-921a-44f7-9b8d-3d40141aa17e", + "name": "WinEventLog:Security", + "channel": "EventCode=4769" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--02d090b6-8157-48da-98a2-517f7edd49fc", + "name": "WinEventLog:Security", + "channel": "EventCode=4768" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=10" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Defines the correlation window between TGT request (4768) and TGS request (4769)" + }, + { + "field": "HostContextScope", + "description": "Adjusts the host scoping for correlation of authentication chains and ticket injection" + }, + { + "field": "LSASSAccessAnomalyThreshold", + "description": "Allows tuning of alerts for ticket injection attempts via LSASS memory access" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4624, 4648\", \"old_value\": \"EventCode=4624\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--6039c777-6a85-4df4-86b9-40d95796046e", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0353#AN1001", + "external_id": "AN1001" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1001", + "description": "Registry modifications to HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\SpecialAccounts\\UserList setting user visibility to 0, or creation of user accounts not shown on login screen. Defender view: correlation of account creation with registry edits that mark users hidden.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--deb22295-7e37-4a3b-ac6f-c86666fbe63d", + "name": "WinEventLog:Security", + "channel": "EventCode=4720" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "AccountScope", + "description": "Restrict monitoring to privileged or unexpected accounts." + }, + { + "field": "BaselineHiddenUsers", + "description": "Whitelist accounts that are intentionally hidden by administrators." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--63583dcb-dbdc-4b9d-a261-3129de12327e", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0354#AN1004", + "external_id": "AN1004" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1004", + "description": "Unusual or unauthorized external remote access attempts (e.g., RDP, VPN, Citrix) \u2192 repeated failed logins followed by a successful session from uncommon geolocations or outside business hours \u2192 subsequent internal lateral movement or data exfiltration activities.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--a953ca55-921a-44f7-9b8d-3d40141aa17e", + "name": "WinEventLog:Security", + "channel": "EventCode=4776, 4625" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa", + "name": "WinEventLog:Application", + "channel": "VPN, Citrix, or remote access gateway logs showing external IP addresses" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "BusinessHours", + "description": "Normal business hours for logon activity." + }, + { + "field": "KnownRemoteIPs", + "description": "List of approved external IPs or VPN endpoints." + }, + { + "field": "FailedLogonThreshold", + "description": "Number of failed logons before raising suspicion (e.g., >5)." + }, + { + "field": "GeoIPWhitelist", + "description": "Geographic regions allowed for remote access." + }, + { + "field": "TimeWindow", + "description": "Time window to correlate failed attempts and success (e.g., 15m)." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4776, 4625\", \"old_value\": \"EventCode=4624, 4625\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--aa2dc7aa-0cc5-4a75-96b2-8c089c46944b", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0357#AN1015", + "external_id": "AN1015" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1015", + "description": "Execution of utilities (e.g., ping, tracert, Test-NetConnection) or scripted methods to test Internet connectivity by interacting with external IPs/domains.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Security", + "channel": "EventCode=5156, 5157" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "DestinationIP", + "description": "Tunable external IP ranges or domains used to verify Internet access (e.g., 8.8.8.8, example.com)" + }, + { + "field": "TimeWindow", + "description": "Cluster rapid test connections with command execution in < 60 seconds" + }, + { + "field": "UserContext", + "description": "Filter out known admin/script contexts to reduce false positives" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=5156, 5157\", \"old_value\": \"EventCode=5156\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--128315ea-6407-4c28-8528-209e799ad8e1", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0359#AN1020", + "external_id": "AN1020" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1020", + "description": "Suspicious processes (e.g., Tor clients, relays, unknown binaries) launch with sustained encrypted outbound traffic to known anonymity infrastructure (e.g., Tor, I2P), and may relay to additional internal systems via reverse proxying, ICMP tunneling, or socket forwarding.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a", + "name": "dns:query", + "channel": "Outbound resolution to hidden service domains (e.g., `.onion`)" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "DomainCategory", + "description": "Can be tuned to `.onion`, I2P, or suspicious CDN domains." + }, + { + "field": "ProcessParent", + "description": "Detect known-good vs. abnormal launching binaries (e.g., mshta spawning Tor)." + }, + { + "field": "ConnectionDuration", + "description": "Threshold for persistent connections over known relay ports (e.g., 9050)." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--2385f397-5d17-4b37-ba07-bb52a52ff66c", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0360#AN1025", + "external_id": "AN1025" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1025", + "description": "Detection of domain group enumeration through command-line utilities such as 'net group /domain' or PowerShell cmdlets, followed by suspicious access to API calls or LSASS memory.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Adjustable window to track chained discovery activity (e.g., 5-10 minutes)." + }, + { + "field": "UserContext", + "description": "Tune to focus on non-admin users or service accounts performing enumeration." + }, + { + "field": "ProcessLineageDepth", + "description": "How far back the parent-child process chain is correlated." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--a5e9fb06-ab75-415d-beff-206aa059e096", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0361#AN1028", + "external_id": "AN1028" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1028", + "description": "Abuse of Regsvcs.exe or Regasm.exe to execute arbitrary code embedded in .NET assemblies via [ComRegisterFunction]/[ComUnregisterFunction]. Behavioral chain: (1) Process creation of regsvcs/regasm with suspicious assembly paths/flags \u2192 (2) Assembly/DLL load inside regsvcs/regasm \u2192 (3) Registry writes to HKCR\\CLSID/ProgID during COM registration \u2192 (4) Optional child process or network activity spawned by installer/registration code.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--7f70fae7-a68d-4730-a83a-f260b9606129", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=12" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "AssemblyPathRegex", + "description": "Environment-specific paths to flag (e.g., %TEMP%, Downloads, OneDrive, SMB shares). Helps suppress known-good installers." + }, + { + "field": "SuspiciousFlags", + "description": "Arguments like /unregister (/u), /codebase, /regfile which may indicate abuse. Tune per enterprise use of regasm/regsvcs." + }, + { + "field": "ParentProcessAllowList", + "description": "Legitimate parents (e.g., setup.exe, msiexec.exe). Analyst can prune false positives from Office or script hosts." + }, + { + "field": "KnownGoodAssemblies", + "description": "Hashes or publisher info for approved assemblies commonly registered in the environment." + }, + { + "field": "RegistryKeyAllowList", + "description": "Approved CLSIDs/ProgIDs written during sanctioned software installs." + }, + { + "field": "TimeWindow", + "description": "Correlation window (e.g., 5\u201310 min) between file drop \u2192 regasm/regsvcs exec \u2192 registry writes \u2192 child activity." + }, + { + "field": "SignedToUnsignedTransition", + "description": "Alert if Microsoft-signed regasm/regsvcs loads or triggers unsigned assemblies/children." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][3]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}, \"root['x_mitre_log_source_references'][5]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}, \"root['x_mitre_log_source_references'][6]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--2b0dd3b6-6949-4dd5-b0dd-7b0b6f431dbe", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0363#AN1030", + "external_id": "AN1030" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1030", + "description": "A non-privileged or abnormal process attempts to open a handle with full access (0x1F0FFF) to lsass.exe and subsequently invokes memory dump, file creation, or registry modification indicative of credential scraping. This behavior chain reflects staged credential theft activity.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=10" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--b5d0492b-cda4-421c-8e51-ed2b8d85c5d0", + "name": "WinEventLog:Security", + "channel": "EventCode=4673" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "AccessMask", + "description": "Set to 0x1F0FFF to detect full memory access attempts; can be scoped down to reduce noise." + }, + { + "field": "TimeWindow", + "description": "Defines time between LSASS access and dump file creation or registry modification (e.g., 5 minutes)." + }, + { + "field": "ParentProcessName", + "description": "Allowlist known legitimate tools (e.g., AV/EDR) accessing lsass.exe." + }, + { + "field": "DumpFilePath", + "description": "Paths where memory dumps are written, e.g., %TEMP%, C:\\Windows\\Temp." + }, + { + "field": "CommandLinePattern", + "description": "Common dumping syntax like rundll32, procdump, comsvcs.dll, Invoke-Mimikatz." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][4]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--17687fa0-bfbf-4ff2-9eb0-520538e6af31", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0364#AN1031", + "external_id": "AN1031" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1031", + "description": "Detects adversarial abuse of WMI to execute local or remote commands via WMIC, PowerShell, or COM API through a multi-event chain: process creation, command execution, and corresponding network connection if remote.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--05645013-2fed-4066-8bdc-626b2e201dd4", + "name": "WinEventLog:WMI", + "channel": "EventCode=5857, 5858, 5860, 5861" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "WMIQueryScope", + "description": "Restrict detection scope to suspicious WMI namespaces like `\\root\\cimv2`, `\\root\\subscription`." + }, + { + "field": "TimeWindow", + "description": "Set maximum allowable time window to correlate WMI process creation and remote connections." + }, + { + "field": "UserContext", + "description": "Tune based on interactive vs. system-level execution (e.g., via SYSTEM or low-privileged users)." + }, + { + "field": "RemoteDestinationThreshold", + "description": "Number of unique remote hosts contacted using WMI within a time window." + }, + { + "field": "SuspiciousCommandPatterns", + "description": "Regex patterns to identify adversary-like usage (e.g., `wmic process call`, `powershell Invoke-WmiMethod`)." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=5857, 5858, 5860, 5861\", \"old_value\": \"EventCode=5857, 5858\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--e863e865-8ecc-47ce-b736-eec54b6399d6", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0365#AN1032", + "external_id": "AN1032" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1032", + "description": "Correlation of Registry key creation/modification events under known Run/Startup keys with new or unusual binary paths or script-based payloads. Multi-event detection includes registry modification followed by process execution from non-standard directories or abnormal parent-child process relationships.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Microsoft-Windows-Shell-Core", + "channel": "New startup folder shortcut or binary placed in Startup directory" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ImagePath", + "description": "Full path of the binary/script being registered in Run keys. Tunable to exclude known software baselines." + }, + { + "field": "RegistryKeyPath", + "description": "Tunable list of startup-related registry keys to monitor more/less aggressively based on enterprise software context." + }, + { + "field": "TimeWindow", + "description": "Correlate registry key creation and process execution within this window. Defaults between 5\u201310 minutes." + }, + { + "field": "UserContext", + "description": "Filter for specific user SIDs or exclude known admin/script accounts." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--53dd199d-4f38-4f12-83dd-f2d471d58a1b", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0367#AN1034", + "external_id": "AN1034" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1034", + "description": "Correlates Group Policy updates that configure network logon scripts with subsequent remote file execution behaviors triggered by user logons to identify potential persistence or execution chains tied to adversarial manipulation of logon scripts.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--f5468e67-51c7-4756-9b4f-65707708e7fa", + "name": "WinEventLog:Security", + "channel": "EventCode=5145" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9f387817-df83-432a-b56b-a8fb7f71eedd", + "name": "WinEventLog:System", + "channel": "EventCode=4016, 5312" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TargetObject", + "description": "Path to network-based script execution; tuning required for environment-specific network shares." + }, + { + "field": "ParentProcessName", + "description": "Initial execution process that launches the script; may vary depending on script language or user context." + }, + { + "field": "TimeWindow", + "description": "Acceptable time window to correlate Group Policy update with script execution (e.g., 2\u201310 minutes)." + }, + { + "field": "UserContext", + "description": "Account initiating execution; useful for filtering known administrative activity." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4016, 5312\", \"old_value\": \"EventCode=4016,5312\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--84299e85-2a7e-4f78-9767-3d29aa58857a", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0376#AN1057", + "external_id": "AN1057" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1057", + "description": "Detects processes performing network enumeration (e.g., port scans, service probing) by correlating process creation, socket connections, and sequential destination IP probing within a time window.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ScanRateThreshold", + "description": "Defines the number of unique destination IPs or ports accessed within a time window that may indicate a scan." + }, + { + "field": "KnownScannerExeList", + "description": "List of binaries allowed to scan or used by IT (e.g., Nmap, Nessus)." + }, + { + "field": "TimeWindow", + "description": "Temporal bounds for correlating sequential connections (e.g., 60 seconds)." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--03f2259d-45c2-4422-83ad-58955f89350c", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0377#AN1061", + "external_id": "AN1061" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1061", + "description": "Unauthorized or anomalous loading of kernel-mode drivers or DLLs, concealed services, or abnormal modification of boot components indicative of rootkit activity.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3551476e-14f5-4e48-a518-e82135329e03", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=6" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--5297a638-1382-4f0c-8472-0d21830bf705", + "name": "WinEventLog:System", + "channel": "EventCode=7045" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "DriverSignatureStatus", + "description": "Signed vs unsigned drivers; many environments restrict unsigned drivers, but some legacy systems allow them." + }, + { + "field": "TargetDirectory", + "description": "Suspicious driver or DLL drop locations, e.g., \\System32\\Drivers\\ or \\Temp\\" + }, + { + "field": "UserContext", + "description": "Rootkit installation via admin or SYSTEM account." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['name']\": {\"new_value\": \"WinEventLog:System\", \"old_value\": \"WinEventLog:Security\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--1dee558e-720e-4f3b-9414-192a63eb8909", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-10-29 17:10:15.891000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0378#AN1064", + "external_id": "AN1064" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1064", + "description": "Correlates script execution or suspicious parent processes with creation or modification of encoded, compressed, or encrypted file formats (e.g., .zip, .7z, .enc) and abnormal command-line syntax or PowerShell obfuscation.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "PayloadEntropyThreshold", + "description": "Tune entropy threshold to distinguish obfuscation from legitimate compression" + }, + { + "field": "TimeWindow", + "description": "Adjust correlation window between script execution and encoded file creation" + }, + { + "field": "SuspiciousParentProcessList", + "description": "Customize based on environment to include LOLBins or admin tools misused for obfuscation" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-10-29 17:10:15.891000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}}, \"iterable_item_added\": {\"root['x_mitre_log_source_references'][2]\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077\", \"name\": \"WinEventLog:Sysmon\", \"channel\": \"EventCode=1\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--8c3a43bc-dd07-4e72-a987-a2dc36e162fa", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0383#AN1077", + "external_id": "AN1077" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1077", + "description": "Detects adversary behavior where a newly created or renamed user account closely resembles existing service or administrator accounts to blend in and avoid detection. Common patterns include prefix/suffix modifications, homoglyphs, or use of names like 'admin1', 'adm1n', or 'backup_help'.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--deb22295-7e37-4a3b-ac6f-c86666fbe63d", + "name": "WinEventLog:Security", + "channel": "EventCode=4720" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--b5d0492b-cda4-421c-8e51-ed2b8d85c5d0", + "name": "windows:osquery", + "channel": "User enumeration with creation/last modified timestamps" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "SimilarityThreshold", + "description": "Defines how close in Levenshtein or visual distance an account name must be to a legitimate one to raise an alert." + }, + { + "field": "MonitoredAccountList", + "description": "Set of known legitimate accounts to compare new account names against." + }, + { + "field": "TimeWindow", + "description": "Period within which anomalous account creation or renaming is evaluated in relation to discovery or deletion activity." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4720\", \"old_value\": \"EventCode=4720, EventCode=4781\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--dc4a80e3-7670-474f-aaf6-c051d5dda83c", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0387#AN1091", + "external_id": "AN1091" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1091", + "description": "Detects anomalous ARP traffic or cache modifications on Windows endpoints that indicate ARP poisoning. Behavioral focus is on multiple IP addresses resolving to a single MAC, or unsolicited ARP replies from unauthorized devices.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a", + "name": "WinEventLog:Security", + "channel": "ARP cache modification attempts observed through event tracing or security baselines" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TrustedGatewayMAC", + "description": "Expected MAC address for default gateways; deviations may indicate poisoning." + }, + { + "field": "TimeWindow", + "description": "Correlation interval for repeated unsolicited ARP replies." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--13a875c4-87d2-448e-a46e-970e1f9ad5da", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0388#AN1094", + "external_id": "AN1094" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1094", + "description": "Detects a multi-event behavior chain involving UAC bypass attempts via known auto-elevated binaries (e.g., eventvwr.exe, sdclt.exe), unauthorized Registry changes to UAC-related keys, and anomalous process execution with elevated privileges but lacking standard parent-child lineage. Suspicious patterns include invocation of auto-elevated COM objects or manipulation of isolatedCommand Registry entries without consent prompts.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--39b9db72-8b48-4595-a18d-db5bbba3091b", + "name": "WinEventLog:Security", + "channel": "EventCode=4672" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=10" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlate registry tampering and elevation within a tunable time window (e.g., 30 seconds) to reduce noise from benign admin activity." + }, + { + "field": "ElevatedProcessNameList", + "description": "Tunable list of suspicious elevated binaries (e.g., sdclt.exe, eventvwr.exe, computerdefaults.exe) known to support UAC bypass." + }, + { + "field": "ParentProcessAnomalyThreshold", + "description": "Define logic for parent-child mismatch (e.g., non-elevated process spawning auto-elevated one) to flag uncommon elevation paths." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--66c98f78-2848-43f4-a69d-5562f03712ec", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0394#AN1108", + "external_id": "AN1108" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1108", + "description": "Unexpected file creation in web directories followed by web server processes (e.g., w3wp.exe) spawning command shells or script interpreters (e.g., cmd.exe, powershell.exe)", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Flow", + "channel": "Inbound HTTP POST with suspicious payload size or user-agent" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "WebRootPath", + "description": "Custom web server directory depending on IIS or third-party hosting environment" + }, + { + "field": "ParentProcess", + "description": "Different server binaries (e.g., php-cgi.exe, apache.exe) that may launch scripts" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4624, 4648\", \"old_value\": \"EventCode=4624\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--4a92d2e9-fc28-4eac-9b3d-113e74d7bf2d", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0397#AN1113", + "external_id": "AN1113" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1113", + "description": "Detection of automated tools or scripts periodically transmitting data to external destinations using scheduled tasks or background processes.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Used to detect repeated exfil activity over intervals (e.g., every 5 minutes)." + }, + { + "field": "DestinationIP", + "description": "Can be tuned to filter known internal or trusted destinations." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077\", \"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4688\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077\", \"name\": \"WinEventLog:security\", \"channel\": \"EventCode=4688\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba\", \"name\": \"WinEventLog:Sysmon\", \"channel\": \"EventCode=3, 22\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba\", \"name\": \"WinEventLog:Sysmon\", \"channel\": \"EventCode=3\"}}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--79600919-afe8-4ac9-946c-147d85af6cfe", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0399#AN1118", + "external_id": "AN1118" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1118", + "description": "Recurring network exfiltration initiated by scheduled or script-based processes exhibiting time-based regularity and consistent external destinations.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--7b375092-3a61-448d-900a-77c9a4bde4dc", + "name": "WinEventLog:System", + "channel": "EventCode=106, 200" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Duration threshold to consider a connection repetitive (e.g., same hour daily)" + }, + { + "field": "DestIPAllowlist", + "description": "Known external destinations to exclude (e.g., approved SFTP/backup servers)" + }, + { + "field": "ParentProcessBaseline", + "description": "Allowlisted job runners or scripts known to schedule legitimate transfers" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--407bb9c9-0c31-4172-8dd3-bdd0547f2d1e", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0400#AN1121", + "external_id": "AN1121" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1121", + "description": "Detects high-frequency or anomalous DNS queries initiated by non-browser, non-system processes (e.g., PowerShell, rundll32, python.exe) used to establish command and control via DNS tunneling.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Flow", + "channel": "dns.log" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "QueryLengthThreshold", + "description": "Subdomain length for detecting base32/base64-encoded payloads" + }, + { + "field": "ProcessImageFilter", + "description": "Flag non-standard executables making DNS queries" + }, + { + "field": "TimeWindow", + "description": "Rate of queries in short interval per process" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=22\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--11dd0dbf-e880-43d2-99f7-4b6bf9d821fa", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0405#AN1134", + "external_id": "AN1134" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1134", + "description": "Correlates LNK file execution with embedded resource extraction or suspicious network activity following initial launch, often leading to payload delivery via disguised icons.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--639e87f3-acb6-448a-9645-258f20da4bc5", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=15" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ParentProcessName", + "description": "Can be tuned to focus on common launcher processes like explorer.exe or winword.exe." + }, + { + "field": "DestinationIP", + "description": "Filtered to exclude known good domains and internal IPs to reduce false positives." + }, + { + "field": "TimeWindow", + "description": "Time between LNK execution and subsequent suspicious activity may vary based on adversary delay." + }, + { + "field": "FileExtension", + "description": "Could be used to focus on .lnk files only or track associated dropped payloads like .dat, .exe, etc." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--9c53e92a-3659-4137-881a-f4002af9c688", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0407#AN1137", + "external_id": "AN1137" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1137", + "description": "Detects anomalous usage of local accounts to log into a system, especially accounts not typically used interactively or outside business hours.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--39b9db72-8b48-4595-a18d-db5bbba3091b", + "name": "WinEventLog:Security", + "channel": "EventCode=4672" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Tune for normal business hours to reduce false positives from legitimate after-hours work." + }, + { + "field": "UserContext", + "description": "Define list of legitimate local users for interactive access." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4624, 4648\", \"old_value\": \"EventCode=4624\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--fdf11d76-3bd7-41c4-b117-7b0f17b31b17", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0408#AN1140", + "external_id": "AN1140" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1140", + "description": "Outbound spoofed traffic to known amplification protocols (e.g., DNS, NTP, Memcached) combined with abnormal network traffic volume targeting remote reflectors, resulting in disproportionate traffic returned to a victim", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6", + "name": "Windows:perfmon", + "channel": "Sudden spike in outbound throughput without corresponding inbound traffic" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Interval for measuring sudden outbound spike or volume pattern" + }, + { + "field": "AmplificationProtocolPorts", + "description": "List of known ports used for reflection amplification (e.g., 53/DNS, 123/NTP, 11211/Memcached)" + }, + { + "field": "PacketToByteRatio", + "description": "Heuristic threshold where the response volume far outweighs the request volume" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--d1bcc6a4-e84a-4251-b86b-e8fe2ecc0dd1", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0409#AN1144", + "external_id": "AN1144" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1144", + "description": "Detects anomalous NTLM LogonType 3 authentications that occur without accompanying domain logon events, especially from lateral systems or involving built-in administrative tools. Monitors for mismatches between source user context and system being accessed. Correlates LogonSession creation, NTLM authentications, and process/service initiation to identify suspicious use of stolen password hashes for remote access or service logon without password entry. Detects overpass-the-hash by combining Kerberos ticket issuance with NTLM-based lateral movement.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--02d090b6-8157-48da-98a2-517f7edd49fc", + "name": "WinEventLog:Security", + "channel": "EventCode=4768" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Allows tuning the correlation timeframe between authentication, session creation, and process/network activity." + }, + { + "field": "SourceAccountAnomalyThreshold", + "description": "Supports tuning detection sensitivity based on deviations from normal user login patterns or usage context." + }, + { + "field": "LogonTypeFilter", + "description": "Allows focusing detection on specific logon types (e.g., LogonType 3 for network logon, Type 10 for RDP)." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4624, 4648\", \"old_value\": \"4624\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--9311924d-7d8f-489a-8105-058a60f572fc", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0411#AN1148", + "external_id": "AN1148" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1148", + "description": "Monitor DNS queries, proxy logs, and user-agent strings for anomalous patterns associated with adversary attempts to hide infrastructure. Defenders may observe DNS resolutions to short-lived domains, abnormal WHOIS registration data, or filtering of known defensive/responder IP addresses.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Security", + "channel": "EventCode=5156, 5157" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--ff9b665a-598b-4bcb-8b2a-a87566aa1256", + "name": "dns:query", + "channel": "Excessive lookups for domains with suspicious WHOIS or short TTL values" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "SuspiciousDomains", + "description": "List of domains registered with privacy-protected or suspicious WHOIS metadata." + }, + { + "field": "ResponderIPs", + "description": "Known incident response or scanning infrastructure IP ranges." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=5156, 5157\", \"old_value\": \"EventCode=5156\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--d76081f4-26cd-4e62-91e8-4e4a3992dd90", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0412#AN1153", + "external_id": "AN1153" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1153", + "description": "Unusual access to bash history, registry credentials paths, or private key files by unauthorized or scripting tools, with correlated file and process activity.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Defines the threshold time for accessing multiple sensitive files indicating automation." + }, + { + "field": "SuspiciousProcessList", + "description": "Process names to monitor (e.g., reg.exe, cmd.exe, powershell.exe, etc.)" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--3e30007c-fc51-447f-850a-c8378427be3d", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0412#AN1157", + "external_id": "AN1157" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1157", + "description": "Unauthorized API or console calls to retrieve or reset password credentials, download key material, or modify SSO settings.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--a953ca55-921a-44f7-9b8d-3d40141aa17e", + "name": "azure:signinlogs", + "channel": "Reset password or download key from portal" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--b33d36e3-d7ea-4895-8eed-19a08a8f7c4f", + "name": "AWS:CloudTrail", + "channel": "GetSecretValue" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "SSOSettingScope", + "description": "Subset of IdP settings monitored for unauthorized changes" + }, + { + "field": "SecretType", + "description": "Which secrets (passwords, keys, tokens) are monitored" + } + ], + "x_mitre_platforms": [ + "Identity Provider" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['name']\": {\"new_value\": \"AWS:CloudTrail\", \"old_value\": \"CloudTrail:GetSecretValue\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"GetSecretValue\", \"old_value\": \"API call to retrieve secret or access key\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--59faf79f-831d-436b-9ce3-e5c1d338da6c", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0413#AN1161", + "external_id": "AN1161" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1161", + "description": "Command-line tools (e.g., curl, rsync, wget, or custom Python scripts) used to scrape documentation systems or internal REST APIs. Unusual access patterns to knowledge base folders or shared team drives.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "auditd:SYSCALL", + "channel": "execve of curl, rsync, wget with internal knowledge base or IPs" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "linux:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "CommandRegex", + "description": "Regex matching internal doc servers, knowledge base paths, or IP patterns." + }, + { + "field": "TimeWindow", + "description": "Burst access of repositories over a short time window." + } + ], + "x_mitre_platforms": [ + "Linux" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--867239cd-7939-446c-9efb-b2a7a5bd5403", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0415#AN1168", + "external_id": "AN1168" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1168", + "description": "Automated abuse of cloud-hosted applications (e.g., web apps, REST endpoints, internal APIs) causing compute exhaustion, high 5xx error rates, or frequent autoscaling triggers logged in app insights or cloudwatch.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa", + "name": "AWS:CloudWatch", + "channel": "Elevated 5xx response rates in application logs or gateway layer" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--b33d36e3-d7ea-4895-8eed-19a08a8f7c4f", + "name": "AWS:CloudTrail", + "channel": "InvokeFunction" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6", + "name": "AWS:CloudMetrics", + "channel": "Autoscaling, memory/cpu alarms, or instance unhealthiness" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "HTTP5xxRateThreshold", + "description": "Ratio of 5xx error codes over requests indicating resource exhaustion." + }, + { + "field": "FunctionInvocationRate", + "description": "Spike in lambda/API gateway executions indicating scripted behavior." + }, + { + "field": "AutoscaleEventCount", + "description": "Triggers linked to app DoS where legitimate scaling is mimicked." + } + ], + "x_mitre_platforms": [ + "IaaS" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['name']\": {\"new_value\": \"AWS:CloudTrail\", \"old_value\": \"CloudTrail:InvokeFunction\"}, \"root['x_mitre_log_source_references'][2]['name']\": {\"new_value\": \"AWS:CloudMetrics\", \"old_value\": \"CloudMetrics:InstanceHealth\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--befbbdad-a17b-41f2-bb24-5cb477c5cc50", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0416#AN1169", + "external_id": "AN1169" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1169", + "description": "Detects FTP, SMB, or TFTP traffic initiated by suspicious processes like PowerShell, cmd.exe, or rundll32.exe\u2014especially with large outbound file transfers or unbalanced traffic volume.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Flow", + "channel": "ftp.log, smb_files.log" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ProcessImageFilter", + "description": "Limit to non-standard FTP clients or suspicious binaries (e.g., cmd, mshta)" + }, + { + "field": "DataFlowDirectionThreshold", + "description": "Ratio of outbound:inbound bytes; e.g., >90% outbound" + }, + { + "field": "FilenamePattern", + "description": "Suspicious file extensions or naming (e.g., .zip, .rar, random hash names)" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--7e4ac594-c46c-4c7e-ba6d-9a457ab1e767", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0418#AN1177", + "external_id": "AN1177" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1177", + "description": "Multi-stage Windows DACL manipulation behavioral chain: (1) Process creation of permission-modifying utilities (icacls.exe, takeown.exe, attrib.exe, cacls.exe) or PowerShell ACL cmdlets, (2) Command-line analysis revealing privilege escalation intent through suspicious parameters (/grant, /takeown, /T, Set-Acl), (3) DACL modification events (4670) correlating with process execution, (4) Subsequent file access attempts (4663) indicating successful permission bypass, (5) Potential follow-on persistence or lateral movement activities", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--5b8b466b-2c81-4fe7-946f-d677a74ae3db", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--639e87f3-acb6-448a-9645-258f20da4bc5", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4656, 4658" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--05645013-2fed-4066-8bdc-626b2e201dd4", + "name": "WinEventLog:WMI", + "channel": "EventCode=5857, 5858, 5860, 5861" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TemporalCorrelationWindow", + "description": "Time window for correlating process creation (4688/sysmon 1) with DACL changes (4670) and subsequent access (4663) - default 300 seconds, adjust based on system performance and network latency" + }, + { + "field": "SensitivePathWhitelist", + "description": "Environment-specific critical directories requiring enhanced monitoring (e.g., C:\\Windows\\System32, C:\\Program Files, %USERPROFILE%\\AppData) - customize per organizational security requirements" + }, + { + "field": "AuthorizedAdministratorAccounts", + "description": "User accounts and service accounts authorized to perform legitimate DACL modifications - update to reflect current administrative staff and automated processes" + }, + { + "field": "SuspiciousCommandLinePatterns", + "description": "Regex patterns for detecting malicious intent in permission modification commands - tune to reduce false positives while maintaining detection efficacy" + }, + { + "field": "BusinessHoursThreshold", + "description": "Time-based risk scoring modifier for permission changes occurring outside standard business hours - adjust based on organizational work patterns" + }, + { + "field": "PowerShellScriptBlockSizeThreshold", + "description": "Minimum PowerShell script block size for ACL-related content analysis - balance between detection coverage and log volume" + }, + { + "field": "FileAccessFrequencyBaseline", + "description": "Statistical baseline for normal file access patterns post-permission change - establish through historical analysis and update periodically" + }, + { + "field": "WMIMethodInvocationWhitelist", + "description": "Approved WMI classes and methods for legitimate permission operations (e.g., Win32_SecurityDescriptor) - maintain based on authorized management tools" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4670\"}, \"root['x_mitre_log_source_references'][4]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4103,4104,4105, 4106\"}, \"root['x_mitre_log_source_references'][5]['name']\": {\"new_value\": \"WinEventLog:WMI\", \"old_value\": \"WinEventLog:Microsoft-Windows-WMI-Activity/Operational\"}, \"root['x_mitre_log_source_references'][5]['channel']\": {\"new_value\": \"EventCode=5857, 5858, 5860, 5861\", \"old_value\": \"EventCode=5857, 5860, 5861\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--ee7499f8-4262-47cf-8fff-5344f60bf2cf", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0419#AN1178", + "external_id": "AN1178" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1178", + "description": "Correlate DNS queries that generate domains with high entropy or gibberish patterns, combined with short-lived connections from unusual processes. Monitor Sysmon DNS events and Windows Security logs for abnormal query rates and failed lookups.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "EntropyThreshold", + "description": "Set threshold for randomness in queried domain strings (e.g., >4.0)" + }, + { + "field": "QueryFailureRate", + "description": "Failed resolution ratio above normal baseline (e.g., >30%)" + }, + { + "field": "TimeWindow", + "description": "Duration for aggregating suspicious DNS queries (e.g., 5\u201310 min)" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=22\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--fedc5a7d-4ea9-4dd7-b2e0-3f10549d90db", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0421#AN1185", + "external_id": "AN1185" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1185", + "description": "Detection focuses on abnormal service executions initiated via service control manager APIs, sc.exe, net.exe, or PsExec creating temporary services. Defenders observe process creation of services.exe spawning non-standard binaries, registry changes in service keys followed by rapid execution, and network connections originating from processes tied to transient services. Correlation across process lineage, registry activity, and service logs provides strong signals of malicious service execution.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--5297a638-1382-4f0c-8472-0d21830bf705", + "name": "WinEventLog:Security", + "channel": "EventCode=4697" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ServiceBinaryAllowlist", + "description": "Known binaries/services expected to be invoked via services.exe" + }, + { + "field": "ParentProcessCorrelationWindow", + "description": "Time window for correlating service creation with execution events" + }, + { + "field": "RemoteExecutionHosts", + "description": "Approved remote hosts that may trigger service execution (e.g., via PsExec)" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}, \"root['x_mitre_log_source_references'][3]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--5a10a19a-035e-469e-8ec5-fafb1f0f0fe6", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0425#AN1189", + "external_id": "AN1189" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1189", + "description": "Detects unusual outbound connections to web services from uncommon processes using SSL/TLS, particularly those exhibiting high outbound data volume or persistence.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Flow", + "channel": "SSL/TLS Inspection or PCAP" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ProcessName", + "description": "To tune for unexpected or uncommon executables initiating network connections" + }, + { + "field": "DataTransferThreshold", + "description": "Volume of outbound data in short time window (e.g., >1MB in <5 min)" + }, + { + "field": "TimeWindow", + "description": "Look for connections persisting outside of normal business hours" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--de4fe01d-96d7-4258-a1d6-6958fe50a4ed", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0430#AN1198", + "external_id": "AN1198" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1198", + "description": "Monitors suspicious access to password stores such as LSASS, DPAPI, Windows Credential Manager, or browser credential databases. Detects anomalous process-to-process access (e.g., Mimikatz accessing LSASS) and correlation of credential store file reads with execution of non-standard processes.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=10" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TargetProcesses", + "description": "List of sensitive processes to monitor (e.g., lsass.exe, svchost.exe)" + }, + { + "field": "KeywordPatterns", + "description": "Regex for suspicious command-line arguments such as 'dpapi', 'credman', 'mimikatz'" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4656\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--0fff438f-1aa9-4424-be94-a08b400adcb0", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0433#AN1207", + "external_id": "AN1207" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1207", + "description": "Abuse of mavinject.exe to inject DLLs or import descriptors into another running process. Chain: (1) mavinject.exe starts with /INJECTRUNNING or /HMODULE \u2192 (2) mavinject obtains high-access handles to a target process (VM_WRITE/CREATE_THREAD) \u2192 (3) target process loads attacker DLL (module load) \u2192 (4) optional follow-on child activity or network egress from the target process.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=10" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlation interval (e.g., 5\u201310 minutes) linking mavinject start \u2192 ProcessAccess \u2192 module load/network from the target process." + }, + { + "field": "DLLPathRegex", + "description": "Patterns for suspicious DLL locations (e.g., %TEMP%, Downloads, UNC shares) to reduce noise from legitimate injections." + }, + { + "field": "TargetProcessAllowList", + "description": "Common legitimate targets for App-V (if used) to suppress; flag unusual targets like browsers, LSASS, Winlogon, EDR processes." + }, + { + "field": "MinGrantedAccessSet", + "description": "Set of access rights that imply injection (VM_WRITE, VM_OPERATION, CREATE_THREAD). Tune for your EDR/sysmon formatting." + }, + { + "field": "ParentProcessFilter", + "description": "Legitimate parents starting mavinject (e.g., App-V services) vs. suspicious parents (Office, script hosts, browsers)." + }, + { + "field": "ExternalIPAllowlist", + "description": "Known enterprise update/CDN ranges to exclude when correlating post-injection network activity." + }, + { + "field": "SignedToUnsignedTransition", + "description": "Alerting when Microsoft-signed mavinject leads to loading unsigned DLLs in a target process." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][4]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}, \"root['x_mitre_log_source_references'][5]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--a29288f5-c5d8-4e2d-8370-c4e21a64fc95", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0437#AN1212", + "external_id": "AN1212" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1212", + "description": "Detects adversary activity aimed at accessing LSA Secrets, including registry key export of HKEY_LOCAL_MACHINE\\SECURITY\\Policy\\Secrets or memory scraping via tools such as Mimikatz or PowerSploit's Invoke-Mimikatz.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=10" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TargetObject", + "description": "Target registry paths like HKLM\\SECURITY\\Policy\\Secrets or variants can be tuned depending on OS version or registry redirection settings." + }, + { + "field": "ImageLoaded", + "description": "Module names such as `lsasrv.dll`, `sechost.dll`, or suspicious DLLs loaded by user processes may require tuning for known-good service operations." + }, + { + "field": "AccessMask", + "description": "Tuning based on whether processes are using specific sensitive access rights (e.g., 0x2 or 0x4)." + }, + { + "field": "TimeWindow", + "description": "Temporal window between registry access and command-line tool execution." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--a59042de-ecac-45bf-a852-af3df41b86d8", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0440#AN1220", + "external_id": "AN1220" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1220", + "description": "Execution of SyncAppvPublishingServer.vbs through wscript.exe with a command-line containing embedded PowerShell, proxying malicious PowerShell execution through a Microsoft-signed VBScript interpreter to evade detection and restrictions.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=10" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "CommandLineRegex", + "description": "Detects embedded PowerShell commands in SyncAppvPublishingServer.vbs invocation, e.g., `{powershell -nop -enc ...}`" + }, + { + "field": "ScriptInterpreter", + "description": "May vary between `wscript.exe`, `cscript.exe`, or called via `cmd.exe`" + }, + { + "field": "PowerShellObfuscationScore", + "description": "Used to detect encoding, obfuscation, or entropy level in embedded PowerShell payloads" + }, + { + "field": "TimeWindow", + "description": "Time delta between VBScript proxy invocation and PowerShell payload execution" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--4959f750-78db-4b4c-8d91-23027b386c2b", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0441#AN1221", + "external_id": "AN1221" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1221", + "description": "Detects the creation, modification, or deletion of scheduled tasks through Task Scheduler, WMI, PowerShell, or API-based methods followed by execution from svchost.exe or taskeng.exe. Includes detection of hidden or anomalous scheduled tasks, especially those created under SYSTEM or suspicious user contexts.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--f42df6f0-6395-4f0c-9376-525a031f00c3", + "name": "WinEventLog:Security", + "channel": "EventCode=4698" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--faa34cf6-cf32-4dc9-bd6a-8f7a606ff65b", + "name": "WinEventLog:Security", + "channel": "EventCode=4702" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Defines threshold for grouping task creation and associated execution within suspicious time proximity." + }, + { + "field": "UserContext", + "description": "Filters based on non-standard user accounts or execution under SYSTEM when not typical for the environment." + }, + { + "field": "TaskNamePattern", + "description": "Allows defenders to flag obfuscated, randomized, or suspicious task names outside normal conventions." + }, + { + "field": "CommandLineEntropyThreshold", + "description": "Flags tasks executing heavily obfuscated PowerShell or binary blobs via base64 or encoding." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][4]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--5b6f6588-3434-4199-b16f-af44ae546c3d", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0442#AN1222", + "external_id": "AN1222" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1222", + "description": "Detection of anomalous registry modifications to Subject Interface Packages (SIPs) or trust provider DLL mappings, unexpected loading of non-Microsoft cryptographic modules, or attempts to redirect WinVerifyTrust validation logic. Defender view focuses on registry tampering, suspicious DLL loads into trusted processes, and abnormal trust validation failures correlated across event streams.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Security", + "channel": "EventCode=4657" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8", + "name": "WinEventLog:CodeIntegrity", + "channel": "EventCode=3033" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "RegistryPathBaselines", + "description": "Monitor for changes in Registry paths." + }, + { + "field": "TimeWindow", + "description": "Correlate between changes in Registry values, system files, and modules loaded." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['name']\": {\"new_value\": \"WinEventLog:CodeIntegrity\", \"old_value\": \"WinEventLog:Application\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=3033\", \"old_value\": \"81,3033\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--908aa2d1-f1c0-456b-9c9f-b984b309e51c", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0444#AN1225", + "external_id": "AN1225" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1225", + "description": "Detects suspicious usage of common application-layer protocols (e.g., HTTP, HTTPS, DNS, SMB) by abnormal processes, with high outbound byte counts or irregular ports, possibly indicating command and control or data exfiltration.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Flow", + "channel": "http, dns, smb, ssl logs" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ProtocolList", + "description": "Limit detection to app-layer protocols of interest: HTTP, DNS, SSL, SMB, RDP" + }, + { + "field": "DataVolumeThreshold", + "description": "Detects asymmetric communication volume (e.g., >90% outbound)" + }, + { + "field": "UnusualProcessList", + "description": "Track processes not normally associated with network activity" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--0e9add05-93bd-47b2-acf5-1817f03e804a", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0445#AN1229", + "external_id": "AN1229" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1229", + "description": "Suspicious process spawning (e.g., `rundll32`, `svchost`, `powershell`, or `netsh`) followed by network connection creation to internal hosts or uncommon external endpoints on high or non-standard ports.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a", + "name": "NSM:Connections", + "channel": "Outbound Connection" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ParentProcessName", + "description": "Legitimate system processes that may rarely spawn network-capable child processes (e.g., `rundll32`, `svchost`)." + }, + { + "field": "DestinationPort", + "description": "Watch for high-numbered ports or well-known proxy ports like 1080, 8080, 4444." + }, + { + "field": "TimeWindow", + "description": "Capture unusual spikes in outbound connections over a short period." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--d6166e3d-2e29-4097-9fb4-c66ce0616897", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0446#AN1234", + "external_id": "AN1234" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1234", + "description": "Adversaries attempt to read sensitive files such as /etc/passwd and /etc/shadow for credential dumping. This may involve access to the files directly via command-line utilities (e.g., cat, less), creation of backup copies, or parsing through post-exploitation frameworks. Multi-event correlation includes elevated process execution, file access/read on sensitive paths, and anomalous read behaviors tied to non-root or unusual users.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "auditd:SYSCALL", + "channel": "open, read" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "auditd:SYSCALL", + "channel": "execve" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "exe", + "description": "Executable name used to access credentials (e.g., cat, cp, awk); can vary across environments" + }, + { + "field": "user", + "description": "User context under which the access occurs; typically root, but can be non-standard in attacks" + }, + { + "field": "PATH", + "description": "Target file paths (e.g., /etc/passwd, /etc/shadow); may vary in containerized or customized systems" + }, + { + "field": "TimeWindow", + "description": "Time correlation threshold for chaining access and execution events" + } + ], + "x_mitre_platforms": [ + "Linux" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_mutable_elements'][2]['field']\": {\"new_value\": \"PATH\", \"old_value\": \"path\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--b8ec766b-cfb9-4ef8-bd46-655f0b820ad3", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0449#AN1242", + "external_id": "AN1242" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1242", + "description": "Detection focuses on abnormal or unauthorized cloud instance creation events. From a defender\u2019s perspective, suspicious behavior includes VM/instance creation by rarely used or newly created accounts, creation events from unusual geolocations, or rapid sequences of snapshot creation followed by instance creation and mounting. Unexpected network or IAM policy changes applied to new instances can indicate adversarial use rather than legitimate provisioning.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--f8213cde-6b3a-420d-9ab7-41c9af1a919f", + "name": "AWS:CloudTrail", + "channel": "RunInstances" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--45fd904d-6eb0-4b50-8478-a961f09f898b", + "name": "AWS:CloudTrail", + "channel": "DescribeInstances" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--b5b0e8ae-7436-4951-950a-7b83c4dd3f2c", + "name": "azure:activity", + "channel": "MICROSOFT.COMPUTE/VIRTUALMACHINES/WRITE" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "UserContext", + "description": "IAM user, service account, or role creating the instance. Tuned to allowlist known automation services." + }, + { + "field": "GeoLocation", + "description": "Region or source IP where the creation request originates. Helps detect cross-region or unusual location abuse." + }, + { + "field": "RateThreshold", + "description": "Number of instances created per user or account in a time window. Tuned for environments with elastic scaling." + }, + { + "field": "TaggingPolicy", + "description": "Expected tags (e.g., owner, purpose, cost center) for new instances. Deviations may indicate adversarial creation." + } + ], + "x_mitre_platforms": [ + "IaaS" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['name']\": {\"new_value\": \"AWS:CloudTrail\", \"old_value\": \"CloudTrail:EC2\"}, \"root['x_mitre_log_source_references'][1]['name']\": {\"new_value\": \"AWS:CloudTrail\", \"old_value\": \"CloudTrail:EC2\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--78864416-9ea3-4285-aab4-ecf31c935253", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0455#AN1252", + "external_id": "AN1252" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1252", + "description": "Detects behavioral chains where PowerShell is launched with encoded commands, unusual parent processes, or suspicious modules loaded, potentially followed by network connections or child process spawning. Supports detection of both direct (powershell.exe) and indirect (.NET automation) invocations.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--ee575f4a-2d4f-48f6-b18b-89067760adc1", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=400, 403" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "CommandLinePattern", + "description": "Regex pattern for encoded, obfuscated, or hidden PowerShell arguments (e.g., '-enc', '-nop')." + }, + { + "field": "ParentProcessName", + "description": "Filter based on abnormal parents like Excel, WinWord, or mshta spawning PowerShell." + }, + { + "field": "TimeWindow", + "description": "Scope detection to off-hours, lateral movement timeframes, or non-maintenance windows." + }, + { + "field": "LoadedModuleList", + "description": "Tuneable to monitor rare or never-before-seen .NET assemblies tied to PowerShell abuse." + }, + { + "field": "ScriptBlockLengthThreshold", + "description": "Adjustable threshold for length of script blocks logged by Event ID 4104 (useful for filtering noise)." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=400, 403\", \"old_value\": \"EventCode=400,403\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--0929e9c5-2e1a-4cc1-a9c5-df081b180201", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0456#AN1253", + "external_id": "AN1253" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1253", + "description": "A process (often after stealing/creating a token) calls CreateProcessWithTokenW/CreateProcessAsUserW or uses runas to spawn a **new** process whose security context (SID/LogonId/IntegrityLevel) differs from its parent. Chain: (1) suspicious command/API \u2192 (2) privileged handle or token duplication/open \u2192 (3) new child process running as another user / higher integrity \u2192 (4) optional follow\u2011on privileged/lateral actions.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=10" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e", + "name": "ETW:ProcThread", + "channel": "api_call: CreateProcessWithTokenW, CreateProcessAsUserW" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--39b9db72-8b48-4595-a18d-db5bbba3091b", + "name": "WinEventLog:Security", + "channel": "EventCode=4672, 4634" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--5b8b466b-2c81-4fe7-946f-d677a74ae3db", + "name": "WinEventLog:Security", + "channel": "EventCode=5136" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlation window between API/handle access and the spawned process (default 5\u201310 minutes)." + }, + { + "field": "AllowedImpersonators", + "description": "Service accounts/binaries legitimately using CreateProcessWithTokenW (e.g., PsExec service, SCCM, backup agents)." + }, + { + "field": "IntegrityEscalationDelta", + "description": "Minimum jump in integrity level (e.g., Medium\u2192System) to flag." + }, + { + "field": "ParentChildUserMismatch", + "description": "Treat any parent/child SID or LogonId mismatch as suspicious unless on allow-list." + }, + { + "field": "SensitiveTargets", + "description": "List of processes (e.g., lsass.exe, winlogon.exe, services.exe) whose token access prior to the spawn raises score." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][3]['channel']\": {\"new_value\": \"EventCode=4672, 4634\", \"old_value\": \"EventCode=4624, 4672\"}, \"root['x_mitre_log_source_references'][4]['name']\": {\"new_value\": \"WinEventLog:Security\", \"old_value\": \"WinEventLog:DirectoryService\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--4412fb07-9a44-49de-80af-8746b0be3865", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0457#AN1254", + "external_id": "AN1254" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1254", + "description": "Anomalous use of ICMP or UDP by non-network service processes for data exfiltration or remote control, especially if traffic bypasses proxy infrastructure or shows unusual flow patterns.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Flow", + "channel": "ICMP/UDP traffic (Wireshark, Suricata, Zeek)" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ProcessContextAllowList", + "description": "Processes normally allowed to use ICMP/UDP (e.g., ping.exe, DNS resolver)." + }, + { + "field": "ByteTransferAnomalyThreshold", + "description": "Suspicion if client sends much more data than it receives (e.g., >90%)." + }, + { + "field": "ProtocolUsageBaseline", + "description": "Baseline which protocols are normal per host or segment (ICMP, UDP, etc.)." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--c84ed29d-c0bf-465c-9e4a-7685cd4ff444", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 18:15:01.136000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0458#AN1259", + "external_id": "AN1259" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1259", + "description": "Adversary modifies Active Directory domain trust settings via `netdom`, `nltest`, or PowerShell to add new domain trust or alter federation. Modifications occur in AD object attributes like trustDirection, trustType, trustAttributes, often paired with SeEnableDelegationPrivilege or certificate injection.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--5b8b466b-2c81-4fe7-946f-d677a74ae3db", + "name": "WinEventLog:Security", + "channel": "EventCode=5136" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--d27b0089-2c39-4b6c-84ff-303e48657e77", + "name": "WinEventLog:Security", + "channel": "EventCode=4704" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ObjectType", + "description": "Focus on `trustedDomain` or `foreignSecurityPrincipal` AD objects in trust containers." + }, + { + "field": "AttributeModified", + "description": "Monitor attributes like `trustPartner`, `trustDirection`, `trustType`, `msDS-TrustForestTrustInfo`." + }, + { + "field": "TimeWindow", + "description": "Correlate trust creation with unusual logon events or certificate modifications." + }, + { + "field": "UserContext", + "description": "Flag rare accounts or non-standard admin users performing trust changes." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 18:15:01.136000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=5136\", \"old_value\": \"EventCode=5136,5137,5141\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--a2d3072a-0f3a-46a1-a92e-f0d7ae030b48", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0458#AN1260", + "external_id": "AN1260" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1260", + "description": "Adversary adds federated identity provider (IdP) or modifies tenant domain authentication from Managed to Federated. Detected via API, PowerShell, or Admin Portal through federation events like `Set domain authentication`, `Add federated identity provider`, or `Update-MsolFederatedDomain`.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa", + "name": "m365:unified", + "channel": "Set federation settings on domain|Set domain authentication|Add federated identity provider" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "azure:signinlogs", + "channel": "OperationName=SetDomainAuthentication OR Update-MsolFederatedDomain" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "OperationName", + "description": "Identify rare trust-modification operations (SetDomainAuthentication, Update-MsolFederatedDomain)." + }, + { + "field": "InitiatedBy", + "description": "Flag federated trust changes performed by unknown users, service principals, or tokens." + }, + { + "field": "UserAgent", + "description": "Separate scripted/API interactions from GUI-based administrative changes." + }, + { + "field": "TimeWindow", + "description": "Correlate trust change to federated login or SAML token injection within short window." + } + ], + "x_mitre_platforms": [ + "Identity Provider" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['name']\": {\"new_value\": \"azure:signinlogs\", \"old_value\": \"azure:signinLogs\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--8d7fb300-189d-4654-ba66-3612a8a4cf65", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0461#AN1271", + "external_id": "AN1271" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1271", + "description": "Anomalous creation or mounting of hidden partitions or virtual file systems. Defender view: detection of registry modifications linked to non-standard file systems, suspicious disk I/O patterns, or bootkit-like behavior where hidden volumes are accessed outside normal file system APIs.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--b9d031bb-d150-4fc6-8025-688201bf3ffd", + "name": "etw:Microsoft-Windows-Kernel-Storage", + "channel": "Raw disk I/O operations bypassing NTFS APIs" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "MonitoredRegistryKeys", + "description": "Specify registry paths for mount points and hidden partition configs." + }, + { + "field": "DiskIOThreshold", + "description": "Tune thresholds for raw disk access outside expected drivers." + }, + { + "field": "TimeWindow", + "description": "Correlate boot-time anomalies with hidden file system mounting activity." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--db50537c-9234-4350-9bf0-838d4cffbd34", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0463#AN1275", + "external_id": "AN1275" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1275", + "description": "High volume of failed logon attempts followed by a successful one from a suspicious user, host, or timeframe", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--a953ca55-921a-44f7-9b8d-3d40141aa17e", + "name": "WinEventLog:Security", + "channel": "EventCode=4776, 4625" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Adjustable window to correlate failed logons, e.g., 5-10 minutes" + }, + { + "field": "UserContext", + "description": "Define scope of monitored users (e.g., service accounts, admins)" + }, + { + "field": "FailureThreshold", + "description": "Count of failed logons before raising an alert (e.g., 10-15)" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4776, 4625\", \"old_value\": \"EventCode=4625, 4624\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--8d58973f-7fd7-435e-86b8-58f9b399f89f", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0464#AN1280", + "external_id": "AN1280" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1280", + "description": "Enumeration of saved Wi-Fi profiles and cleartext password retrieval using `netsh wlan` or API-level access to `wlanAPI.dll`.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "WiFiProfileName", + "description": "Filter by known saved SSID names to reduce benign usage of network diagnostics" + }, + { + "field": "ParentProcess", + "description": "Anomalous parent-child relationships may be used to spot abuse (e.g., Office \u2192 netsh)" + }, + { + "field": "TimeWindow", + "description": "Correlate profile enumeration and password dumping within short timeframe (e.g., 60 seconds)" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--7a3dd710-39a7-4327-8d3b-150c50b2c680", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0465#AN1283", + "external_id": "AN1283" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1283", + "description": "Detection of default account usage such as Guest or Administrator performing interactive or remote logons on systems outside of installation or maintenance windows.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "UserContext", + "description": "Default usernames like 'Administrator' or 'Guest' may be renamed or disabled by the organization. Detection logic should account for name changes." + }, + { + "field": "TimeWindow", + "description": "Restrict detection to unusual hours or outside of expected maintenance windows." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4624, 4648\", \"old_value\": \"EventCode=4624\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--84e969fd-a0ee-425f-a7dd-ae10e170d45a", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0466#AN1288", + "external_id": "AN1288" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1288", + "description": "Execution of Microsoft-signed scripts (e.g., pubprn.vbs, installutil.exe, wscript.exe, cscript.exe) used to proxy execution of untrusted or external binaries. Behavior is detected through command-line process lineage, child process spawning, and unsigned payload execution from signed parent.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=10" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ParentProcessName", + "description": "Environment-specific paths to script interpreters like wscript.exe, cscript.exe, pubprn.vbs, or installutil.exe." + }, + { + "field": "TimeWindow", + "description": "Time delta between signed script execution and suspicious child process creation." + }, + { + "field": "ChildCommandLineRegex", + "description": "Regex pattern used to detect malicious payload execution (e.g., download cradle, PowerShell decode)." + }, + { + "field": "SignedToUnsignedTransition", + "description": "Indicates whether the parent is signed by Microsoft but child is unsigned or unknown." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4103\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--780021a3-d3e6-4c5b-a976-1c3715b990e2", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0468#AN1290", + "external_id": "AN1290" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1290", + "description": "Detects rogue DHCP server activity and anomalous DHCP OFFER/ACK messages assigning unexpected DNS or gateway values. Detection correlates DHCP server role changes, DHCP exhaustion warnings, and sudden network configuration changes across endpoints.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa", + "name": "WinEventLog:System", + "channel": "EventCode=1341, 1342, 1020, 1063" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Flow", + "channel": "DHCP OFFER or ACK with unauthorized DNS/gateway parameters" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "AuthorizedDHCPServers", + "description": "List of known DHCP servers; unexpected sources are suspicious." + }, + { + "field": "TimeWindow", + "description": "Interval to correlate DHCP OFFER/ACK anomalies with subsequent misconfigurations." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=1341, 1342, 1020, 1063\", \"old_value\": \"EventCode=1341,1342,1020,1063\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--bcf48294-2388-4ae6-be22-f9038c54e1db", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0470#AN1294", + "external_id": "AN1294" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1294", + "description": "Untrusted processes creating outbound TLS/HTTPS connections with malformed certificates or header fields, often mismatched with target service behavior. Detects protocol impersonation attempts via traffic metadata analysis and host process lineage.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Flow", + "channel": "SSL/TLS Handshake Analysis" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "IssuerOrgFilter", + "description": "Organizations in certificate issuer fields to allowlist or monitor." + }, + { + "field": "UserContext", + "description": "Restrict detection to non-system users or external-facing applications." + }, + { + "field": "HeaderSignatureMatch", + "description": "Specific HTTP header anomalies or patterns (e.g., missing User-Agent)." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--1fd68bec-86cb-4457-b0cd-56fc724fd578", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0474#AN1305", + "external_id": "AN1305" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1305", + "description": "Windows-specific environmental keying behavioral chain: (1) Rapid system information discovery through multiple techniques (WMI queries, registry enumeration, network share discovery, hostname/domain checks), (2) Target validation through specific environmental artifact collection (AD domain membership, network topology, installed software versions), (3) Cryptographic operation correlation indicating payload decryption based on collected environmental values, (4) Subsequent malicious code execution following successful environmental validation, (5) Temporal clustering of discovery activities suggesting automated environmental assessment", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=25" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--05645013-2fed-4066-8bdc-626b2e201dd4", + "name": "WinEventLog:WMI", + "channel": "EventCode=5857, 5858, 5860, 5861" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "DiscoveryTimeWindow", + "description": "Time window for correlating multiple discovery activities as part of environmental assessment - adjust based on observed attack patterns and system performance (default: 300 seconds)" + }, + { + "field": "CriticalDiscoveryThreshold", + "description": "Minimum number of distinct discovery techniques within time window to trigger detection - tune based on environment's normal administrative activity levels" + }, + { + "field": "TargetSpecificArtifacts", + "description": "Organization-specific environmental elements that adversaries might target (domain names, network shares, specific hostnames, software versions)" + }, + { + "field": "CryptographicIndicatorPatterns", + "description": "Process names, command lines, and API calls indicating potential decryption operations - customize based on observed cryptographic tool usage in environment" + }, + { + "field": "LegitimateAdminAccounts", + "description": "User accounts authorized to perform extensive system discovery - maintain current list to reduce false positives from legitimate administrative activities" + }, + { + "field": "BusinessHoursBaseline", + "description": "Normal business hours for risk scoring adjustment - discovery activities outside these hours receive higher risk scores" + }, + { + "field": "WMIQueryComplexityThreshold", + "description": "Complexity metric for WMI queries to identify sophisticated environmental assessment versus simple system checks" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4624, 4648\", \"old_value\": \"EventCode=4624,4648, 4672\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}, \"root['x_mitre_log_source_references'][5]['channel']\": {\"new_value\": \"EventCode=5857, 5858, 5860, 5861\", \"old_value\": \"EventCode=5857, 5860, 5861\"}, \"root['x_mitre_log_source_references'][6]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4103\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--2cb33f68-48f8-4ffe-86e1-bc857a300398", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0475#AN1308", + "external_id": "AN1308" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1308", + "description": "Detects rundll32.exe invoked with atypical arguments (.dll, .cpl, javascript:, mshtml). DLLs not normally loaded by rundll32 are mapped into memory. Control_RunDLL or RunHTMLApplication invoked. Suspicious DLLs or scripts accessed from disk or network. Rundll32 reaches out to external domains (e.g., fetching .sct or .hta).", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlating rundll32 invocation with DLL load or network activity within X seconds." + }, + { + "field": "ParentProcessFilter", + "description": "Limit detection to suspicious parent processes (e.g., explorer.exe, office apps) vs. trusted installers." + }, + { + "field": "AllowedDLLs", + "description": "Baseline list of legitimate DLLs frequently executed by rundll32 in the environment." + }, + { + "field": "ExternalIPRange", + "description": "Scope of external IP ranges considered anomalous for rundll32 network connections." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][3]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--4f15b707-9b44-4716-bfcd-e3f28659077b", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0476#AN1309", + "external_id": "AN1309" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1309", + "description": "Correlates creation of email forwarding rules or header anomalies (e.g., X-MS-Exchange-Organization-AutoForwarded) with suspicious process execution, file access of .pst/.ost files, and network connections to external SMTP servers.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--f5468e67-51c7-4756-9b4f-65707708e7fa", + "name": "WinEventLog:Security", + "channel": "EventCode=5145" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa", + "name": "WinEventLog:Application", + "channel": "Exchange logs or header artifacts" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Defines correlation window across email rule creation and outbound SMTP." + }, + { + "field": "UserContext", + "description": "Filters for admin or service accounts to reduce false positives." + }, + { + "field": "SMTPDomainList", + "description": "Allows tuning based on expected external email domains." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}, \"root['x_mitre_log_source_references'][3]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--9dab17bf-62c7-4187-90f4-7335790df7c0", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0477#AN1313", + "external_id": "AN1313" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1313", + "description": "Adversaries using WinRM to remotely execute commands, launch child processes, or access WMI. The detection chain includes service use, network activity, remote session logon, and process creation within a short temporal window.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--74fa567d-bc90-425c-8a41-3c703abb221c", + "name": "WinEventLog:WinRM", + "channel": "EventCode=6" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a", + "name": "NSM:Connections", + "channel": "Inbound on ports 5985/5986" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Defines max time between remote shell creation and child process execution (e.g., 60 seconds)" + }, + { + "field": "UserContext", + "description": "Scope to unexpected remote user logons (non-admins, service accounts)" + }, + { + "field": "CommandLineAnomalyScore", + "description": "Score for suspicious command usage via WinRM (e.g., encoded PowerShell)" + }, + { + "field": "KnownAdminHosts", + "description": "List of trusted systems allowed to use WinRM legitimately" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4624, 4648\", \"old_value\": \"EventCode=4624\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--dcd6253b-a986-4c8a-bd89-46389007ea83", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0478#AN1314", + "external_id": "AN1314" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1314", + "description": "Cause\u2192effect chain: (1) User-facing app (Office/PDF/archiver/browser) records an open/click or abnormal event, then (2) a downloaded file is created in a user-writable path and/or decompressed, (3) the parent user app spawns a living-off-the-land binary (e.g., powershell/cmd/mshta/rundll32/msiexec/wscript/expand/zip) or installer, and (4) immediate outbound HTTP(S)/DNS/SMB from the same lineage.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa", + "name": "WinEventLog:Application", + "channel": "EventCode=1000" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlation window (e.g., 15 minutes) from document open to child/egress." + }, + { + "field": "HighRiskParents", + "description": "Apps that should rarely spawn OS utilities (winword.exe, excel.exe, powerpnt.exe, acrord32.exe, chrome/msedge/firefox, 7zFM.exe, winrar.exe, explorer.exe)." + }, + { + "field": "HighRiskChildren", + "description": "LOLBIN list: powershell.exe, cmd.exe, wscript.exe, cscript.exe, mshta.exe, rundll32.exe, regsvr32.exe, msiexec.exe, curl.exe, bitsadmin.exe, pcalua.exe, expand.exe, tar.exe." + }, + { + "field": "UserPaths", + "description": "Writable paths to watch: %USERPROFILE%\\Downloads, %TEMP%, %APPDATA%\\*, OneDrive/Teams cache, Office startup folders." + }, + { + "field": "EgressAllowList", + "description": "Corporate update/CDN domains and proxy egress CIDRs to suppress benign updater traffic." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=1000\", \"old_value\": \"EventCode=1000,1001\"}, \"root['x_mitre_log_source_references'][3]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--475313b7-c26f-44f6-a8f3-09b57f03fcd8", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0483#AN1325", + "external_id": "AN1325" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1325", + "description": "Enumeration of services via native CLI tools (e.g., `sc query`, `tasklist /svc`, `net start`) or API calls via PowerShell and WMI.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ProcessName", + "description": "Can be tuned to specific binaries used for service enumeration (e.g., `sc.exe`, `tasklist.exe`)." + }, + { + "field": "CommandLineMatch", + "description": "Filters for variations like `sc query`, `net start`, `Get-Service`." + }, + { + "field": "ParentProcess", + "description": "Used to suppress known admin scripts or automation jobs." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--d9a1ace1-6307-4db7-925f-67057361e66a", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0484#AN1328", + "external_id": "AN1328" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1328", + "description": "Spike in object access from new IAM user or role followed by data exfiltration to external IPs", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--58ef998c-f3bf-4985-b487-b1005f5c05d1", + "name": "AWS:CloudTrail", + "channel": "GetObject, CopyObject" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--b5d0492b-cda4-421c-8e51-ed2b8d85c5d0", + "name": "AWS:CloudTrail", + "channel": "AssumeRole" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "AWS:VPCFlowLogs", + "channel": "Unusual volume of data transferred from S3 storage endpoints to non-corporate IPs" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Timeframe for data transfer correlation (e.g., 10 minutes)" + }, + { + "field": "ExternalIPAllowList", + "description": "Known list of corporate and expected outbound IP addresses" + } + ], + "x_mitre_platforms": [ + "IaaS" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"GetObject, CopyObject\", \"old_value\": \"GetObject\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--7e6e9c0e-737e-43ac-8cdd-5edbff4d6424", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0485#AN1331", + "external_id": "AN1331" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1331", + "description": "Identify repeated DNS resolutions where the same domain name returns multiple IPs in short succession, combined with low TTL values and high query volume from unusual processes. Correlate with process lineage (e.g., Office apps spawning abnormal DNS lookups).", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "DNSQueryBurstThreshold", + "description": "Number of unique IPs returned per domain in a short window" + }, + { + "field": "TimeWindow", + "description": "Adjust correlation timeframe for fast flux detection (e.g., 5\u201310 minutes)" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=22\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--6c0a2e08-debd-46e6-bb5f-5159ad8f12ad", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0486#AN1335", + "external_id": "AN1335" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1335", + "description": "Identifies abuse of odbcconf.exe to execute malicious DLLs using the REGSVR command flag. Behavior chain: (1) Process creation of odbcconf.exe with /REGSVR or /A {REGSVR ...} arguments \u2192 (2) DLL load by odbcconf.exe of non-standard or unsigned modules \u2192 (3) Optional follow-on process creation or network activity from loaded DLL.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ParentProcessName", + "description": "List of approved processes that may legitimately invoke odbcconf.exe" + }, + { + "field": "AllowedCommandPatterns", + "description": "Known-good odbcconf.exe arguments in the environment" + }, + { + "field": "TimeWindow", + "description": "Time range for correlating module loads and network activity after odbcconf.exe execution" + }, + { + "field": "ApprovedModuleHashes", + "description": "Baseline of legitimate DLLs loaded by odbcconf.exe" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--46630fc8-75de-4b73-b46e-0a4eeb7ad310", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0488#AN1344", + "external_id": "AN1344" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1344", + "description": "Behavioral chain: (1) a login from a third-party account or untrusted source network establishes an interactive/remote session; (2) the session acquires elevated privileges or accesses sensitive resources atypical for that account; (3) subsequent lateral movement or data access occurs from the same session/device. Correlate Windows logon events, token elevation/privileged use, and resource access with third-party context.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--39b9db72-8b48-4595-a18d-db5bbba3091b", + "name": "WinEventLog:Security", + "channel": "EventCode=4776, 4771, 4770" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ThirdPartyCIDRs", + "description": "Ranges used by MSPs/contractors/VPN egress; used to enrich logons and network flows." + }, + { + "field": "ExpectedAdminHosts", + "description": "Servers where third-party admins are allowed; deviations raise risk." + }, + { + "field": "TimeWindow", + "description": "Correlation window linking logon \u2192 elevation \u2192 access (e.g., 30\u2013120 minutes)." + }, + { + "field": "HighValueResources", + "description": "File shares/AD objects/servers that should never be touched by third-party sessions." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba\", \"name\": \"WinEventLog:Sysmon\", \"channel\": \"EventCode=3, 22\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba\", \"name\": \"WinEventLog:Sysmon\", \"channel\": \"EventCode=3\"}}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5\", \"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4624, 4648\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5\", \"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4624,4648,4672,4769\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--39b9db72-8b48-4595-a18d-db5bbba3091b\", \"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4776, 4771, 4770\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--39b9db72-8b48-4595-a18d-db5bbba3091b\", \"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4776,4771,4770\"}}, \"root['x_mitre_log_source_references'][3]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa\", \"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4663, 4670, 4656\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa\", \"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4663\"}}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--0c6a8e7a-f9d0-479a-88c1-4ce26edba81c", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0493#AN1357", + "external_id": "AN1357" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1357", + "description": "Detects anomalous use of COM, DDE, or named pipes for execution. Correlates creation or access of IPC mechanisms (e.g., named pipes, COM objects) with unusual parent-child process relationships or code injection patterns (e.g., Office spawning cmd.exe via DDE).", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--b9a1578e-8653-4103-be23-cb52e0b1816e", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=17" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "PipeNamePattern", + "description": "Environment-specific pipe names used legitimately vs anomalous (e.g., \\\\.\\pipe\\svcctl)." + }, + { + "field": "AllowedParentChildPairs", + "description": "Expected parent-child process lineage to minimize false positives (e.g., explorer.exe spawning outlook.exe)." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4656\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--f2aef85a-c1ea-4d1a-b359-32692c973cdc", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0495#AN1361", + "external_id": "AN1361" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1361", + "description": "Monitor for anomalous access to financial applications, browser-based banking sessions, or enterprise ERP systems from Windows endpoints. Detect mass emailing of payment instructions, sudden rule changes in Outlook for financial staff, or use of clipboard data exfiltration tied to cryptocurrency wallet addresses.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "FinanceAppList", + "description": "Baseline of finance-related executables or ERP processes to monitor closely." + }, + { + "field": "HighRiskAccounts", + "description": "Accounts belonging to finance, treasury, or executives that should be monitored with higher sensitivity." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4624, 4648\", \"old_value\": \"EventCode=4624\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--ba2056ee-77d7-49d4-a993-5806506964df", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0496#AN1366", + "external_id": "AN1366" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1366", + "description": "Chain of remote access tool behavior: (1) initial execution of remote-control/assist agent or GUI under user context; (2) persistence via service or autorun; (3) long-lived outbound connection/tunnel to external infrastructure; (4) interactive control signals such as shell or file-manager child processes spawned by the RAT parent.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--5297a638-1382-4f0c-8472-0d21830bf705", + "name": "WinEventLog:System", + "channel": "EventCode=7045" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--7f70fae7-a68d-4730-a83a-f260b9606129", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=12" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlation period binding start\u2192persistence\u2192egress\u2192child (default 15m, adjust per environment)." + }, + { + "field": "UserContext", + "description": "Differentiate help-desk/jump hosts and admin accounts from standard endpoints." + }, + { + "field": "ProcessAllowlist", + "description": "Known-good remote support tools; suppress expected events while still correlating anomalous sequences." + }, + { + "field": "InstallPathRegex", + "description": "Alert when services/agents execute from user-writable or temp paths." + }, + { + "field": "ExternalIPAllowlist", + "description": "Vendors\u2019 support clouds/CDNs to reduce false positives on egress detection." + }, + { + "field": "ShellSpawnRegex", + "description": "Define which child shells from GUI parents are acceptable versus suspicious." + }, + { + "field": "EgressHeuristics", + "description": "Thresholds for session duration, connection counts, and bytes_out/bytes_in ratio." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][3]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}, \"root['x_mitre_log_source_references'][5]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--d90a4f16-b5e1-4daa-bf65-91112fe02761", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0496#AN1367", + "external_id": "AN1367" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1367", + "description": "Sequence of RAT agent execution, systemd persistence, and long-lived external egress; optional interactive shells spawned from the agent.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "auditd:SYSCALL", + "channel": "execve: Agent/headless flags (listen/connect/reverse/tunnel) or remote-control binaries spawning shells" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "auditd:PATH", + "channel": "WRITE: Drop of binaries/scripts in ~/.local, /tmp, or /opt tool dirs" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Bind exec\u2192service\u2192egress events; extend for staged deployments." + }, + { + "field": "DaemonAllowlist", + "description": "Approved .service names/paths to avoid flagging corporate agents." + }, + { + "field": "SuspiciousChildProcesses", + "description": "Define shells/interpreters considered anomalous when spawned by GUI/agent parents." + }, + { + "field": "EgressHeuristics", + "description": "Flow heuristics for long-lived, client-heavy connections post-install." + } + ], + "x_mitre_platforms": [ + "Linux" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--7faf6f37-f074-4b9d-be19-618c3516486d", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0497#AN1369", + "external_id": "AN1369" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1369", + "description": "Detection of adversary behavior that disables or modifies security tools, including killing AV/EDR processes, stopping services, altering Sysmon registry keys, or tampering with exclusion lists. Defenders observe process/service termination, registry modification, and abnormal absence of expected telemetry.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--5297a638-1382-4f0c-8472-0d21830bf705", + "name": "WinEventLog:System", + "channel": "EventCode=7045" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--61f1d40e-f3d0-4cc6-aa2d-937b6204194f", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=5" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ProcessNameExclusions", + "description": "List of expected administrative tools/processes to prevent false positives." + }, + { + "field": "TimeWindow", + "description": "Defines correlation window linking process termination, registry edits, and service stoppage." + }, + { + "field": "ServiceNames", + "description": "Customizable list of security service names per enterprise deployment." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['name']\": {\"new_value\": \"WinEventLog:System\", \"old_value\": \"WinEventLog:Security\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--6eab700a-548f-48aa-8821-163682fe8bbe", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-10-28 19:57:23.683000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0498#AN1375", + "external_id": "AN1375" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1375", + "description": "A process creates a brand\u2011new logon session/token (LogonUser*/LsaLogonUser) and then assigns/impersonates it (SetThreadToken/ImpersonateLoggedOnUser) to run actions under that freshly created security context. Chain: (1) suspicious command or script block (e.g., runas /netonly, PowerShell P/Invoke of LogonUser) \u2192 (2) ETW/API evidence of LogonUser*/SetThreadToken \u2192 (3) Security 4624 New Logon (often LogonType=9 NewCredentials or 2/3 from a non\u2011interactive parent) with no interactive desktop \u2192 (4) sysmon 1 process(es) executing with the new LogonId/SID different from the parent process \u2192 (5) optional privileged ops/lateral movement.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--39b9db72-8b48-4595-a18d-db5bbba3091b", + "name": "WinEventLog:Security", + "channel": "EventCode=4672" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e", + "name": "etw:Microsoft-Windows-Security-Auditing", + "channel": "api_call: LogonUser(A|W), LsaLogonUser, SetThreadToken, ImpersonateLoggedOnUser" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlation window between LogonUser*/SetThreadToken and the first spawned process (default 5\u201310 minutes)." + }, + { + "field": "SuspiciousLogonTypes", + "description": "Which 4624 LogonTypes to treat as high risk (e.g., 9 NewCredentials, 3 Network when sourced locally)." + }, + { + "field": "AllowedImpersonators", + "description": "Processes/accounts legitimately creating tokens (e.g., winlogon.exe, lsass.exe, IIS worker, trusted service accounts)." + }, + { + "field": "ParentChildUserMismatch", + "description": "Whether to alert on any SID/LogonId mismatch between parent/child not in allow-list." + }, + { + "field": "IntegrityEscalationDelta", + "description": "Minimum integrity level jump (e.g., Medium\u2192High/System) to raise severity." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-10-28 19:57:23.683000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4672\", \"old_value\": \"EventCode=4624,4672\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--fcb2ed1a-2f39-47e8-9524-95ceac0ff383", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0499#AN1376", + "external_id": "AN1376" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1376", + "description": "Establishing network connections on uncommon ports or protocols following C2 disruption or blocking. Often executed by processes that typically exhibit no network activity.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a", + "name": "NSM:Flow", + "channel": "uncommon ports" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "DestinationPort", + "description": "Can be tuned to include unexpected or high-entropy ports not typically associated with the process." + }, + { + "field": "ProcessName", + "description": "Useful to filter benign applications vs suspicious fallback attempts." + }, + { + "field": "DataVolumeRatio", + "description": "Tunable ratio of sent/received bytes to indicate potential C2 beaconing or exfiltration." + }, + { + "field": "TimeWindow", + "description": "Adjust temporal window to match likely fallback C2 retries after primary channel fails." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--3cd889a5-7955-4d38-a49b-89e8d276ceab", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0501#AN1381", + "external_id": "AN1381" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1381", + "description": "Detects compilation activity using csc.exe, ilasm.exe, or msbuild.exe initiated by user-space processes outside typical development environments, followed by execution or network activity from newly written binaries.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ParentProcessName", + "description": "Filter for unexpected users (non-dev) launching compilers like csc.exe or msbuild.exe" + }, + { + "field": "OutputDirectoryPath", + "description": "Adjust paths for sensitive file write zones (e.g., `C:\\Users\\Public\\`, `%TEMP%`, or Desktop)" + }, + { + "field": "TimeWindow", + "description": "Tune the correlation window between compilation and subsequent execution or C2" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--e01b29cd-2369-4ad5-bd91-98994f36cd1e", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0502#AN1384", + "external_id": "AN1384" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1384", + "description": "Abuse of file/registry attributes to hide malicious files, directories, or services. Defender view: detection of attrib.exe setting hidden/system flags, creation of Alternate Data Streams, or registry keys altering file visibility.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "FileExtensions", + "description": "Filter for sensitive file types likely targeted for hiding." + }, + { + "field": "ADSDetection", + "description": "Enable or disable detection of Alternate Data Streams depending on business use." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--4e5ffb58-75de-4305-a439-98ca3499f45e", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0503#AN1389", + "external_id": "AN1389" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1389", + "description": "Detects the execution of non-browser processes establishing outbound encrypted network connections using uncommon symmetric encryption protocols (e.g., AES via PowerShell or custom scripts) to alternate external destinations.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "PayloadEntropyThreshold", + "description": "Flag high-entropy payloads sent over unexpected protocols." + }, + { + "field": "TimeWindow", + "description": "Define allowable transfer window (e.g., abnormal traffic outside business hours)." + }, + { + "field": "ExecutableAllowlist", + "description": "List of known-good binaries for encrypted traffic (e.g., Chrome, Outlook)." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--d9383849-c91c-4eef-88a0-97c2454ca1af", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0504#AN1393", + "external_id": "AN1393" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1393", + "description": "Detects anomalous use of Dynamic Data Exchange (DDE) for code execution, such as Office applications (WINWORD.EXE, EXCEL.EXE) spawning command interpreters, or loading unusual modules through DDEAUTO/DDE formulas. Correlates suspicious parent-child process relationships, registry keys enabling DDE, and module loads inconsistent with normal Office usage.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--ed0dd8aa-1677-4551-bb7d-8da767617e1b", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "AllowedParentChildPairs", + "description": "Define legitimate parent-child relationships for Office processes to reduce false positives." + }, + { + "field": "TimeWindow", + "description": "Threshold for correlating Office process creation with subsequent command execution via DDE." + }, + { + "field": "SuspiciousDLLList", + "description": "Maintain allow/block list of DLLs that Office is expected to load." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4656\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--e6037bea-ba25-40bf-b681-361d4f901adb", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0506#AN1397", + "external_id": "AN1397" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1397", + "description": "Detection of mshta.exe execution where command-line arguments reference remote or local HTA/script content (VBScript/JScript) followed by subsequent file creation, network retrieval, or process spawning that indicates payload execution outside standard Internet Explorer security context. Correlation includes parent process lineage, command-line inspection, and network connection creation to untrusted or anomalous endpoints.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "CommandLinePattern", + "description": "Regex patterns for mshta.exe arguments referencing remote HTA/script content; may need tuning to exclude known-good internal scripts." + }, + { + "field": "SuspiciousParentProcesses", + "description": "List of parent processes considered suspicious when spawning mshta.exe (e.g., Office applications, script interpreters)." + }, + { + "field": "AllowedHTASources", + "description": "Whitelist of domains/paths from which legitimate HTAs are executed." + }, + { + "field": "TimeWindow", + "description": "Time threshold for correlating mshta.exe execution with subsequent network connections or file creations." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--c3629243-7cd6-4e56-9275-73f5752f0f08", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0507#AN1398", + "external_id": "AN1398" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1398", + "description": "Adversary gains high integrity or special privileges (e.g., SeDebugPrivilege), locates a running browser process, opens it with write/inject rights, and modifies it (e.g., CreateRemoteThread / DLL load) to inherit cookies/tokens or establish a browser pivot. Optional step: create a new logon session or use explicit credentials, then drive the victim browser to intranet resources.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--39b9db72-8b48-4595-a18d-db5bbba3091b", + "name": "WinEventLog:Security", + "channel": "EventCode=4672" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--b5d0492b-cda4-421c-8e51-ed2b8d85c5d0", + "name": "WinEventLog:Security", + "channel": "EventCode=4673" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=10" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--d5fca4e4-e47a-487b-873f-3d22f8865e96", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=8" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "BrowserList", + "description": "Set of monitored browsers (chrome.exe, msedge.exe, firefox.exe, iexplore.exe). Adjust per fleet." + }, + { + "field": "AccessMaskSet", + "description": "Access rights implying injection (e.g., 0x1FFFFF, 0x1F3FF, VM_WRITE, VM_OPERATION, CREATE_THREAD). Tune by EDR mapping." + }, + { + "field": "SignerAllowList", + "description": "Allowed module signers within browser processes (e.g., Microsoft, Google). Helps flag unsigned/unknown ImageLoad into browsers." + }, + { + "field": "InternalCIDR", + "description": "Enterprise internal ranges or DNS suffixes to identify intranet pivoting via the browser." + }, + { + "field": "TimeWindow", + "description": "Correlation interval (e.g., 10\u201320 minutes) linking privilege gain \u2192 access \u2192 modification \u2192 network usage." + }, + { + "field": "ParentAllowList", + "description": "Legitimate tools that may automate browsers (e.g., Selenium drivers). Reduce FPs by allowlisting." + }, + { + "field": "UserContext", + "description": "Scope analytics to high-value users, admin workstations, or servers where browsers shouldn\u2019t be automated." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4624, 4648\", \"old_value\": \"EventCode=4624\"}, \"root['x_mitre_log_source_references'][6]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--288a28ac-e1e4-4e7e-9156-d3b975ed45ed", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0510#AN1407", + "external_id": "AN1407" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1407", + "description": "Detects suspicious SVG file creation or download events followed by script engine execution (e.g., wscript.exe, mshta.exe, rundll32.exe), network callbacks, or browser-based credential collection.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Threshold between SVG file write and script execution (e.g., < 60s)" + }, + { + "field": "ParentProcessWhitelist", + "description": "Allowlisted script engines that may invoke browsers or JS in benign cases" + }, + { + "field": "FileExtensionPattern", + "description": "Regex or string match for .svg, .svgz, or embedded .svg inside HTML or PDF" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--4385bff9-e730-48cd-bdfc-43de56c302aa", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0511#AN1410", + "external_id": "AN1410" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1410", + "description": "Adversary mounts a USB device and begins enumerating, copying, or compressing files using scripting engines, cmd, or remote access tools.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d6e6b3b-4aa8-40e1-8c47-91db0f313d9f", + "name": "WinEventLog:System", + "channel": "EventCode=2003" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "VolumeLabel", + "description": "Can tune based on known removable device labels or whitelist" + }, + { + "field": "TimeWindow", + "description": "Controls timing between device mount and sensitive file access" + }, + { + "field": "TargetFileType", + "description": "Tune for sensitive file extensions (e.g., .docx, .pdf, .csv)" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=2003\", \"old_value\": \"EventCode=20001/20003\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--6869578d-d3e8-4a3c-9717-0a188dc0bafe", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0512#AN1413", + "external_id": "AN1413" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1413", + "description": "Detects non-browser processes that establish encrypted outbound connections (e.g., TLS/SSL) to unfamiliar or atypical destinations for the host/user, following a data staging or compression event.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Flow", + "channel": "ssl.log - Certificate Analysis" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlates file access, encryption, and network transmission within a timeframe (e.g., 5 minutes)." + }, + { + "field": "CertificateIssuerDenylist", + "description": "Blocks or flags untrusted certificate authorities in SSL/TLS handshakes." + }, + { + "field": "BinaryAllowlist", + "description": "Whitelist for known-good applications allowed to use encrypted outbound traffic." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--18ba26d6-08e0-4370-8ef0-b2dd73bfe0b3", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0513#AN1417", + "external_id": "AN1417" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1417", + "description": "Detects adversary behavior accessing Windows cached domain credential files using tools like Mimikatz, reg.exe, or PowerShell, often combined with registry exports or LSASS memory scraping.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=10" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TargetFilename", + "description": "Location of cached credential files may vary with OS version or custom registry hive exports." + }, + { + "field": "CommandLine", + "description": "Patterns for reg save, secretsdump, or PowerShell dumping tools may be tuned to org-specific tooling." + }, + { + "field": "TimeWindow", + "description": "Temporal correlation window between process execution and registry/file access." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--0eff49de-834e-42d3-9a7a-3ac032aa9836", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0518#AN1434", + "external_id": "AN1434" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1434", + "description": "Executable or script generating large outbound network traffic targeting remote hosts or known amplification ports", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ThresholdEventVolume", + "description": "Number of connections per second that should trigger anomaly logic" + }, + { + "field": "DestinationDiversity", + "description": "Count of unique destination IPs or ports" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--ea127140-2f66-4c3d-93ab-215c210ad6c5", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0521#AN1440", + "external_id": "AN1440" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1440", + "description": "Detects suspicious use of PowerShell, .NET, or script interpreters to spawn processes that mimic UAC prompts, often with credential capture dialogue boxes invoked from non-standard parent processes.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "CommandLine", + "description": "Tunable to detect suspicious prompts like 'Enter your password' or 'CredentialRequired'" + }, + { + "field": "ParentProcessName", + "description": "Tune to flag UI prompts spawned from unexpected processes like cmd.exe or user scripts" + }, + { + "field": "TimeWindow", + "description": "Scope correlation of script execution and prompt appearance" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--685b05a6-92a3-417d-a917-8e7689e43237", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0522#AN1443", + "external_id": "AN1443" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1443", + "description": "Detects anomalous Kerberos activity such as forged or stolen tickets by correlating malformed fields in logon events, RC4-encrypted TGTs, or TGS requests without corresponding TGT requests. Also detects suspicious processes accessing LSASS memory for ticket extraction.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--39b9db72-8b48-4595-a18d-db5bbba3091b", + "name": "WinEventLog:Security", + "channel": "EventCode=4672, 4634" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=10" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TicketLifetimeThreshold", + "description": "Threshold for Kerberos TGT lifetimes deviating from domain defaults." + }, + { + "field": "EncryptionTypes", + "description": "Monitor for downgraded encryption types (e.g., RC4) in Kerberos tickets." + }, + { + "field": "ProcessAllowlist", + "description": "List of expected processes accessing LSASS; deviations may be suspicious." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4672, 4634\", \"old_value\": \"EventCode=4624, 4672, 4634, 4768, 4769\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--0848a778-7bcf-48d9-a14a-d29d1e71e656", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0524#AN1448", + "external_id": "AN1448" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1448", + "description": "A remote host sends a short sequence of failed connection attempts (RST/ICMP unreachable) to a set of closed ports. Within a brief window the endpoint (a) adds/enables a firewall rule or (b) a sniffer-backed process begins listening or opens a new socket, after which a successful connection occurs. Also detects Wake-on-LAN magic packets seen on local segment.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a", + "name": "WinEventLog:Microsoft-Windows-Windows Firewall With Advanced Security/Firewall", + "channel": "EventCode=2004, 2005, 2006" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindowKnock", + "description": "Window to correlate knock sequence \u2192 rule change \u2192 successful connect (e.g., 120s)." + }, + { + "field": "PortSequenceMinLen", + "description": "Minimum number of distinct closed ports hit before success (e.g., 3)." + }, + { + "field": "SuspiciousProcesses", + "description": "List of binaries that commonly toggle firewall/sniff (netsh.exe, powershell.exe, npcapservice.exe, windivert, rawsock tools)." + }, + { + "field": "AllowedFirewallChangers", + "description": "Service accounts or software update agents allowed to change firewall." + }, + { + "field": "WoLAllowedWindows", + "description": "Maintenance windows when magic packets are expected." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=2004, 2005, 2006\", \"old_value\": \"EventCode=2004,2005,2006\"}, \"root['x_mitre_log_source_references'][3]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--54bfcc92-e04c-4eac-9aa2-c10b7574088c", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0525#AN1452", + "external_id": "AN1452" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1452", + "description": "Process creation and command-line execution of native system discovery utilities such as `systeminfo`, `hostname`, `wmic`, or use of PowerShell/WMI for system enumeration.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Detect multiple discovery commands executed in short succession." + }, + { + "field": "UserContext", + "description": "Scope alerts to unusual user accounts or service accounts." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--fb330f70-f0f4-4a5b-9b91-37d29a097a4c", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0527#AN1461", + "external_id": "AN1461" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1461", + "description": "Execution of files containing right-to-left override characters (U+202E) to masquerade true file extensions. Often found in phishing payloads or file downloads.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--639e87f3-acb6-448a-9645-258f20da4bc5", + "name": "WinEventLog:Windows Defender", + "channel": "Operational" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "FilenamePattern", + "description": "RTLO variants such as \\u202E, %E2%80%AE, or byte-encoded forms" + }, + { + "field": "ExecutionContext", + "description": "Allows tuning for untrusted sources, e.g., browser downloads or email attachments" + }, + { + "field": "TimeWindow", + "description": "Defines correlation between file creation and process execution" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--e7444be7-3c0a-4ff2-927d-f623af05936d", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0528#AN1464", + "external_id": "AN1464" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1464", + "description": "Execution of PubPrn.vbs via cscript.exe using the 'script:' moniker to load and execute a remote .sct scriptlet file, bypassing signature validation and proxying remote payloads through a signed Microsoft script host.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "CommandLineRegex", + "description": "Detects 'script:' moniker with HTTP/HTTPS URI as argument to pubprn.vbs" + }, + { + "field": "ParentProcessName", + "description": "May vary between cscript.exe, wscript.exe, or cmd.exe depending on execution method" + }, + { + "field": "NetworkDestinationDomain", + "description": "Used to detect external domains being contacted for remote scriptlet execution" + }, + { + "field": "TimeWindow", + "description": "Maximum allowed time delta between pubprn.vbs invocation and network connection or child process" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--1a18402e-efb1-49c7-8615-dc907f838320", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0530#AN1468", + "external_id": "AN1468" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1468", + "description": "An SMB-based remote file share access followed by lateral movement actions such as remote service creation, task scheduling, or suspicious process execution on the target host using ADMIN$ or C$ shares.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ShareName", + "description": "Targeted admin share path, such as C$, ADMIN$, IPC$" + }, + { + "field": "TimeWindow", + "description": "Correlation window between remote file access and remote execution (e.g., 5-10 minutes)" + }, + { + "field": "UserContext", + "description": "Distinguish expected remote administrators vs. rare/first-time access by specific users" + }, + { + "field": "ProcessList", + "description": "List of suspicious binaries or tools executed post remote copy (e.g., cmd.exe, powershell.exe, runonce.exe)" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4624, 4648\", \"old_value\": \"EventCode=4624 (LogonType=3)\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--8586fd06-9801-473e-8ea6-d3da0ec82267", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0536#AN1476", + "external_id": "AN1476" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1476", + "description": "Detects anomalous wireless connections such as unexpected SSID associations, failed or repeated authentication attempts, and connections outside of known geofenced networks. Defenders should monitor wireless connection logs and event codes for network discovery, authentication, and association events.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Microsoft-Windows-WLAN-AutoConfig", + "channel": "EventCode=8001, 8002, 8003" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--a953ca55-921a-44f7-9b8d-3d40141aa17e", + "name": "WinEventLog:Security", + "channel": "EventCode=4776, 4625" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "KnownSSIDList", + "description": "Defines approved Wi-Fi SSIDs for the environment; deviations may indicate malicious connection attempts." + }, + { + "field": "GeoLocationContext", + "description": "Correlates expected physical location of systems with observed Wi-Fi connections to detect anomalies." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba\", \"name\": \"WinEventLog:Microsoft-Windows-WLAN-AutoConfig\", \"channel\": \"EventCode=8001, 8002, 8003\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba\", \"name\": \"WinEventLog:Microsoft-Windows-WLAN-AutoConfig\", \"channel\": \"8001, 8002, 8003\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--a953ca55-921a-44f7-9b8d-3d40141aa17e\", \"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4776, 4625\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--a953ca55-921a-44f7-9b8d-3d40141aa17e\", \"name\": \"WinEventLog:Security\", \"channel\": \"4624, 4625\"}}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--64c6aa46-a824-4c8e-8462-d0a58b78acfb", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0538#AN1483", + "external_id": "AN1483" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1483", + "description": "Processes such as plink.exe, ssh.exe, or netsh.exe establishing outbound network connections where traffic patterns show encapsulated protocols (e.g., RDP over SSH). Defender observations include anomalous process-to-network relationships, large asymmetric data flows, and port usage mismatches.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "AllowedTools", + "description": "Whitelist legitimate tunneling tools (e.g., used by admins)." + }, + { + "field": "DataAsymmetryThreshold", + "description": "Ratio of sent vs received bytes that indicates tunneling activity." + }, + { + "field": "TimeWindow", + "description": "Correlate process creation with network connection within N seconds." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--92157361-c2f8-45e6-9624-38a3cdb44598", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0540#AN1489", + "external_id": "AN1489" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1489", + "description": "Sustained execution of resource-intensive processes (e.g., cryptocurrency miners), often launched via scheduled tasks, WMI, or PowerShell. These processes frequently establish persistent external connections and attempt to evade detection using masqueraded or renamed binaries.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--f42df6f0-6395-4f0c-9376-525a031f00c3", + "name": "WinEventLog:Security", + "channel": "EventCode=4698" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "Image", + "description": "The executable name of the miner or wrapper\u2014can vary across campaigns." + }, + { + "field": "DestinationIP", + "description": "May differ depending on the mining pool or proxy server." + }, + { + "field": "ParentProcessName", + "description": "Useful for filtering known-good automation vs malicious task runners." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--7e1c7338-11d5-4ab4-aefc-bbd81e26068d", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0543#AN1496", + "external_id": "AN1496" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1496", + "description": "Processes not typically associated with encryption loading asymmetric crypto libraries (e.g., rsaenh.dll, crypt32.dll) and subsequently initiating outbound TLS/SSL connections with abnormal certificate chains or handshakes. Defender correlates process creation, module load, and unusual encrypted sessions.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "AllowedCryptoProcesses", + "description": "Whitelist browsers, mail clients, or apps expected to use asymmetric crypto." + }, + { + "field": "CertificateAuthorityList", + "description": "Baseline CA list for validating abnormal certs." + }, + { + "field": "HandshakeTimeout", + "description": "Detection of incomplete or malformed handshakes." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--5f1ffd26-01f7-47fc-b544-130fc14c0bd2", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0546#AN1506", + "external_id": "AN1506" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1506", + "description": "Detects login and usage patterns deviating from typical Microsoft 365 or Google Workspace user profiles.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--39b9db72-8b48-4595-a18d-db5bbba3091b", + "name": "m365:signinlogs", + "channel": "UserLogin" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--a953ca55-921a-44f7-9b8d-3d40141aa17e", + "name": "gcp:audit", + "channel": "login.event" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "BusinessHours", + "description": "Used to identify logins outside of expected work times." + }, + { + "field": "OfficeProductivityToolBaseline", + "description": "Defines expected application usage per department or role." + } + ], + "x_mitre_platforms": [ + "Office Suite" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['name']\": {\"new_value\": \"m365:signinlogs\", \"old_value\": \"m365:signin\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--81b1e9a7-b6f4-4cca-b07a-3498ab4abd4a", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0548#AN1511", + "external_id": "AN1511" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1511", + "description": "Processes that normally do not initiate network communications suddenly making outbound HTTPS connections with high outbound-to-inbound data ratios. Defender view: correlation between process creation logs (e.g., Word, Excel, PowerShell) and subsequent anomalous network traffic volumes toward common web services (Dropbox, Google Drive, OneDrive).", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "MonitoredServices", + "description": "List of legitimate web services to baseline (Dropbox, OneDrive, Google Drive)." + }, + { + "field": "ExfilVolumeThreshold", + "description": "Outbound data threshold for flagging unusual activity, tunable by environment." + }, + { + "field": "TimeWindow", + "description": "Aggregation period to calculate anomalies in outbound data volume." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--ffaa281c-dd99-486d-bc7f-225580f784f4", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0552#AN1527", + "external_id": "AN1527" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1527", + "description": "Detects creation or modification of Windows Services through command-line tools (e.g., `sc.exe`, `powershell.exe`), Registry key changes under `HKLM\\System\\CurrentControlSet\\Services`, and service execution under SYSTEM with unsigned or anomalous binary paths. Detects privilege escalation via driver installation or `CreateServiceW` usage. Correlates parent-child lineage, startup behavior, and rare service names.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--5297a638-1382-4f0c-8472-0d21830bf705", + "name": "WinEventLog:Security", + "channel": "EventCode=4697" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3551476e-14f5-4e48-a518-e82135329e03", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=6" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ServiceNamePattern", + "description": "Regex for suspicious or uncommon service names (e.g., `svhostx`, `winhelp`, etc.)" + }, + { + "field": "ImagePathFilter", + "description": "Flag services whose image path resides in uncommon directories (e.g., `C:\\Users\\`, `C:\\Temp\\`)" + }, + { + "field": "DriverExtensionList", + "description": "Watch for `.sys` files loaded by `sc`, Registry, or `ZwLoadDriver` APIs" + }, + { + "field": "StartupTypeChangeWindow", + "description": "Temporal window to correlate Registry `Start` key changes with service creation" + }, + { + "field": "UnsignedBinaryAlert", + "description": "Raise alerts for unsigned binaries registered as services" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--f9079cb0-76ff-4b4a-a73c-4f6572e7eef5", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0553#AN1528", + "external_id": "AN1528" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1528", + "description": "Detects the creation or execution of padded binary files (e.g., large size but minimal legitimate content) followed by process execution or lateral movement from the host.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "FileSizeThresholdMB", + "description": "Threshold size in MB to determine suspicious padding" + }, + { + "field": "TimeWindow", + "description": "Correlation time window between file creation and execution" + }, + { + "field": "UserContext", + "description": "Scope the detection to suspicious or non-standard user accounts" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--f9c3a686-2894-498d-9d04-7ac510752e1f", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0560#AN1543", + "external_id": "AN1543" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1543", + "description": "Detection of compromised or misused valid accounts via anomalous logon patterns, abnormal logon types, and inconsistent geographic or time-based activity across Windows endpoints.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "EventCode=4624" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--a953ca55-921a-44f7-9b8d-3d40141aa17e", + "name": "WinEventLog:Security", + "channel": "EventCode=4776, 4625" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "LogonType", + "description": "Flag unexpected logon types (e.g., Type 10 for remote interactive logins) for sensitive accounts." + }, + { + "field": "TimeWindow", + "description": "Define acceptable hours for interactive logon activity (e.g., 9AM-6PM local)." + }, + { + "field": "GeoIPMismatch", + "description": "Trigger on location anomalies based on prior user behavior or policy." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-27 15:56:07.094000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4624\", \"old_value\": \"EventID=4624\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4776, 4625\", \"old_value\": \"EventID=4625\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--539a4182-ab9e-4abf-a83b-f30cf2dec770", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0561#AN1548", + "external_id": "AN1548" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1548", + "description": "Adversary installs or side-loads an IDE extension (VS Code, IntelliJ/JetBrains, Eclipse) or enables IDE tunneling. Chain: (1) IDE binary starts on a non-developer endpoint or server, often with install/force/tunnel flags \u2192 (2) extension files/registrations appear under user profile \u2192 (3) browser/IDE initiates outbound connections to extension marketplaces, update endpoints, or IDE remote/tunnel services \u2192 (4) optional child tools (ssh, node, powershell) execute under the IDE context.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "IDEList", + "description": "Executable names/paths (e.g., code.exe, idea64.exe, eclipse.exe, jetbrains-gateway.exe) vary by version and packaging." + }, + { + "field": "SuspiciousCLI", + "description": "Flags such as --install-extension, --force, --disable-extensions, --user-data-dir, --uninstall-extension, tunnel/remote flags are tunable." + }, + { + "field": "ServerZones", + "description": "List of hosts where IDEs should never run (prod servers, DCs)." + }, + { + "field": "AllowedHosts", + "description": "Approved extension marketplaces/ide services; use to suppress benign traffic." + }, + { + "field": "TimeWindow", + "description": "Correlation horizon (e.g., 15\u201330m) between process start, file writes, and outbound IDE/tunnel connections." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--8089daf3-72b0-4714-b800-2856f27dc21c", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0562#AN1551", + "external_id": "AN1551" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1551", + "description": "Windows environmental validation behavioral chain: (1) Rapid system discovery reconnaissance through WMI queries, registry enumeration, and network share discovery, (2) Environment-specific artifact collection (hostname, domain, IP addresses, installed software, hardware identifiers), (3) Cryptographic operations or conditional logic based on collected environmental values, (4) Selective payload execution contingent on environmental validation results, (5) Temporal correlation between discovery activities and subsequent execution or network communication", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--a953ca55-921a-44f7-9b8d-3d40141aa17e", + "name": "WinEventLog:Security", + "channel": "EventCode=4648" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--d5fca4e4-e47a-487b-873f-3d22f8865e96", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=8" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--05645013-2fed-4066-8bdc-626b2e201dd4", + "name": "WinEventLog:WMI", + "channel": "EventCode=5857, 5858, 5860, 5861" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "DiscoveryTimeWindow", + "description": "Maximum time window for correlating multiple discovery activities indicating reconnaissance phase - adjust based on normal system behavior (default: 300 seconds)" + }, + { + "field": "DiscoveryActivityThreshold", + "description": "Minimum number of different discovery techniques within time window to trigger detection - balance between false positives and coverage (default: 4 activities)" + }, + { + "field": "CryptographicLibraryWhitelist", + "description": "Approved cryptographic libraries and modules for legitimate organizational use - maintain based on approved software inventory" + }, + { + "field": "WMIQueryComplexityThreshold", + "description": "Complexity score for WMI queries indicating reconnaissance vs. legitimate administration - tune based on administrative patterns" + }, + { + "field": "EnvironmentalArtifactList", + "description": "Environment-specific values commonly targeted by guardrails (hostnames, domains, network shares) - customize for organizational environment" + }, + { + "field": "ExecutionDelayBaseline", + "description": "Statistical baseline for normal delay between discovery and execution activities - establish through historical analysis" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4624, 4648\", \"old_value\": \"EventCode=4624\"}, \"root['x_mitre_log_source_references'][3]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}, \"root['x_mitre_log_source_references'][7]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}, \"root['x_mitre_log_source_references'][8]['channel']\": {\"new_value\": \"EventCode=5857, 5858, 5860, 5861\", \"old_value\": \"EventCode=5857, 5860, 5861\"}, \"root['x_mitre_log_source_references'][9]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4103, 4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--91870bc8-3a81-4d90-84e4-26c99b5642ef", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0563#AN1557", + "external_id": "AN1557" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1557", + "description": "Detection of PowerShell history suppression using Set-PSReadLineOption with SaveNothing or altered HistorySavePath. Correlating these options with PowerShell usage highlights adversarial evasion attempts.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "AllowedPaths", + "description": "List of acceptable PowerShell history save paths for baseline comparison." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4103\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--dea5f6cc-d3bb-404b-8aab-f7366988a96e", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0566#AN1564", + "external_id": "AN1564" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1564", + "description": "Detection of Office or document viewer processes (e.g., winword.exe) initiating network connections to remote templates or executing scripts due to manipulated template references (e.g., embedded in .docx, .rtf, or .dotm files), followed by suspicious child process creation (e.g., PowerShell).", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TemplateURLPatterns", + "description": "Can be tuned to flag known bad domains or external resources in template fields." + }, + { + "field": "ParentProcess", + "description": "May be environment-specific; typically Word, Excel, PowerPoint." + }, + { + "field": "TimeWindow", + "description": "Correlation window for process + network activity." + }, + { + "field": "ChildProcessAnomalyThreshold", + "description": "Trigger when document-spawned child process deviates from expected profile." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--0f05915c-e146-4921-840b-1a08774ca4d2", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0568#AN1567", + "external_id": "AN1567" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1567", + "description": "Detects suspicious USB HID device enumeration and keystroke injection patterns, such as rapid sequences of input with no user context, scripts executed through simulated keystrokes, or rogue devices presenting themselves as keyboards.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d6e6b3b-4aa8-40e1-8c47-91db0f313d9f", + "name": "WinEventLog:System", + "channel": "EventCode=2003" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "AuthorizedUSBDevices", + "description": "List of known, legitimate USB vendor/product IDs authorized for use in the enterprise." + }, + { + "field": "ExecutionTimeWindow", + "description": "Restrict detection to times when no user is logged in or activity is outside business hours." + }, + { + "field": "ParentProcessWhitelist", + "description": "List of legitimate parent processes expected to spawn PowerShell or scripting engines." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0\", \"name\": \"WinEventLog:PowerShell\", \"channel\": \"EventCode=4103, 4104, 4105, 4106\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0\", \"name\": \"WinEventLog:PowerShell\", \"channel\": \"EventCode=4104\"}}, \"root['x_mitre_log_source_references'][0]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d6e6b3b-4aa8-40e1-8c47-91db0f313d9f\", \"name\": \"WinEventLog:System\", \"channel\": \"EventCode=2003\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d6e6b3b-4aa8-40e1-8c47-91db0f313d9f\", \"name\": \"WinEventLog:System\", \"channel\": \"20001-20003\"}}, \"root['x_mitre_log_source_references'][1]\": {\"new_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077\", \"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4688\"}, \"old_value\": {\"x_mitre_data_component_ref\": \"x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077\", \"name\": \"WinEventLog:Security\", \"channel\": \"4688, 4104\"}}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--a74c34c2-f4bf-4bd0-9f23-7c04c45b93ca", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0570#AN1571", + "external_id": "AN1571" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1571", + "description": "Unusual processes (e.g., powershell.exe, excel.exe) accessing large local files and subsequently initiating HTTPS POST requests to domains associated with cloud storage services (e.g., dropbox.com, drive.google.com, box.com). Defender perspective: correlation between file reads in sensitive directories and high outbound traffic volume to known storage APIs.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "CloudStorageDomains", + "description": "List of monitored domains for cloud services (dropbox.com, drive.google.com, onedrive.live.com)." + }, + { + "field": "ExfilVolumeThreshold", + "description": "Data volume threshold (e.g., >10MB in single session) used to flag abnormal transfers." + }, + { + "field": "UserContext", + "description": "User accounts permitted to use sanctioned cloud services versus unexpected accounts." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--9a65f8bc-1b81-4e05-8e8b-bfdb0d581213", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0571#AN1575", + "external_id": "AN1575" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1575", + "description": "Detects command-line or API-based creation/modification of Windows Services via `sc.exe`, `powershell.exe`, `services.exe`, or `ChangeServiceConfig`. Looks for creation/modification of autostart services via registry changes, file drops to `System32\\services`, and anomalous parent-child process trees.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--5297a638-1382-4f0c-8472-0d21830bf705", + "name": "WinEventLog:Security", + "channel": "EventCode=4697" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ServiceNamePattern", + "description": "Regex patterns to flag unusual service names or binaries" + }, + { + "field": "ParentProcessFilter", + "description": "List of non-administrative processes starting service management tools" + }, + { + "field": "RegistryPathList", + "description": "Monitored autorun locations (e.g., `HKLM\\System\\CurrentControlSet\\Services`)" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--498eb889-4468-4c55-9337-df219d5f142b", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0574#AN1583", + "external_id": "AN1583" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1583", + "description": "Execution of network enumeration utilities (e.g., net.exe, ping.exe, tracert.exe) in short succession, often chained with lateral movement tools or system enumeration commands.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Define bursty execution patterns of enumeration commands (e.g., <30s)" + }, + { + "field": "CommandLinePattern", + "description": "Tunable per org\u2019s scripting/IT tools (e.g., exclude SCCM, PsExec)" + }, + { + "field": "ParentProcess", + "description": "Flag suspicious process ancestry (e.g., Word.exe spawning net.exe)" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--fe489775-b01e-4da2-a0e2-962d1572ba09", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0576#AN1589", + "external_id": "AN1589" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1589", + "description": "Creation of inbox rules via PowerShell (New-InboxRule) or transport rules using Exchange cmdlets. Correlates user behavior, cmdlet usage, and rule properties.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--b33d36e3-d7ea-4895-8eed-19a08a8f7c4f", + "name": "m365:exchange", + "channel": "Cmdlet - New-InboxRule" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "UserContext", + "description": "Certain service accounts or admin contexts may be expected to run these rules." + }, + { + "field": "TimeWindow", + "description": "Correlate between rule creation and follow-on message forwarding within this timeframe." + }, + { + "field": "TargetMailbox", + "description": "Whitelisted or trusted destination addresses may be tuned per org policy." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--be55aa59-62b5-40cd-bab2-dbc4de80da0e", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0578#AN1594", + "external_id": "AN1594" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1594", + "description": "Detection of suspicious enumeration of cloud storage objects via API calls such as AWS S3 ListObjectsV2, Azure List Blobs, or GCP ListObjects. Correlate access with account role, user context, and prior authentication activity to identify anomalous usage patterns (e.g., unusual account, unexpected regions, or large-scale enumeration in short time windows).", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--fcc4811f-9cc8-4db5-8097-4d8242a380de", + "name": "AWS:CloudTrail", + "channel": "ListObjectsV2" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--58ef998c-f3bf-4985-b487-b1005f5c05d1", + "name": "AWS:CloudTrail", + "channel": "GetObject, CopyObject" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlation window (e.g., multiple enumeration calls within 5 minutes) may indicate automated discovery versus normal user activity." + }, + { + "field": "UserContext", + "description": "Expected service accounts and IAM roles that regularly enumerate storage; deviations may indicate suspicious activity." + }, + { + "field": "RegionScope", + "description": "Unusual enumeration of buckets across multiple geographic regions in short succession may indicate adversary reconnaissance." + } + ], + "x_mitre_platforms": [ + "IaaS" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"GetObject, CopyObject\", \"old_value\": \"GetObject\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--18e81e76-bae3-44c8-b573-dfd3564a00ad", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0579#AN1595", + "external_id": "AN1595" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1595", + "description": "Monitor for suspicious usage of driver enumeration utilities (driverquery.exe) or API calls such as EnumDeviceDrivers(). Registry queries against HKLM\\SYSTEM\\CurrentControlSet\\Services and HardwareProfiles that are abnormal may also indicate attempts to discover installed drivers and services. Correlate command execution, process creation, and registry access to build a behavioral chain of driver discovery.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "AllowedUtilities", + "description": "Whitelist expected administrative usage of driverquery.exe or other enumeration utilities." + }, + { + "field": "TimeWindow", + "description": "Correlation window between process creation and registry queries to identify suspicious chaining of events." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=13, 14\", \"old_value\": \"EventCode=13\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--8626f553-efed-4418-bbc6-b9fa83b0b315", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0581#AN1599", + "external_id": "AN1599" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1599", + "description": "Suspicious process initiating outbound connections to web services without corresponding response or return traffic, indicative of one-way command channels.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "etw:Microsoft-Windows-WinINet", + "channel": "WinINet API telemetry" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "DestinationDomain", + "description": "Can tune for popular web services (e.g., googleapis.com, github.com) based on threat actor tooling" + }, + { + "field": "TimeWindow", + "description": "May adjust temporal window to catch beaconing patterns (e.g., every 10-30 mins)" + }, + { + "field": "ProcessName", + "description": "Environment-specific tuning to exclude expected update or telemetry tools" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--be773ad4-9e5f-4063-910a-99a3cab90582", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0588#AN1620", + "external_id": "AN1620" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1620", + "description": "Detection of suspicious use of `tscon.exe` or equivalent methods to hijack legitimate RDP sessions. Defenders can observe anomalies such as session reassignments without corresponding authentication, processes spawned in the context of hijacked sessions, or unusual RDP network traffic flows that deviate from expected baselines.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--5297a638-1382-4f0c-8472-0d21830bf705", + "name": "WinEventLog:System", + "channel": "EventCode=7045" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "ExpectedRDPHosts", + "description": "Whitelist of systems and accounts authorized to use RDP; deviations indicate possible hijacking." + }, + { + "field": "TimeWindow", + "description": "Time threshold for correlating logon events with session reassignment and process execution." + }, + { + "field": "SessionIDMapping", + "description": "Environment-specific mapping of user accounts to session IDs; inconsistencies may reveal hijacking." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4624, 4648\", \"old_value\": \"EventCode=4624, 4634\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--105ca36e-c3e0-48c4-ada3-7f8c4aa4430f", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0589#AN1621", + "external_id": "AN1621" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1621", + "description": "Detects enabling of reversible password encryption in Active Directory or Group Policy, suspicious PowerShell commands modifying AD user properties, and unusual account configuration changes correlated with policy modifications. Multi-event correlation links Group Policy edits, PowerShell command execution, and user account property changes to identify tampering with authentication encryption settings.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--5b8b466b-2c81-4fe7-946f-d677a74ae3db", + "name": "WinEventLog:Security", + "channel": "EventCode=4739" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "MonitoredOUs", + "description": "Scope of Organizational Units where reversible encryption property monitoring is enabled." + }, + { + "field": "TimeWindow", + "description": "Time window in which to correlate Group Policy modification and subsequent user property changes." + }, + { + "field": "SuspiciousCmdletList", + "description": "List of PowerShell cmdlets to monitor for account configuration changes." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--67febd8b-36fe-4f72-8647-95fe449ecb5d", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0590#AN1622", + "external_id": "AN1622" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1622", + "description": "Adversary modifies externally-facing web content by accessing and overwriting hosted HTML/JS/CSS files, typically following web shell deployment, credential abuse, or exploitation of web application vulnerabilities.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Connections", + "channel": "Unusual POST requests to admin or upload endpoints" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "target_directory", + "description": "Web root folder varies by environment, e.g., C:\\inetpub\\wwwroot" + }, + { + "field": "UserContext", + "description": "May vary based on which service account hosts the website" + }, + { + "field": "TimeWindow", + "description": "Time between webshell upload and file overwrite may vary" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--afd585f3-20fa-4bd8-8930-243cb5dbe5f8", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0590#AN1625", + "external_id": "AN1625" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1625", + "description": "Adversary modifies content in cloud-hosted websites (e.g., AWS S3-backed, Azure Blob-hosted sites) by gaining access to management consoles or APIs and uploading altered HTML/JS files.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "name": "AWS:CloudTrail", + "channel": "PutObject" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--fcc4811f-9cc8-4db5-8097-4d8242a380de", + "name": "AWS:CloudTrail", + "channel": "ListBuckets" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--58ef998c-f3bf-4985-b487-b1005f5c05d1", + "name": "AWS:CloudTrail", + "channel": "GetObject, CopyObject" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "bucket_name", + "description": "Website bucket name varies per org" + }, + { + "field": "region", + "description": "Adversary may target multi-region failover setups" + }, + { + "field": "IAMRole", + "description": "Attack may leverage stolen cross-account roles or elevated policies" + } + ], + "x_mitre_platforms": [ + "IaaS" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"GetObject, CopyObject\", \"old_value\": \"GetObject\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--475a8817-1ace-4bef-baaa-0f56979eb85a", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0591#AN1626", + "external_id": "AN1626" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1626", + "description": "Detects attempts to modify file timestamps via API usage (e.g., `SetFileTime`), CLI tools (e.g., `w32tm`, PowerShell), or double-timestomp behavior where $SI and $FN timestamps are mismatched or reverted.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--639e87f3-acb6-448a-9645-258f20da4bc5", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=15" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e", + "name": "EDR:file", + "channel": "SetFileTime" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlate timestamp change with preceding file creation or suspicious access" + }, + { + "field": "APINamePattern", + "description": "Include SetFileTime, NtSetInformationFile, or other timestamp APIs" + }, + { + "field": "TimestampDeltaThreshold", + "description": "Trigger on excessive backdating (e.g., >90 days)" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=15\", \"old_value\": \"EventCode=15 \"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--9a68f1a7-65f0-4eef-a711-888bccbeb0d5", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-21 15:10:28.402000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0594#AN1632", + "external_id": "AN1632" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 1632", + "description": "Detects unauthorized invocation of replication operations (DCSync) via Directory Replication Service (DRS), often executed by threat actors using Mimikatz or similar tools from non-DC endpoints.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--5c6de881-bc70-4070-855a-7a9631a407f7", + "name": "WinEventLog:Security", + "channel": "EventCode=4662" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9085a576-636a-455b-91d2-c2921bbe6d1d", + "name": "WinEventLog:Security", + "channel": "EventCode=4929" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Content", + "channel": "Traffic on RPC DRSUAPI" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Defines the correlation window for unusual account access followed by DRSUAPI traffic." + }, + { + "field": "UserContext", + "description": "Allows tuning for specific accounts known to legitimately request replication." + }, + { + "field": "SourceIP", + "description": "Expected replication should only come from known DCs; this field allows excluding trusted DCs." + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:10:28.402000+00:00\"}, \"root['x_mitre_log_source_references'][1]['name']\": {\"new_value\": \"WinEventLog:Security\", \"old_value\": \"WinEventLog:DirectoryService\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--b73489af-2e95-4f41-b82e-327a84da2a1d", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-22 19:00:47.079000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0898#AN2029", + "external_id": "AN2029" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 2029", + "description": "Process execution without GUI context (e.g., powershell.exe, wscript.exe) generates HTTP traffic with a spoofed User-Agent mimicking a legitimate browser. No corresponding UI application (e.g., msedge.exe) is active or in parent lineage. The User-Agent deviates from known enterprise baselines or contains spoofed platform indicators. User-Agent strings can be gathered with API calls such as `ShellExecuteW` to open the default browser on a socket to receive an HTTP reply, or by hard coding the User-Agent string for a specific browser.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--3772e279-27d6-477a-9fe3-c6beb363594c", + "name": "NSM:Flow", + "channel": "Inbound HTTP POST with suspicious payload size or user-agent" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e", + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "API Calls" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "HeaderSignatureMatch", + "description": "Specific HTTP header anomalies or patterns (e.g., spoofed User-Agent)." + }, + { + "field": "UserAgentFingerprint", + "description": "Flag browser-based sessions" + }, + { + "field": "NonBrowserProcessList", + "description": "List of non-browser binaries expected not to initiate web requests (e.g., powershell.exe, cscript.exe)" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-24 15:00:29.811000+00:00\"}, \"root['x_mitre_log_source_references'][1]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=3\"}}}", + "previous_version": "1.0" + }, + { + "type": "x-mitre-analytic", + "id": "x-mitre-analytic--098f0607-df17-4291-a1b1-a8e3374c075a", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2025-10-22 20:40:20.993000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/detectionstrategies/DET0897#AN2030", + "external_id": "AN2030" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Analytic 2030", + "description": "A process with no prior history or outside of known whitelisted tools initiates file or registry modifications to configure exclusion rules for antivirus, backup, or file-handling systems. Or a file system enumeration for specific file names andcritical extensions like .dll, .exe, .sys, or specific directories such as 'Program Files' or security tool paths or system component discovery for the exclusion of the files or components.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_domains": [ + "enterprise-attack" + ], + "x_mitre_log_source_references": [ + { + "x_mitre_data_component_ref": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "x_mitre_data_component_ref": "x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8", + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_mutable_elements": [ + { + "field": "TimeWindow", + "description": "Correlate multiply discovery activities and file enumeration activities." + }, + { + "field": "DiscoveryActivityThreshold", + "description": "Minimum number of different discovery techniques within time window to trigger detection - balance between false positives and coverage (default: 4 activities)" + }, + { + "field": "ExclusionTargetList", + "description": "List of extensions or folders considered suspicious when excluded (e.g., .dll, .exe, C:\\\\Program Files\\\\)" + }, + { + "field": "AuthorizedExclusionModifiers", + "description": "Whitelist of known system management tools/processes allowed to modify exclusion settings" + } + ], + "x_mitre_platforms": [ + "Windows" + ], + "x_mitre_version": "1.0", + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-23 20:07:29.933000+00:00\"}, \"root['x_mitre_log_source_references'][0]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}, \"root['x_mitre_log_source_references'][2]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4670\"}}}", + "previous_version": "1.0" + } + ], + "revocations": [], + "deprecations": [], + "deletions": [] + } + }, + "mobile-attack": { + "techniques": { + "additions": [ + { + "type": "attack-pattern", + "id": "attack-pattern--0bcc4ec1-a897-49a9-a9ff-c00df1d1209d", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2017-10-25 14:48:08.155000+00:00", + "modified": "2025-11-13 14:17:41.362000+00:00", + "name": "Malicious SMS Message", + "description": "Test", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-mobile-attack", + "phase_name": "collection" + } + ], + "revoked": true, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/techniques/T1454", + "external_id": "T1454" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_detection": "", + "x_mitre_domains": [ + "mobile-attack" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_platforms": [ + "Android" + ], + "x_mitre_tactic_type": [ + "Post-Adversary Device Access" + ], + "x_mitre_version": "1.0" + } + ], + "major_version_changes": [], + "minor_version_changes": [], + "other_version_changes": [], + "patches": [], + "revocations": [], + "deprecations": [], + "deletions": [] + }, + "software": { + "additions": [], + "major_version_changes": [], + "minor_version_changes": [], + "other_version_changes": [], + "patches": [], + "revocations": [], + "deprecations": [], + "deletions": [] + }, + "groups": { + "additions": [], + "major_version_changes": [], + "minor_version_changes": [], + "other_version_changes": [], + "patches": [], + "revocations": [], + "deprecations": [], + "deletions": [] + }, + "campaigns": { + "additions": [], + "major_version_changes": [], + "minor_version_changes": [], + "other_version_changes": [], + "patches": [], + "revocations": [], + "deprecations": [], + "deletions": [] + }, + "assets": { + "additions": [], + "major_version_changes": [], + "minor_version_changes": [], + "other_version_changes": [], + "patches": [], + "revocations": [], + "deprecations": [], + "deletions": [] + }, + "mitigations": { + "additions": [], + "major_version_changes": [], + "minor_version_changes": [], + "other_version_changes": [], + "patches": [], + "revocations": [], + "deprecations": [], + "deletions": [] + }, + "datasources": { + "additions": [], + "major_version_changes": [], + "minor_version_changes": [], + "other_version_changes": [], + "patches": [], + "revocations": [], + "deprecations": [], + "deletions": [] + }, + "datacomponents": { + "additions": [], + "major_version_changes": [], + "minor_version_changes": [], + "other_version_changes": [], + "patches": [ + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.273000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0064", + "external_id": "DC0064" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Command Execution", + "description": "Command Execution involves monitoring and capturing the execution of textual commands (including shell commands, cmdlets, and scripts) within an operating system or application. These commands may include arguments or parameters and are typically executed through interpreters such as `cmd.exe`, `bash`, `zsh`, `PowerShell`, or programmatic execution. Examples: \n\n- Windows Command Prompt\n - dir \u2013 Lists directory contents.\n - net user \u2013 Queries or manipulates user accounts.\n - tasklist \u2013 Lists running processes.\n- PowerShell\n - Get-Process \u2013 Retrieves processes running on a system.\n - Set-ExecutionPolicy \u2013 Changes PowerShell script execution policies.\n - Invoke-WebRequest \u2013 Downloads remote resources.\n- Linux Shell\n - ls \u2013 Lists files in a directory.\n - cat /etc/passwd \u2013 Reads the user accounts file.\n - curl http://malicious-site.com \u2013 Retrieves content from a malicious URL.\n- Container Environments\n - docker exec \u2013 Executes a command inside a running container.\n - kubectl exec \u2013 Runs commands in Kubernetes pods.\n- macOS Terminal\n - open \u2013 Opens files or URLs.\n - dscl . -list /Users \u2013 Lists all users on the system.\n - osascript -e \u2013 Executes AppleScript commands.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Command", + "channel": "None" + }, + { + "name": "auditd:SYSCALL", + "channel": "execution of realmd, samba-tool, or ldapmodify with user-related arguments" + }, + { + "name": "macos:unifiedlog", + "channel": "dsconfigad or dscl with create or append options for AD-bound users" + }, + { + "name": "EDR:AMSI", + "channel": "None" + }, + { + "name": "linux:syslog", + "channel": "cron activity" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "Get-ADTrust|GetAllTrustRelationships" + }, + { + "name": "gcp:audit", + "channel": "None" + }, + { + "name": "auditd:SYSCALL", + "channel": "Execution of script interpreters by systemd timer (ExecStart)" + }, + { + "name": "AWS:CloudTrail", + "channel": "InvokeFunction" + }, + { + "name": "m365:unified", + "channel": "Automated forwarding or file sync initiated by a logic app" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "name": "linux:syslog", + "channel": "Suspicious script or command execution targeting browser folders" + }, + { + "name": "esxi:shell", + "channel": "snapshot create/copy, esxcli" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Commands like systemctl stop , service stop, or kill -9 " + }, + { + "name": "macos:unifiedlog", + "channel": "launchctl unload, kill, or pkill commands affecting daemons or background services" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of security-agent detection or enumeration commands" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream --predicate" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "Execution of Microsoft script to enumerate custom forms in Outlook mailbox" + }, + { + "name": "m365:messagetrace", + "channel": "Inbound email triggers execution of mailbox-stored custom form" + }, + { + "name": "auditd:EXECVE", + "channel": "Use of mv or cp to rename files with '.' prefix" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of chflags hidden or SetFile -a V" + }, + { + "name": "esxi:shell", + "channel": "interactive shell" + }, + { + "name": "networkdevice:cli", + "channel": "CLI command" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream" + }, + { + "name": "esxi:vmkernel", + "channel": "/var/log/vmkernel.log" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve calls to locale, timedatectl, or cat /etc/timezone" + }, + { + "name": "macos:unifiedlog", + "channel": "defaults read -g AppleLocale, systemsetup -gettimezone" + }, + { + "name": "macos:unifiedlog", + "channel": "profiles install -type=configuration" + }, + { + "name": "auditd:SYSCALL", + "channel": "sleep function usage or loops (nanosleep, usleep) in scripts" + }, + { + "name": "m365:unified", + "channel": "Search-Mailbox, Get-MessageTrace, eDiscovery requests" + }, + { + "name": "EDR:cli", + "channel": "Command Line Telemetry" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream --predicate 'eventMessage contains \"loginwindow\" or \"pfctl\"'" + }, + { + "name": "networkdevice:syslog", + "channel": "Command Audit / Configuration Change" + }, + { + "name": "WinEventLog:Microsoft-Office/OutlookAddinMonitor", + "channel": "Outlook loading add-in via unexpected load path or non-default profile context" + }, + { + "name": "macos:unifiedlog", + "channel": "exec or sudo usage with NOPASSWD context or echo modifying sudoers" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "name": "auditd:EXECVE", + "channel": "execve: Execution of update-ca-certificates or trust anchor modification commands" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of /usr/bin/security add-trusted-cert or keychain modifications to System.keychain" + }, + { + "name": "auditd:EXECVE", + "channel": "gcore, gdb, strings, hexdump execution" + }, + { + "name": "auditd:SYSCALL", + "channel": "connect, execve, write" + }, + { + "name": "esxi:hostd", + "channel": "command execution" + }, + { + "name": "auditd:EXECVE", + "channel": "Execution of auditctl, systemctl stop auditd, or kill -9 auditd" + }, + { + "name": "macos:syslog", + "channel": "system.log" + }, + { + "name": "esxi:hostd", + "channel": "/var/log/hostd.log" + }, + { + "name": "esxi:shell", + "channel": "/var/log/shell.log" + }, + { + "name": "docker:daemon", + "channel": "docker exec or docker run with unexpected command/entrypoint" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve call including 'nohup' or trailing '&'" + }, + { + "name": "macos:unifiedlog", + "channel": "nohup, disown, or osascript execution patterns" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "CommandLine=copy-item or robocopy from UNC path" + }, + { + "name": "esxi:shell", + "channel": "invoked remote scripts (esxcli)" + }, + { + "name": "auditd:EXECVE", + "channel": "execution of systemctl with subcommands start, stop, enable, disable" + }, + { + "name": "networkdevice:cli", + "channel": "Policy Update" + }, + { + "name": "auditd:SYSCALL", + "channel": "None" + }, + { + "name": "AWS:CloudTrail", + "channel": "eventName: RunInstances, CreateUser, PutRolePolicy, InvokeCommand" + }, + { + "name": "gcp:audit", + "channel": "methodName: setIamPolicy, startInstance, createServiceAccount" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Commands executed within an SSH session where no matching logon/authentication event exists" + }, + { + "name": "esxi:hostd", + "channel": "modification of config files or shell command execution" + }, + { + "name": "kubernetes:audit", + "channel": "Shell process (e.g., /bin/sh, /bin/bash) spawned in a container without an interactive session attached (i.e., automation anomaly)" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of 'profiles install -type=configuration'" + }, + { + "name": "macos:unifiedlog", + "channel": "subsystem:com.apple.Terminal" + }, + { + "name": "networkdevice:syslog", + "channel": "eventlog" + }, + { + "name": "esxi:hostd", + "channel": "shell access or job registration" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "PowerShell launched from outlook.exe or triggered without user invocation" + }, + { + "name": "m365:messagetrace", + "channel": "Inbound email matches crafted rule trigger pattern tied to persistence logic" + }, + { + "name": "linus:syslog", + "channel": "None" + }, + { + "name": "linux:syslog", + "channel": "Unusual outbound transfers from CLI tools like base64, gzip, or netcat" + }, + { + "name": "macos:unifiedlog", + "channel": "base64 or curl processes chained within short execution window" + }, + { + "name": "esxi:shell", + "channel": "base64 or gzip use within shell session" + }, + { + "name": "macos:unifiedlog", + "channel": "exec: Invocation of /usr/bin/defaults write or /usr/bin/plutil modifying plist keys" + }, + { + "name": "auditd:SYSCALL", + "channel": "chmod, execve" + }, + { + "name": "macos:unifiedlog", + "channel": "chmod command with arguments including '+s', 'u+s', or numeric values 4000\u20136777" + }, + { + "name": "macos:unifiedlog", + "channel": "command includes dscl . delete or sysadminctl --deleteUser" + }, + { + "name": "fs:fsusage", + "channel": "file system activity monitor" + }, + { + "name": "networkdevice:cli", + "channel": "ip ssh pubkey-chain" + }, + { + "name": "esxi:shell", + "channel": "scripts or binaries with misleading names" + }, + { + "name": "auditd:EXECVE", + "channel": "Execution of GUI-related binaries with suppressed window/display flags" + }, + { + "name": "linuxsyslog", + "channel": "nslcd or winbind logs" + }, + { + "name": "macos:unifiedlog", + "channel": "DS daemon log entries" + }, + { + "name": "esxi:hostd", + "channel": "logline inspection" + }, + { + "name": "macos:unifiedlog", + "channel": "diskutil eraseDisk / asr restore with destructive flags" + }, + { + "name": "networkdevice:cli", + "channel": "erase flash:, erase startup-config, format disk" + }, + { + "name": "networkdevice:syslog", + "channel": "command_exec" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: iptables, nft, firewall-cmd modifications" + }, + { + "name": "macos:unifiedlog", + "channel": "pfctl -d, socketfilterfw --setglobalstate off, or modifications to com.apple.alf" + }, + { + "name": "esxi:hostd", + "channel": "esxcli network firewall set commands" + }, + { + "name": "docker:events", + "channel": "container exec rm|container stop --force" + }, + { + "name": "esxi:hostd", + "channel": "event stream" + }, + { + "name": "networkdevice:cli", + "channel": "CLI command logs" + }, + { + "name": "esxi:shell", + "channel": "/var/log/shell.log entries containing \"esxcli system clock get\"" + }, + { + "name": "networkdevice:syslog", + "channel": "command-exec: CLI commands containing \"show clock\", \"show clock detail\", \"show timezone\" executed by suspicious user/source" + }, + { + "name": "networkdevice:cli", + "channel": "cmd: cmd=show clock detail" + }, + { + "name": "auditd:EXECVE", + "channel": "curl -X POST, wget --post-data" + }, + { + "name": "linux:syslog", + "channel": "sudo chage|grep pam_pwquality|cat /etc/login.defs" + }, + { + "name": "macos:unifiedlog", + "channel": "pwpolicy|PasswordPolicy" + }, + { + "name": "networkdevice:syslog", + "channel": "cmd='show aaa*' OR 'show running-config | include password|aaa' OR 'show aaa common-criteria policy all'" + }, + { + "name": "networkdevice:syslog", + "channel": "CLI command audit" + }, + { + "name": "networkdevice:cli", + "channel": "Execution of commands to load, copy, or replace system images (e.g., 'copy tftp flash', 'boot system')" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "Execution of PowerShell script to enumerate or remove malicious Home Page folder config" + }, + { + "name": "m365:messagetrace", + "channel": "Inbound email triggering Outlook to auto-access folder tied to malicious Home Page" + }, + { + "name": "macos:unifiedlog", + "channel": "Command line contains smbutil view //, mount_smbfs //" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Invocation of scp, rsync, curl, or sftp" + }, + { + "name": "esxi:hostd", + "channel": "scp/ssh used to move file across hosts" + }, + { + "name": "auditd:EXECVE", + "channel": "command line arguments containing lsblk, fdisk, parted" + }, + { + "name": "macos:unifiedlog", + "channel": "log messages related to disk enumeration context or Terminal session" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve calls modifying local mail filter configuration files" + }, + { + "name": "esxi:hostd", + "channel": "None" + }, + { + "name": "esxi:shell", + "channel": "None" + }, + { + "name": "networkdevice:cli", + "channel": "None" + }, + { + "name": "linux:syslog", + "channel": "sudo execution of ffmpeg/gst-launch/v4l2-ctl by non-standard user" + }, + { + "name": "docker:api", + "channel": "docker logs access or container inspect commands from non-administrative users" + }, + { + "name": "esxi:shell", + "channel": "command IN (\"esxcli vm process list\", \"vim-cmd vmsvc/getallvms\")" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: process_name IN (\"virsh\", \"VBoxManage\", \"qemu-img\") AND command IN (\"list\", \"info\")" + }, + { + "name": "esxi:shell", + "channel": "openssl|tar|dd" + }, + { + "name": "AWS:CloudTrail", + "channel": "SSM RunCommand" + }, + { + "name": "azure:activity", + "channel": "Intune PowerShell Scripts" + }, + { + "name": "m365:exchange", + "channel": "Cmdlet: Get-GlobalAddressList, Get-Recipient" + }, + { + "name": "networkdevice:cli", + "channel": "Execution of commands like 'show running-config', 'copy running-config', or 'export config'" + }, + { + "name": "esxi:syslog", + "channel": "boot logs" + }, + { + "name": "networkdevice:syslog", + "channel": "system boot logs" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: service stop syslog, systemctl stop rsyslog, kill -9 syslog" + }, + { + "name": "macos:unifiedlog", + "channel": "defaults write com.apple.system.logging or logd manipulation" + }, + { + "name": "esxi:hostd", + "channel": "esxcli system syslog config set or reload" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: openssl pkcs12, certutil, keytool" + }, + { + "name": "macos:unifiedlog", + "channel": "process calling security find-certificate, export, or import" + }, + { + "name": "networkdevice:cli", + "channel": "Execution of CLI commands altering crypto parameters (e.g., 'crypto key generate rsa modulus 512')" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Process in container namespace executes curl|wget|bash|sh|python|nc with outbound args" + }, + { + "name": "m365:exchange", + "channel": "Get-RoleGroup, Get-DistributionGroup" + }, + { + "name": "auditd:SYSCALL", + "channel": "execution of systemctl or service with enable/start parameters" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of cat, less, grep, journalctl targeting log directories (/var/log/)" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of log show, fs_usage, or cat targeting system.log" + }, + { + "name": "AWS:CloudTrail", + "channel": "GetLogEvents: High frequency log exports from CloudWatch or equivalent services" + }, + { + "name": "esxi:shell", + "channel": "Execution of cat, tail, grep targeting /var/log/vmkernel.log or /var/log/hostd.log" + }, + { + "name": "esxi:shell", + "channel": "CLI usage logs" + }, + { + "name": "macos:syslog", + "channel": "/var/log/system.log" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of launchctl load/unload/start commands" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "Exchange Cmdlets" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of python, perl, or custom binaries invoking compression libraries" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve, USER_CMD" + }, + { + "name": "auditd:USER_CMD", + "channel": "USER_CMD" + }, + { + "name": "esxi:shell", + "channel": "Command execution trace" + }, + { + "name": "auditd:SYSCALL", + "channel": "bash/zsh of base64, tar, gzip, or openssl immediately after file write" + }, + { + "name": "linux:osquery", + "channel": "Command-line includes base64 -d or openssl enc -d" + }, + { + "name": "macos:unifiedlog", + "channel": "base64 -d or osascript invoked on staged file" + }, + { + "name": "auditd:EXECVE", + "channel": "exec: Execution of dd, efibootmgr, or flashrom modifying firmware/boot partitions" + }, + { + "name": "auditd:EXECVE", + "channel": "curl -d, wget --post-data" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Processes executing sendmail/postfix with forged headers" + }, + { + "name": "macos:unifiedlog", + "channel": "diskutil partitionDisk or eraseVolume with partition scheme modifications" + }, + { + "name": "networkdevice:cli", + "channel": "format flash:, format disk, reformat commands" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of tar, gzip, bzip2, xz, zip, or openssl with compression/encryption arguments" + }, + { + "name": "auditd:PROCTITLE", + "channel": "proctitle contains chmod, chown, setfacl, or attr commands with suspicious parameters" + }, + { + "name": "esxi:shell", + "channel": "shell command execution for chmod, chown, or file permission modification on VMFS or system files" + }, + { + "name": "networkdevice:Firewall", + "channel": "Audit trail or CLI/API access indicating commands like no access-list, delete rule-set, clear config" + }, + { + "name": "auditd:EXECVE", + "channel": "grep/cat/awk on files with password fields" + }, + { + "name": "macos:unifiedlog", + "channel": "grep/cat on files matching credential patterns" + }, + { + "name": "kubernetes:audit", + "channel": "process execution involving curl, grep, or awk on secrets" + }, + { + "name": "AWS:CloudTrail", + "channel": "command-line execution invoking credential enumeration" + }, + { + "name": "auditd:SYSCALL", + "channel": "promiscuous mode transitions (ioctl or ifconfig)" + }, + { + "name": "fs:fsusage", + "channel": "access to BPF devices or interface IOCTLs" + }, + { + "name": "networkdevice:syslog", + "channel": "exec command='monitor capture'" + }, + { + "name": "WinEventLog:Microsoft-Office-Alerts", + "channel": "Unexpected DLL or component loaded at Office startup" + }, + { + "name": "m365:office", + "channel": "Startup execution includes non-default component" + }, + { + "name": "macos:unifiedlog", + "channel": "diskutil eraseDisk/zeroDisk or asr restore with destructive flags" + }, + { + "name": "networkdevice:cli", + "channel": "erase flash:, erase nvram:, format disk" + }, + { + "name": "macos:unifiedlog", + "channel": "spctl --master-disable, csrutil disable, or defaults write to disable Gatekeeper" + }, + { + "name": "esxi:shell", + "channel": "esxcli system syslog config set --loghost='' or stopping hostd service" + }, + { + "name": "networkdevice:syslog", + "channel": "no logging buffered, no aaa new-model, disable firewall" + }, + { + "name": "auditd:EXECVE", + "channel": "git push, curl -X POST" + }, + { + "name": "linux:cli", + "channel": "command logging" + }, + { + "name": "esxi:hostd", + "channel": "command log" + }, + { + "name": "networkdevice:cli", + "channel": "command logs" + }, + { + "name": "networkdevice:syslog", + "channel": "interactive shell logging" + }, + { + "name": "esxi:hostd", + "channel": "Execution of '/bin/vmx' or modifications to '/etc/rc.local.d/local.sh'" + }, + { + "name": "auditd:SYSCALL", + "channel": "chattr, rm, shred, dd run on recovery directories or partitions" + }, + { + "name": "networkdevice:syslog", + "channel": "command sequence: erase \u2192 format \u2192 reload" + }, + { + "name": "macos:unifiedlog", + "channel": "process: at, job runner" + }, + { + "name": "macos:osquery", + "channel": "Interpreter exec with suspicious arguments as above" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of curl or wget writing files to /tmp/* followed by chmod or execution" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of downgraded interpreters such as python2 or forced fallback commands" + }, + { + "name": "auditd:PROCTITLE", + "channel": "proctitle contains chmod, chown, chgrp, setfacl, or attr with suspicious parameters (777, 755, +x, -R)" + }, + { + "name": "auditd:EXECVE", + "channel": "Execution of gsettings set org.gnome.login-screen disable-user-list true" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of dscl . create with IsHidden=1" + }, + { + "name": "linux:syslog", + "channel": "sshd logs" + }, + { + "name": "esxi:shell", + "channel": "Shell Access/Command Execution" + }, + { + "name": "networkdevice:syslog", + "channel": "CLI Command Logging" + }, + { + "name": "auditd:CONFIG_CHANGE", + "channel": "udev rule reload or trigger command executed" + }, + { + "name": "linux:cli", + "channel": "Shell history logs" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream --predicate 'processImagePath contains \"zip\" OR \"base64\"'" + }, + { + "name": "networkdevice:cli", + "channel": "command logging" + }, + { + "name": "esxi:hostd", + "channel": "Command Execution" + }, + { + "name": "macos:osquery", + "channel": "launchd + process_events" + }, + { + "name": "esxi:vmkernel", + "channel": "DCUI shell start, BusyBox activity" + }, + { + "name": "esxi:hostd", + "channel": "remote CLI + vim-cmd logging" + }, + { + "name": "networkdevice:syslog", + "channel": "CLI Command Audit" + }, + { + "name": "m365:defender", + "channel": "Activity Log: Command Invocation" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "CmdletName: Get-Recipient, Get-User" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "Execution of 'Get-WmiObject Win32_Product' or similar PowerShell cmdlets" + }, + { + "name": "linux:shell", + "channel": "Manual invocation of software enumeration commands via interactive shell" + }, + { + "name": "auditd:SYSCALL", + "channel": "Command line arguments including SPApplicationsDataType" + }, + { + "name": "AWS:CloudTrail", + "channel": "ssm:GetCommandInvocation" + }, + { + "name": "esxi:shell", + "channel": "esxcli software vib list" + }, + { + "name": "auditd:EXECVE", + "channel": "execution of setfattr or getfattr commands" + }, + { + "name": "macos:unifiedlog", + "channel": "xattr utility execution with -w or -p flags" + }, + { + "name": "auditd:SYSCALL", + "channel": "Execution of spoofing tools (e.g., hping3, nping, scapy) sending UDP packets to known amplifier ports" + }, + { + "name": "auditd:SYSCALL", + "channel": "execution of tools like cat, grep, or awk on credential files" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of 'security', 'cat', or 'grep' commands accessing credential storage" + }, + { + "name": "linux:syslog", + "channel": "CLI access to 'show running-config', 'show password', or 'cat config.txt'" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of curl, rsync, wget with internal knowledge base or IPs" + }, + { + "name": "esxi:shell", + "channel": "/root/.ash_history" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of systemctl, loginctl, or systemd-inhibit commands related to sleep/hibernate" + }, + { + "name": "auditd:SYSCALL", + "channel": "Execution of xev, xdotool, or input activity emulators" + }, + { + "name": "macos:unifiedlog", + "channel": "launchctl load or boot-time plist registration" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of interpreters creating archive-like outputs without calling tar/gzip" + }, + { + "name": "networkdevice:syslog", + "channel": "command audit" + }, + { + "name": "networkdevice:cli", + "channel": "Interface commands" + }, + { + "name": "macos:unifiedlog", + "channel": "dscl -create" + }, + { + "name": "esxi:vmkernel", + "channel": "esxcli system account add" + }, + { + "name": "ebpf:syscalls", + "channel": "useradd or /etc/passwd modified inside container" + }, + { + "name": "auditd:SYSCALL", + "channel": "Execution of insmod, modprobe, or rmmod commands by non-standard users or outside expected timeframes" + }, + { + "name": "macos:unifiedlog", + "channel": "kextload execution from Terminal or suspicious paths" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "Execution of PowerShell without -NoProfile flag" + }, + { + "name": "auditd:EXECVE", + "channel": "Process execution of update-ca-certificates or openssl with suspicious arguments" + }, + { + "name": "macos:unifiedlog", + "channel": "xattr -d com.apple.quarantine or similar removal commands" + }, + { + "name": "azure:signinlogs", + "channel": "OperationName=SetDomainAuthentication OR Update-MsolFederatedDomain" + }, + { + "name": "linux:syslog", + "channel": "Sudo or root escalation followed by filesystem mount commands" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4101" + }, + { + "name": "networkdevice:cli", + "channel": "Execution of privileged commands such as 'copy tftp flash', 'boot system', or 'debug memory'" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve syscalls for discovery commands (uname, hostname, id, whoami, ps, netstat, mount) with command-line parameter analysis" + }, + { + "name": "auditd:PROCTITLE", + "channel": "process title records containing discovery command sequences and environmental assessment patterns" + }, + { + "name": "macos:unifiedlog", + "channel": "Security framework operations including keychain access, cryptographic operations, and certificate validation" + }, + { + "name": "m365:unified", + "channel": "Set-Mailbox, New-InboxRule" + }, + { + "name": "macos:unifiedlog", + "channel": "None" + }, + { + "name": "networkdevice:cli", + "channel": "Execution of commands disabling crypto hardware acceleration (e.g., 'no crypto engine enable')" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of curl, wget, or custom scripts accessing financial endpoints" + }, + { + "name": "auditd:EXECVE", + "channel": "Execution of chattr to set +i or +a attributes" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of chflags hidden or setfile -a V" + }, + { + "name": "esxi:shell", + "channel": "mv, rename, or chmod commands moving VM files into hidden directories" + }, + { + "name": "esxi:hostd", + "channel": "execution + payload hints" + }, + { + "name": "linux:osquery", + "channel": "process_events.command_line" + }, + { + "name": "macos:unifiedlog", + "channel": "process:spawn, process:exec" + }, + { + "name": "esxi:vobd", + "channel": "shell session start" + }, + { + "name": "networkdevice:cli", + "channel": "shell command" + }, + { + "name": "WinEventLog:Microsoft-Office-Alerts", + "channel": "Office application warning or alert on macro execution from template" + }, + { + "name": "m365:unified", + "channel": "Set-Mailbox, Set-MailboxPolicy, Set-TrustedLocation" + }, + { + "name": "m365:office", + "channel": "Execution of unsigned macro from template" + }, + { + "name": "linux:cli", + "channel": "Terminal Command History" + }, + { + "name": "macos:unifiedlog", + "channel": "csrutil disable" + }, + { + "name": "macos:unifiedlog", + "channel": "log show --predicate 'process == '" + }, + { + "name": "networkdevice:syslog", + "channel": "Privilege-level command execution" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of tar, gzip, bzip2, or openssl with output redirection" + }, + { + "name": "saas:PRMetadata", + "channel": "Commit message or branch name contains encoded strings or payload indicators" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of launchctl with setenv or bootout targeting TCC.db or AppleScript under Finder context" + }, + { + "name": "esxi:shell", + "channel": "`esxcli software vib install` with `--force` or `--no-sig-check` from shell history or `shell.log`" + }, + { + "name": "AWS:CloudTrail", + "channel": "SendCommand, StartSession, ExecuteCommand: Unexpected AWS Systems Manager command execution targeting EC2 instances" + }, + { + "name": "esxi:vmkernel", + "channel": "Unexpected restarts of management agents or shell access" + }, + { + "name": "auditd:EXECVE", + "channel": "curl or wget with POST/PUT options" + }, + { + "name": "networkdevice:syslog", + "channel": "Detected CLI command to export key material" + }, + { + "name": "networkdevice:config", + "channel": "PKI export or certificate manipulation commands" + }, + { + "name": "macos:unifiedlog", + "channel": "command execution triggered by emond (e.g., shell, curl, python)" + }, + { + "name": "esxi:vmkernel", + "channel": "esxcli, vim-cmd invocation" + }, + { + "name": "esxi:shell", + "channel": "CLI session activity" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve=/sbin/shutdown or /sbin/reboot" + }, + { + "name": "esxi:shell", + "channel": "esxcli system shutdown or reboot invoked" + }, + { + "name": "networkdevice:syslog", + "channel": "reload command issued" + }, + { + "name": "auditd:PROCTITLE", + "channel": "command-line execution patterns for system discovery utilities (uname, hostname, ifconfig, netstat, lsof, ps, mount)" + }, + { + "name": "esxi:shell", + "channel": "shell command execution for system discovery (vim-cmd, esxcli, vmware-cmd) targeting VM inventory and host configuration" + }, + { + "name": "vpxd.log", + "channel": "VM inventory queries and configuration enumeration through vCenter API calls" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve calls modifying HISTFILE or HISTCONTROL via unset/export" + }, + { + "name": "macos:unifiedlog", + "channel": "Set or unset HIST* variables in shell environment" + }, + { + "name": "esxi:shell", + "channel": "unset HISTFILE or HISTFILESIZE modifications" + }, + { + "name": "networkdevice:cli", + "channel": "Commands like 'no logging' or equivalents that disable session history" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve calls to /usr/bin/locale or shell execution of $LANG" + }, + { + "name": "macos:unifiedlog", + "channel": "defaults read -g AppleLocale or systemsetup -gettimezone" + }, + { + "name": "networkdevice:cli", + "channel": "Execution of commands such as 'copy tftp flash', 'boot system ', 'reload'" + }, + { + "name": "auditd:EXECVE", + "channel": "curl -T, rclone copy" + }, + { + "name": "auditd:SYSCALL", + "channel": "execution of systemctl or service with enable/start/modify" + }, + { + "name": "macos:unifiedlog", + "channel": "launchctl load/unload or plist file modification" + }, + { + "name": "networkdevice:syslog", + "channel": "syslog facility LOCAL7 or trap messages" + }, + { + "name": "linux:cli", + "channel": "/home/*/.bash_history" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of lsmod, modinfo, or cat /proc/modules" + }, + { + "name": "networkdevice:config", + "channel": "Configuration changes referencing 'boot system tftp' or modification of startup-config pointing to external TFTP servers" + }, + { + "name": "macos:unifiedlog", + "channel": "dscl . -create" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of commands like `ls -l@`, `xattr -l`, or custom tools interacting with resource forks" + }, + { + "name": "esxi:vpxd", + "channel": "vCenter Management" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "mobile-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:34.849000+00:00\"}, \"root['description']\": {\"new_value\": \"Command Execution involves monitoring and capturing the execution of textual commands (including shell commands, cmdlets, and scripts) within an operating system or application. These commands may include arguments or parameters and are typically executed through interpreters such as `cmd.exe`, `bash`, `zsh`, `PowerShell`, or programmatic execution. Examples: \\n\\n- Windows Command Prompt\\n - dir \\u2013 Lists directory contents.\\n - net user \\u2013 Queries or manipulates user accounts.\\n - tasklist \\u2013 Lists running processes.\\n- PowerShell\\n - Get-Process \\u2013 Retrieves processes running on a system.\\n - Set-ExecutionPolicy \\u2013 Changes PowerShell script execution policies.\\n - Invoke-WebRequest \\u2013 Downloads remote resources.\\n- Linux Shell\\n - ls \\u2013 Lists files in a directory.\\n - cat /etc/passwd \\u2013 Reads the user accounts file.\\n - curl http://malicious-site.com \\u2013 Retrieves content from a malicious URL.\\n- Container Environments\\n - docker exec \\u2013 Executes a command inside a running container.\\n - kubectl exec \\u2013 Runs commands in Kubernetes pods.\\n- macOS Terminal\\n - open \\u2013 Opens files or URLs.\\n - dscl . -list /Users \\u2013 Lists all users on the system.\\n - osascript -e \\u2013 Executes AppleScript commands.\", \"old_value\": \"Command Execution involves monitoring and capturing the execution of textual commands (including shell commands, cmdlets, and scripts) within an operating system or application. These commands may include arguments or parameters and are typically executed through interpreters such as `cmd.exe`, `bash`, `zsh`, `PowerShell`, or programmatic execution. Examples: \\n\\n- Windows Command Prompt\\n - dir \\u2013 Lists directory contents.\\n - net user \\u2013 Queries or manipulates user accounts.\\n - tasklist \\u2013 Lists running processes.\\n- PowerShell\\n - Get-Process \\u2013 Retrieves processes running on a system.\\n - Set-ExecutionPolicy \\u2013 Changes PowerShell script execution policies.\\n - Invoke-WebRequest \\u2013 Downloads remote resources.\\n- Linux Shell\\n - ls \\u2013 Lists files in a directory.\\n - cat /etc/passwd \\u2013 Reads the user accounts file.\\n - curl http://malicious-site.com \\u2013 Retrieves content from a malicious URL.\\n- Container Environments\\n - docker exec \\u2013 Executes a command inside a running container.\\n - kubectl exec \\u2013 Runs commands in Kubernetes pods.\\n- macOS Terminal\\n - open \\u2013 Opens files or URLs.\\n - dscl . -list /Users \\u2013 Lists all users on the system.\\n - osascript -e \\u2013 Executes AppleScript commands.\\n\\nThis data component can be collected through the following measures:\\n\\nEnable Command Logging\\n\\n- Windows:\\n - Enable PowerShell logging: `Set-ExecutionPolicy Bypass`, `Set-ItemProperty -Path \\\"HKLM:\\\\SOFTWARE\\\\Policies\\\\Microsoft\\\\Windows\\\\PowerShell\\\\ScriptBlockLogging\\\" -Name EnableScriptBlockLogging -Value 1`\\n - Enable Windows Event Logging:\\n - Event ID 4688: Tracks process creation, including command-line arguments.\\n - Event ID 4104: Logs PowerShell script block execution.\\n- Linux/macOS:\\n - Enable shell history logging in `.bashrc` or `.zshrc`: `export HISTTIMEFORMAT=\\\"%d/%m/%y %T \\\"`, `export PROMPT_COMMAND='history -a; history -w'`\\n - Use audit frameworks (e.g., `auditd`) to log command executions. Example rule to log all `execve` syscalls: `-a always,exit -F arch=b64 -S execve -k cmd_exec`\\n- Containers:\\n - Use runtime-specific tools like Docker\\u2019s --log-driver or Kubernetes Audit Logs to capture exec commands.\\n\\nIntegrate with Centralized Logging\\n\\n- Collect logs using a SIEM (e.g., Splunk) or cloud-based log aggregation tools like AWS CloudWatch or Azure Monitor. Example Splunk Search for Windows Event 4688:\\n`index=windows EventID=4688 CommandLine=*`\\n\\nUse Endpoint Detection and Response (EDR) Tools\\n\\n- Monitor command executions via EDR solutions \\n\\nDeploy Sysmon for Advanced Logging (Windows)\\n\\n- Use Sysmon's Event ID 1 to log process creation with command-line arguments\", \"diff\": \"--- \\n+++ \\n@@ -19,31 +19,3 @@\\n - open \\u2013 Opens files or URLs.\\n - dscl . -list /Users \\u2013 Lists all users on the system.\\n - osascript -e \\u2013 Executes AppleScript commands.\\n-\\n-This data component can be collected through the following measures:\\n-\\n-Enable Command Logging\\n-\\n-- Windows:\\n- - Enable PowerShell logging: `Set-ExecutionPolicy Bypass`, `Set-ItemProperty -Path \\\"HKLM:\\\\SOFTWARE\\\\Policies\\\\Microsoft\\\\Windows\\\\PowerShell\\\\ScriptBlockLogging\\\" -Name EnableScriptBlockLogging -Value 1`\\n- - Enable Windows Event Logging:\\n- - Event ID 4688: Tracks process creation, including command-line arguments.\\n- - Event ID 4104: Logs PowerShell script block execution.\\n-- Linux/macOS:\\n- - Enable shell history logging in `.bashrc` or `.zshrc`: `export HISTTIMEFORMAT=\\\"%d/%m/%y %T \\\"`, `export PROMPT_COMMAND='history -a; history -w'`\\n- - Use audit frameworks (e.g., `auditd`) to log command executions. Example rule to log all `execve` syscalls: `-a always,exit -F arch=b64 -S execve -k cmd_exec`\\n-- Containers:\\n- - Use runtime-specific tools like Docker\\u2019s --log-driver or Kubernetes Audit Logs to capture exec commands.\\n-\\n-Integrate with Centralized Logging\\n-\\n-- Collect logs using a SIEM (e.g., Splunk) or cloud-based log aggregation tools like AWS CloudWatch or Azure Monitor. Example Splunk Search for Windows Event 4688:\\n-`index=windows EventID=4688 CommandLine=*`\\n-\\n-Use Endpoint Detection and Response (EDR) Tools\\n-\\n-- Monitor command executions via EDR solutions \\n-\\n-Deploy Sysmon for Advanced Logging (Windows)\\n-\\n-- Use Sysmon's Event ID 1 to log process creation with command-line arguments\"}, \"root['x_mitre_log_sources'][4]['channel']\": {\"new_value\": \"cron activity\", \"old_value\": \"/var/log/syslog or journalctl\"}, \"root['x_mitre_log_sources'][10]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}, \"root['x_mitre_log_sources'][35]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}, \"root['x_mitre_log_sources'][226]['name']\": {\"new_value\": \"azure:signinlogs\", \"old_value\": \"azure:signinLogs\", \"new_path\": \"root['x_mitre_log_sources'][222]['name']\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][36]\": {\"name\": \"WinEventLog:Powershell\", \"channel\": \"EventCode=4104\"}, \"root['x_mitre_log_sources'][66]\": {\"name\": \"WinEventLog:PowerShell\", \"channel\": \"EventCode=4103,4104\"}, \"root['x_mitre_log_sources'][90]\": {\"name\": \"WinEventLog:PowerShell\", \"channel\": \"EventCode=4103\"}, \"root['x_mitre_log_sources'][212]\": {\"name\": \"WinEventLog:PowerShell\", \"channel\": \"EventCode=4103,4104,4105, 4106\"}, \"root['x_mitre_log_sources'][230]\": {\"name\": \"WinEventLog:PowerShell\", \"channel\": \"EventCode=4105\"}, \"root['x_mitre_log_sources'][231]\": {\"name\": \"WinEventLog:PowerShell\", \"channel\": \"EventCode=4106\"}, \"root['x_mitre_log_sources'][269]\": {\"name\": \"WinEventLog:PowerShell\", \"channel\": \"EventCode=4103, 4104\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Command Execution involves monitoring and capturing the exect1Command Execution involves monitoring and capturing the exec
>ution of textual commands (including shell commands, cmdlets>ution of textual commands (including shell commands, cmdlets
>, and scripts) within an operating system or application. Th>, and scripts) within an operating system or application. Th
>ese commands may include arguments or parameters and are typ>ese commands may include arguments or parameters and are typ
>ically executed through interpreters such as `cmd.exe`, `bas>ically executed through interpreters such as `cmd.exe`, `bas
>h`, `zsh`, `PowerShell`, or programmatic execution. Examples>h`, `zsh`, `PowerShell`, or programmatic execution. Examples
>:   - Windows Command Prompt     - dir \u2013 Lists directory con>:   - Windows Command Prompt     - dir \u2013 Lists directory con
>tents.     - net user \u2013 Queries or manipulates user accounts>tents.     - net user \u2013 Queries or manipulates user accounts
>.     - tasklist \u2013 Lists running processes. - PowerShell    >.     - tasklist \u2013 Lists running processes. - PowerShell    
> - Get-Process \u2013 Retrieves processes running on a system.   > - Get-Process \u2013 Retrieves processes running on a system.   
>  - Set-ExecutionPolicy \u2013 Changes PowerShell script executio>  - Set-ExecutionPolicy \u2013 Changes PowerShell script executio
>n policies.     - Invoke-WebRequest \u2013 Downloads remote resou>n policies.     - Invoke-WebRequest \u2013 Downloads remote resou
>rces. - Linux Shell     - ls \u2013 Lists files in a directory.  >rces. - Linux Shell     - ls \u2013 Lists files in a directory.  
>   - cat /etc/passwd \u2013 Reads the user accounts file.     - c>   - cat /etc/passwd \u2013 Reads the user accounts file.     - c
>url http://malicious-site.com \u2013 Retrieves content from a mal>url http://malicious-site.com \u2013 Retrieves content from a mal
>icious URL. - Container Environments     - docker exec \u2013 Exe>icious URL. - Container Environments     - docker exec \u2013 Exe
>cutes a command inside a running container.     - kubectl ex>cutes a command inside a running container.     - kubectl ex
>ec \u2013 Runs commands in Kubernetes pods. - macOS Terminal     >ec \u2013 Runs commands in Kubernetes pods. - macOS Terminal     
>- open \u2013 Opens files or URLs.     - dscl . -list /Users \u2013 Li>- open \u2013 Opens files or URLs.     - dscl . -list /Users \u2013 Li
>sts all users on the system.     - osascript -e \u2013 Executes A>sts all users on the system.     - osascript -e \u2013 Executes A
>ppleScript commands.  This data component can be collected t>ppleScript commands.
>hrough the following measures:  Enable Command Logging  - Wi 
>ndows:     - Enable PowerShell logging: `Set-ExecutionPolicy 
> Bypass`, `Set-ItemProperty -Path \"HKLM:\\SOFTWARE\\Policies\\M 
>icrosoft\\Windows\\PowerShell\\ScriptBlockLogging\" -Name Enable 
>ScriptBlockLogging -Value 1`     - Enable Windows Event Logg 
>ing:         - Event ID 4688: Tracks process creation, inclu 
>ding command-line arguments.         - Event ID 4104: Logs P 
>owerShell script block execution. - Linux/macOS:     - Enabl 
>e shell history logging in `.bashrc` or `.zshrc`: `export HI 
>STTIMEFORMAT=\"%d/%m/%y %T \"`, `export PROMPT_COMMAND='histor 
>y -a; history -w'`     - Use audit frameworks (e.g., `auditd 
>`) to log command executions. Example rule to log all `execv 
>e` syscalls: `-a always,exit -F arch=b64 -S execve -k cmd_ex 
>ec` - Containers:     - Use runtime-specific tools like Dock 
>er\u2019s --log-driver or Kubernetes Audit Logs to capture exec c 
>ommands.  Integrate with Centralized Logging  - Collect logs 
> using a SIEM (e.g., Splunk) or cloud-based log aggregation  
>tools like AWS CloudWatch or Azure Monitor. Example Splunk S 
>earch for Windows Event 4688: `index=windows EventID=4688 Co 
>mmandLine=*`  Use Endpoint Detection and Response (EDR) Tool 
>s  - Monitor command executions via EDR solutions   Deploy S 
>ysmon for Advanced Logging (Windows)  - Use Sysmon's Event I 
>D 1 to log process creation with command-line arguments 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--85a533a4-5fa4-4dba-b45d-f0717bedd6e6", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.272000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0018", + "external_id": "DC0018" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Host Status", + "description": "Logging, messaging, and other artifacts that highlight the health and operational state of host-based security sensors, such as Endpoint Detection and Response (EDR) agents, antivirus software, logging services, and system monitoring tools. Monitoring sensor health is essential for detecting misconfigurations, sensor failures, tampering, or deliberate security control evasion by adversaries.\n\n*Data Collection Measures:*\n\n- Windows Event Logs:\n - Event ID 1074 (System Shutdown): Detects unexpected system reboots/shutdowns.\n - Event ID 6006 (Event Log Stopped): Logs when Windows event logging is stopped.\n - Event ID 16 (Sysmon): Detects configuration state changes that may indicate log tampering.\n - Event ID 12 (Windows Defender Status Change) \u2013 Detects changes in Windows Defender state.\n- Linux/macOS Monitoring:\n - `/var/log/syslog`, `/var/log/auth.log`, `/var/log/kern.log`\n - Journald (journalctl) for kernel and system alerts.\n- Endpoint Detection and Response (EDR) Tools:\n - Monitor agent health status, detect sensor tampering, and alert on missing telemetry.\n- Mobile Threat Intelligence Logs:\n - Samsung Knox, SafetyNet, iOS Secure Enclave provide sensor health status for mobile endpoints.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Sensor Health", + "channel": "None" + }, + { + "name": "macos:osquery", + "channel": "interface_details " + }, + { + "name": "Windows:perfmon", + "channel": "Sustained CPU/memory exhaustion by service process (e.g., w3wp.exe)" + }, + { + "name": "macos:unifiedlog", + "channel": "Web service process (e.g., httpd) entering crash loop or consuming excessive CPU" + }, + { + "name": "AWS:CloudWatch", + "channel": "Sustained spike in CPU usage on EC2 instance with web service role" + }, + { + "name": "WinEventLog:System", + "channel": "System shutdowns due to bugcheck (Event ID 1001) or watchdog timer expirations" + }, + { + "name": "linux:syslog", + "channel": "Out of memory killer invoked or kernel panic entries" + }, + { + "name": "macos:unifiedlog", + "channel": "Spike in CPU or memory use from non-user-initiated processes" + }, + { + "name": "AWS:CloudWatch", + "channel": "StatusCheckFailed or StatusCheckFailed_System for burstable instances (t2/t3)" + }, + { + "name": "kubernetes:events", + "channel": "CrashLoopBackOff, OOMKilled, container restart count exceeds threshold" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "EventCode=16" + }, + { + "name": "Windows:perfmon", + "channel": "High sustained CPU usage by a single process" + }, + { + "name": "linux:procfs", + "channel": "Sustained high /proc/[pid]/stat usage" + }, + { + "name": "AWS:CloudWatch", + "channel": "Sustained EC2 CPU usage above normal baseline" + }, + { + "name": "prometheus:metrics", + "channel": "Container CPU/Memory usage exceeding threshold" + }, + { + "name": "linux:syslog", + "channel": "Service stop or disable messages for security tools not reflected in SIEM alerts" + }, + { + "name": "macos:unifiedlog", + "channel": "Termination or disabling of XProtect, Gatekeeper, or third-party AV daemons" + }, + { + "name": "AWS:CloudWatch", + "channel": "NetworkOut spike beyond baseline" + }, + { + "name": "WinEventLog:Microsoft-Windows-TCPIP", + "channel": "Connection queue overflow or failure to allocate TCP state object" + }, + { + "name": "NSM:Flow", + "channel": "TCP: possible SYN flood or backlog limit exceeded" + }, + { + "name": "macos:unifiedlog", + "channel": "network stack resource exhaustion, tcp_accept queue overflow, repeated resets" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=1166, 7045" + }, + { + "name": "auditd:SYSCALL", + "channel": "firmware_update, kexec_load" + }, + { + "name": "journald:boot", + "channel": "Secure Boot failure, firmware version change" + }, + { + "name": "macos:unifiedlog", + "channel": "EFI firmware integrity check failed" + }, + { + "name": "macos:syslog", + "channel": "Hardware UUID or device list drift" + }, + { + "name": "Windows:perfmon", + "channel": "Sudden spike in outbound throughput without corresponding inbound traffic" + }, + { + "name": "sar:network", + "channel": "Outbound network saturation with minimal process activity" + }, + { + "name": "AWS:CloudWatch", + "channel": "Sudden spike in network output without a corresponding inbound request ratio" + }, + { + "name": "Windows:perfmon", + "channel": "Sudden spikes in CPU/Memory usage linked to specific application processes" + }, + { + "name": "AWS:CloudMetrics", + "channel": "Autoscaling, memory/cpu alarms, or instance unhealthiness" + }, + { + "name": "macos:unifiedlog", + "channel": "System Integrity Protection (SIP) state reported as disabled" + }, + { + "name": "AWS:CloudWatch", + "channel": "Unusual CPU burst or metric anomalies" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=1074" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=6006" + }, + { + "name": "linux:syslog", + "channel": "system is powering down" + }, + { + "name": "macos:unifiedlog", + "channel": "System shutdown or reboot requested" + }, + { + "name": "esxi:hostd", + "channel": "Powering off or restarting host" + }, + { + "name": "networkdevice:syslog", + "channel": "System reboot scheduled or performed" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "mobile-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:37.544000+00:00\"}, \"root['x_mitre_log_sources'][13]['name']\": {\"new_value\": \"AWS:CloudWatch\", \"old_value\": \"CloudWatch:Metrics\"}, \"root['x_mitre_log_sources'][17]['name']\": {\"new_value\": \"AWS:CloudWatch\", \"old_value\": \"CloudWatch:InstanceMetrics\"}, \"root['x_mitre_log_sources'][30]['name']\": {\"new_value\": \"AWS:CloudMetrics\", \"old_value\": \"CloudMetrics:InstanceHealth\"}}}", + "previous_version": "2.0" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.274000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0082", + "external_id": "DC0082" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Network Connection Creation", + "description": "The initial establishment of a network session, where a system or process initiates a connection to a local or remote endpoint. This typically involves capturing socket information (source/destination IP, ports, protocol) and tracking session metadata. Monitoring these events helps detect lateral movement, exfiltration, and command-and-control (C2) activities.\n\n*Data Collection Measures:*\n\n- Windows:\n - Event ID 5156 \u2013 Filtering Platform Connection - Logs network connections permitted by Windows Filtering Platform (WFP).\n - Sysmon Event ID 3 \u2013 Network Connection Initiated - Captures process, source/destination IP, ports, and parent process.\n- Linux/macOS:\n - Netfilter (iptables), nftables logs - Tracks incoming and outgoing network connections.\n - AuditD (`connect` syscall) - Logs TCP, UDP, and ICMP connections.\n - Zeek (`conn.log`) - Captures protocol, duration, and bytes transferred.\n- Cloud & Network Infrastructure:\n - AWS VPC Flow Logs / Azure NSG Flow Logs - Logs IP traffic at the network level in cloud environments.\n - Zeek (conn.log) or Suricata (network events) - Captures packet metadata for detection and correlation.\n- Endpoint Detection & Response (EDR):\n - Detect anomalous network activity such as new C2 connections or data exfiltration attempts.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Network Traffic", + "channel": "None" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "Outbound connection to 169.254.169.254 from EC2 workload" + }, + { + "name": "macos:unifiedlog", + "channel": "connection attempts" + }, + { + "name": "esxi:hostd", + "channel": "System service interactions" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "name": "NSM:Connections", + "channel": "web domain alerts" + }, + { + "name": "auditd:SYSCALL", + "channel": "connect" + }, + { + "name": "macos:osquery", + "channel": "process_events/socket_events" + }, + { + "name": "NSM:Firewall", + "channel": "Outbound Connections" + }, + { + "name": "macos:unifiedlog", + "channel": "connection open" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execs of chromium, google-chrome, firefox, libreoffice with http(s) in cmdline" + }, + { + "name": "NSM:Flow", + "channel": "New TCP/443 or TCP/80 to domain not previously seen for the user/host" + }, + { + "name": "NSM:Connections", + "channel": "New outbound connection from Safari/Chrome/Firefox/Word" + }, + { + "name": "NSM:Flow", + "channel": "conn.log" + }, + { + "name": "macos:osquery", + "channel": "execution of trusted tools interacting with external endpoints" + }, + { + "name": "linux:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "name": "WinEventLog:Microsoft-Windows-Bits-Client/Operational", + "channel": "BITS job lifecycle events such as job create/modify/transfer/complete and URL/remote name fields" + }, + { + "name": "NSM:Firewall", + "channel": "proxy or TLS inspection logs" + }, + { + "name": "macos:unifiedlog", + "channel": "network connection events" + }, + { + "name": "esxi:vmkernel", + "channel": "protocol egress" + }, + { + "name": "NSM:Flow", + "channel": "Outbound connection to *.tunnels.api.visualstudio.com or *.devtunnels.ms" + }, + { + "name": "NSM:Flow", + "channel": "Connections to *.devtunnels.ms or tunnels.api.visualstudio.com" + }, + { + "name": "NSM:Flow", + "channel": "HTTPs connection to tunnels.api.visualstudio.com" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=5156, 5157" + }, + { + "name": "linux:osquery", + "channel": "family=AF_PACKET or protocol raw; process name not in allowlist." + }, + { + "name": "macos:unifiedlog", + "channel": "First outbound connection from the same PID/user shortly after an inbound trigger." + }, + { + "name": "NSM:Flow", + "channel": "Outbound or inbound TFTP file transfers of ROMMON or firmware binaries" + }, + { + "name": "NSM:Connections", + "channel": "Outbound connections from newly spawned child processes or from the browser to uncommon endpoints or on anomalous ports" + }, + { + "name": "NSM:Flow", + "channel": "connection: TCP connections to ports 139/445 to multiple hosts" + }, + { + "name": "NSM:Flow", + "channel": "connection: SMB connections to multiple internal hosts" + }, + { + "name": "auditd:SYSCALL", + "channel": "connect/sendto" + }, + { + "name": "macos:endpointsecurity", + "channel": "ES_EVENT_TYPE_NOTIFY_CONNECT" + }, + { + "name": "snmp:access", + "channel": "GETBULK/GETNEXT requests for OIDs associated with configuration parameters" + }, + { + "name": "esxi:hostd", + "channel": "Service initiated connections" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "Large transfer volume (>20MB) from RDS IP range to external public IPs" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "High outbound traffic from new region resource" + }, + { + "name": "NSM:Flow", + "channel": "Outbound HTTP/S initiated by newly installed interpreter process" + }, + { + "name": "auditd:SYSCALL", + "channel": "open or connect syscalls on /tmp/ssh-* or $SSH_AUTH_SOCK" + }, + { + "name": "NSM:Flow", + "channel": "outbound connections to RMM services or to unusual destination ports" + }, + { + "name": "macos:unifiedlog", + "channel": "network sessions initiated by remote desktop apps" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "Outbound connections to port 22, 3389" + }, + { + "name": "auditd:SYSCALL", + "channel": "socket/connect with TLS context by unexpected process" + }, + { + "name": "NSM:Flow", + "channel": "Multiple failed connections (conn_state=REJ/S0 or history has 'R') across distinct ports from the same src_ip followed by success to a specific port." + }, + { + "name": "auditd:SYSCALL", + "channel": "socket/bind: New bind() to a previously closed port shortly after the sequence." + }, + { + "name": "NSM:Flow", + "channel": "Sequence of REJ/S0 then SF success from same src_ip within TimeWindow." + }, + { + "name": "NSM:Flow", + "channel": "Series of denied/closed flows to distinct ports then success to mgmt port from same src_ip within TimeWindow." + }, + { + "name": "NSM:Flow", + "channel": "Outbound traffic spike through formerly blocked ports/subnets following config change" + }, + { + "name": "cni:netflow", + "channel": "outbound connection to internal or external APIs" + }, + { + "name": "macos:osquery", + "channel": "launchd or network_events" + }, + { + "name": "networkdevice:syslog", + "channel": "Dynamic route changes" + }, + { + "name": "NSM:Flow", + "channel": "New egress to Internet by the same UID/host shortly after terminal exec" + }, + { + "name": "NSM:Flow", + "channel": "connection: Inbound connections to SSH or VPN ports" + }, + { + "name": "macos:unifiedlog", + "channel": "Inbound connections to VNC/SSH ports" + }, + { + "name": "NSM:Flow", + "channel": "External access to container ports (2375, 6443)" + }, + { + "name": "linux:syslog", + "channel": "network" + }, + { + "name": "macos:osquery", + "channel": "process_events + launchd" + }, + { + "name": "esxi:esxupdate", + "channel": "/var/log/esxupdate.log or /var/log/vmksummary.log" + }, + { + "name": "ebpf:syscalls", + "channel": "socket connect" + }, + { + "name": "NSM:Flow", + "channel": "remote access" + }, + { + "name": "NSM:Flow", + "channel": "Outbound Connections" + }, + { + "name": "macos:unifiedlog", + "channel": "network" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "Traffic observed on mirror destination instance" + }, + { + "name": "networkdevice:Flow", + "channel": "Traffic from mirrored interface to mirror target IP" + }, + { + "name": "macos:osquery", + "channel": "process_events, socket_events" + }, + { + "name": "esxi:vmkernel", + "channel": "network activity" + }, + { + "name": "NSM:Flow", + "channel": "connection attempts" + }, + { + "name": "NSM:Flow", + "channel": "High-volume or repeated SNMP GETBULK/GETNEXT queries from untrusted or external IPs" + }, + { + "name": "auditd:SYSCALL", + "channel": "sendto/connect" + }, + { + "name": "NSM:Flow", + "channel": "outbound connections from host during or immediately after image build" + }, + { + "name": "macos:unifiedlog", + "channel": "Outbound Traffic" + }, + { + "name": "esxi:hostd", + "channel": "Service-Based Network Connection" + }, + { + "name": "linux:syslog", + "channel": "postfix/smtpd" + }, + { + "name": "NSM:Flow", + "channel": "new outbound connection from browser/office lineage" + }, + { + "name": "NSM:Flow", + "channel": "new outbound connection from exploited lineage" + }, + { + "name": "macos:osquery", + "channel": "CONNECT: Long-lived connections from remote-control parents to external IPs/domains" + }, + { + "name": "auditd:SYSCALL", + "channel": "outbound connections" + }, + { + "name": "macos:unifiedlog", + "channel": "None" + }, + { + "name": "esxi:vmkernel", + "channel": "None" + }, + { + "name": "macos:unifiedlog", + "channel": "networkd or socket" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream network activity" + }, + { + "name": "NSM:Flow", + "channel": "Multiple failed connections to closed ports (history contains 'R' or conn_state in {REJ, S0}) followed by a successful handshake to a new port from same src within TimeWindowKnock" + }, + { + "name": "auditd:SYSCALL", + "channel": "socket/bind: Process binds to a new local port shortly after knock" + }, + { + "name": "NSM:Flow", + "channel": "Closed-port hits followed by success from same src_ip" + }, + { + "name": "NSM:Flow", + "channel": "Port-knock pattern from one src to device unicast,broadcast,network addresses on same port within TimeWindowKnock" + }, + { + "name": "WinEventLog:Microsoft-Windows-WLAN-AutoConfig", + "channel": "EventCode=8001, 8002, 8003" + }, + { + "name": "linux:syslog", + "channel": "New Wi-Fi connection established or repeated association failures" + }, + { + "name": "macos:unifiedlog", + "channel": "Association and authentication events including failures and new SSIDs" + }, + { + "name": "auditd:SYSCALL", + "channel": "socket/connect calls showing SSH processes forwarding arbitrary ports" + }, + { + "name": "esxi:vmkernel", + "channel": "network session initiation with external HTTPS services" + }, + { + "name": "WinEventLog:System", + "channel": "EventCode=8001" + }, + { + "name": "linux:syslog", + "channel": "None" + }, + { + "name": "macos:osquery", + "channel": "None" + }, + { + "name": "auditd:SYSCALL", + "channel": "openat,connect -k discovery" + }, + { + "name": "NSM:Flow", + "channel": "Unexpected inbound/outbound TFTP traffic for device image files" + }, + { + "name": "NSM:Flow", + "channel": "Unexpected or unauthorized inbound connections to SNMP, NETCONF, or RESTCONF services" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "mobile-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:34.190000+00:00\"}, \"root['x_mitre_log_sources'][19]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=22\", \"new_path\": \"root['x_mitre_log_sources'][15]['channel']\"}, \"root['x_mitre_log_sources'][27]['channel']\": {\"new_value\": \"EventCode=5156, 5157\", \"old_value\": \"EventCode=5156\", \"new_path\": \"root['x_mitre_log_sources'][23]['channel']\"}, \"root['x_mitre_log_sources'][90]['channel']\": {\"new_value\": \"EventCode=8001, 8002, 8003\", \"old_value\": \"8001, 8002, 8003\", \"new_path\": \"root['x_mitre_log_sources'][84]['channel']\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][2]\": {\"name\": \"WinEventLog:Sysmon\", \"channel\": \"EventCode=3\"}, \"root['x_mitre_log_sources'][7]\": {\"name\": \"WinEventLog:Sysmon\", \"channel\": \"EventCode=22\"}, \"root['x_mitre_log_sources'][9]\": {\"name\": \"auditd:SYSCALL\", \"channel\": \"netconnect\"}, \"root['x_mitre_log_sources'][17]\": {\"name\": \"auditd:SYSCALL\", \"channel\": \"open or connect\"}, \"root['x_mitre_log_sources'][28]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=5156,5157\"}, \"root['x_mitre_log_sources'][68]\": {\"name\": \"linux:Sysmon\", \"channel\": \"EventCode=3\"}}}", + "previous_version": "2.0" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.274000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0078", + "external_id": "DC0078" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Network Traffic Flow", + "description": "Summarized network packet data that captures session-level details such as source/destination IPs, ports, protocol types, timestamps, and data volume, without storing full packet payloads. This is commonly used for traffic analysis, anomaly detection, and network performance monitoring.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Network Traffic", + "channel": "None" + }, + { + "name": "macos:osquery", + "channel": "socket_events" + }, + { + "name": "NSM:Flow", + "channel": "Unexpected flows between segmented networks or prohibited ports" + }, + { + "name": "snmp:config", + "channel": "Configuration change traps or policy enforcement failures" + }, + { + "name": "NSM:Flow", + "channel": "First-time outbound connections to package registries or unknown hosts immediately after restore/build" + }, + { + "name": "NSM:Flow", + "channel": "First-time egress to new registries/CDNs post-install/build" + }, + { + "name": "NSM:Flow", + "channel": "First-time egress to non-approved registries after dependency install" + }, + { + "name": "NSM:Flow", + "channel": "Outbound connections to TCP 139,445 and HTTP/HTTPS to WebDAV endpoints from workstation subnets" + }, + { + "name": "NSM:Flow", + "channel": "large outbound data flows or long-duration connections" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "egress > 90th percentile or frequent connection reuse" + }, + { + "name": "NSM:Flow", + "channel": "conn.log" + }, + { + "name": "auditd:SYSCALL", + "channel": "socket/connect" + }, + { + "name": "esxi:syslog", + "channel": "esxcli network vswitch or DNS resolver configuration updates" + }, + { + "name": "esxi:vobd", + "channel": "Network Events" + }, + { + "name": "iptables:LOG", + "channel": "TCP connections" + }, + { + "name": "NSM:Flow", + "channel": "connection metadata" + }, + { + "name": "wineventlog:dhcp", + "channel": "DHCP Lease Granted" + }, + { + "name": "NSM:Flow", + "channel": "LEASE_GRANTED" + }, + { + "name": "NSM:Flow", + "channel": "MAC not in allow-list acquiring IP (DHCP)" + }, + { + "name": "Windows Firewall Log", + "channel": "SMB over high port" + }, + { + "name": "NSM:Connections", + "channel": "Internal connection logging" + }, + { + "name": "NSM:Flow", + "channel": "pf firewall logs" + }, + { + "name": "esxi:vmkernel", + "channel": "/var/log/vmkernel.log" + }, + { + "name": "NSM:Flow", + "channel": "Inter-segment traffic" + }, + { + "name": "NSM:Flow", + "channel": "None" + }, + { + "name": "NSM:Flow", + "channel": "Long-lived or hijacked SSH sessions maintained with no active user activity" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "VPC/NSG flow logs for pod/instance egress to Internet or metadata" + }, + { + "name": "macos:unifiedlog", + "channel": "Suspicious outbound traffic from browser binary to non-standard domains" + }, + { + "name": "NSM:Flow", + "channel": "Abnormal browser traffic volume or destination" + }, + { + "name": "NSM:Flow", + "channel": "Outbound requests to domains not previously resolved or associated with phishing campaigns" + }, + { + "name": "NSM:Flow", + "channel": "Outbound traffic to domains/IPs not previously resolved, occurring shortly after attachment download or link click" + }, + { + "name": "M365Defender:DeviceNetworkEvents", + "channel": "NetworkConnection: bytes_sent >> bytes_received anomaly" + }, + { + "name": "PF:Logs", + "channel": "outbound flows with bytes_out >> bytes_in" + }, + { + "name": "NSX:FlowLogs", + "channel": "network_flow: bytes_out >> bytes_in to external" + }, + { + "name": "NSM:Flow", + "channel": "NetFlow/Zeek conn.log" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "Outbound data flows" + }, + { + "name": "NSM:Flow", + "channel": "Flow records with entropy signatures resembling symmetric encryption" + }, + { + "name": "NSM:Flow", + "channel": "flow records" + }, + { + "name": "networkdevice:syslog", + "channel": "flow records" + }, + { + "name": "macos:unifiedlog", + "channel": "HTTPS POST to known webhook URLs" + }, + { + "name": "saas:api", + "channel": "Webhook registrations or repeated POST activity" + }, + { + "name": "NSM:Flow", + "channel": "Source/destination IP translation inconsistent with intended policy" + }, + { + "name": "SNMP:DeviceLogs", + "channel": "Unexpected NAT translation statistics or rule insertion events" + }, + { + "name": "NSM:Flow", + "channel": "Sudden spike in incoming flows to web service ports from single/multiple IPs" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "Unusual volume of inbound packets from single source across short time interval" + }, + { + "name": "NSM:Flow", + "channel": "port 5900 inbound" + }, + { + "name": "NSM:Flow", + "channel": "TCP port 5900 open" + }, + { + "name": "NSM:firewall", + "channel": "inbound connection to port 5900" + }, + { + "name": "NSM:Firewall", + "channel": "Outbound connections to 139/445 to multiple destinations" + }, + { + "name": "VPCFlowLogs:All", + "channel": "High volume internal traffic with low entropy indicating looped or malicious DoS script" + }, + { + "name": "NSM:Flow", + "channel": "NetFlow/sFlow/PCAP" + }, + { + "name": "NSM:Flow", + "channel": "Outbound Network Flow" + }, + { + "name": "macos:unifiedlog", + "channel": "com.apple.network" + }, + { + "name": "NSM:Flow", + "channel": "Device-to-Device Deployment Flows" + }, + { + "name": "auditd:SYSCALL", + "channel": "socket/connect syscalls" + }, + { + "name": "macos:unifiedlog", + "channel": "outbound TCP/UDP traffic over unexpected port" + }, + { + "name": "esxi:vpxd", + "channel": "ESXi service connections on unexpected ports" + }, + { + "name": "iptables:LOG", + "channel": "OUTBOUND" + }, + { + "name": "macos:unifiedlog", + "channel": "tcp/udp" + }, + { + "name": "esxi:hostd", + "channel": "CLI network calls" + }, + { + "name": "NSM:Flow", + "channel": "Outbound traffic from suspicious new processes post-attachment execution" + }, + { + "name": "macos:unifiedlog", + "channel": "Suspicious anomalies in transmitted data integrity during application network operations" + }, + { + "name": "esxi:syslog", + "channel": "DNS resolution events leading to outbound traffic on unexpected ports" + }, + { + "name": "NSM:Flow", + "channel": "Outbound traffic to mining pools or proxies" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "Outbound flow logs to known mining pools" + }, + { + "name": "container:cni", + "channel": "Outbound network traffic to mining proxies" + }, + { + "name": "esxi:vpxd", + "channel": "TLS session established by ESXi service to unapproved endpoint" + }, + { + "name": "NSM:Flow", + "channel": "Session records with TLS-like byte patterns" + }, + { + "name": "macos:unifiedlog", + "channel": "HTTPS POST requests to pastebin.com or similar" + }, + { + "name": "NetFlow:Flow", + "channel": "new outbound connections from exploited process tree" + }, + { + "name": "NSM:Connections", + "channel": "new connections from exploited lineage" + }, + { + "name": "NSM:Flow", + "channel": "Unexpected route changes or duplicate gateway advertisements" + }, + { + "name": "WinEventLog:Microsoft-Windows-Windows Firewall With Advanced Security/Firewall", + "channel": "EventCode=2004, 2005, 2006" + }, + { + "name": "NSM:Flow", + "channel": "Knock pattern: repeated REJ/S0 across \u2265MinSequenceLen ports from same src_ip then SF success." + }, + { + "name": "macos:unifiedlog", + "channel": "Firewall/PF anchor load or rule change events." + }, + { + "name": "networkdevice:syslog", + "channel": "Config/ACL changes, line vty transport input changes, telnet/ssh/http(s) enable, image/feature module changes." + }, + { + "name": "NSM:Flow", + "channel": "First-time egress to non-approved update hosts right after install/update" + }, + { + "name": "NSM:Flow", + "channel": "New outbound flows to non-approved vendor hosts post install" + }, + { + "name": "NSM:Flow", + "channel": "New/rare egress to non-approved update hosts after install" + }, + { + "name": "NSM:Flow", + "channel": "large outbound HTTPS uploads to repo domains" + }, + { + "name": "esxi:vmkernel", + "channel": "HTTPS traffic to repository domains" + }, + { + "name": "NSM:Flow", + "channel": "alert log" + }, + { + "name": "esxi:vmkernel", + "channel": "None" + }, + { + "name": "NSM:Flow", + "channel": "Outbound flow records" + }, + { + "name": "m365:defender", + "channel": "NetworkConnection: high out:in ratio, periodic beacons, protocol mismatch" + }, + { + "name": "PF:Logs", + "channel": "high out:in ratio or fixed-size periodic flows" + }, + { + "name": "NSM:Flow", + "channel": "network_flow: bytes_out >> bytes_in, fixed packet sizes/intervals to non-approved CIDRs" + }, + { + "name": "auditd:SYSCALL", + "channel": "connect or sendto system call with burst pattern" + }, + { + "name": "macos:unifiedlog", + "channel": "sudden burst in outgoing packets from same PID" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "source instance sends large volume of traffic in short window" + }, + { + "name": "NSM:Flow", + "channel": "session stats with bytes_out > bytes_in" + }, + { + "name": "NIDS:Flow", + "channel": "session stats with bytes_out > bytes_in" + }, + { + "name": "esxi:vpxa", + "channel": "connection attempts and data transmission logs" + }, + { + "name": "PF:Logs", + "channel": "External traffic to remote access services" + }, + { + "name": "NSM:Flow", + "channel": "High volumes of SYN/ACK packets with unacknowledged TCP handshakes" + }, + { + "name": "dns:query", + "channel": "Outbound resolution to hidden service domains (e.g., `.onion`)" + }, + { + "name": "NSM:Flow", + "channel": "conn.log + ssl.log with Tor fingerprinting" + }, + { + "name": "macos:unifiedlog", + "channel": "forwarded encrypted traffic" + }, + { + "name": "NSM:Flow", + "channel": "Relayed session pathing (multi-hop)" + }, + { + "name": "NSM:Flow", + "channel": "Outbound TCP SYN or UDP to multiple ports/hosts" + }, + { + "name": "containerd:runtime", + "channel": "container-level outbound traffic events" + }, + { + "name": "WLANLogs:Association", + "channel": "Multiple APs advertising the same SSID but with different BSSID/MAC or encryption type" + }, + { + "name": "linux:osquery", + "channel": "socket_events" + }, + { + "name": "WinEventLog:Security", + "channel": "ARP cache modification attempts observed through event tracing or security baselines" + }, + { + "name": "NSM:Flow", + "channel": "Gratuitous ARP replies with mismatched IP-MAC binding" + }, + { + "name": "macos:unifiedlog", + "channel": "ARP table updates inconsistent with expected gateway or DHCP lease assignments" + }, + { + "name": "macos:unifiedlog", + "channel": "networkd or com.apple.network" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream 'eventMessage contains \"dns_request\"'" + }, + { + "name": "esxi:syslog", + "channel": "/var/log/syslog.log" + }, + { + "name": "AWS:CloudTrail", + "channel": "CreateTrafficMirrorSession or ModifyTrafficMirrorTarget" + }, + { + "name": "networkdevice:syslog", + "channel": "Config change: CLI/NETCONF/SNMP \u2013 'monitor session', 'mirror port'" + }, + { + "name": "NSM:Flow", + "channel": "Outbound UDP floods targeting common reflection services with spoofed IP headers" + }, + { + "name": "macos:unifiedlog", + "channel": "Outbound UDP spikes to external reflector IPs" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "Large outbound UDP traffic to multiple public reflector IPs" + }, + { + "name": "macos:unifiedlog", + "channel": "High entropy domain queries with multiple NXDOMAINs" + }, + { + "name": "esxi:syslog", + "channel": "Frequent DNS queries with high entropy names or NXDOMAIN results" + }, + { + "name": "vpxd.log", + "channel": "API communication" + }, + { + "name": "NSM:Connections", + "channel": "Outbound Connection" + }, + { + "name": "NSM:Flow", + "channel": "Connection Tracking" + }, + { + "name": "NSM:Firewall", + "channel": "pf firewall logs" + }, + { + "name": "NSM:Flow", + "channel": "Flow Creation (NetFlow/sFlow)" + }, + { + "name": "NSM:Flow", + "channel": "conn.log, icmp.log" + }, + { + "name": "NSM:Flow", + "channel": "Abnormal SMB authentication attempts correlated with poisoned LLMNR/NBT-NS sessions" + }, + { + "name": "NSM:Flow", + "channel": "Gratuitous or duplicate DHCP OFFER packets from non-legitimate servers" + }, + { + "name": "NSM:Connections", + "channel": "Inbound on ports 5985/5986" + }, + { + "name": "linux:syslog", + "channel": "Multiple IP addresses assigned to the same domain in rapid sequence" + }, + { + "name": "macos:unifiedlog", + "channel": "Rapid domain-to-IP resolution changes for same domain" + }, + { + "name": "esxi:syslog", + "channel": "Frequent DNS resolution of same domain with rotating IPs" + }, + { + "name": "NSM:Flow", + "channel": "uncommon ports" + }, + { + "name": "NSM:Flow", + "channel": "alternate ports" + }, + { + "name": "esxi:vpxd", + "channel": "None" + }, + { + "name": "NSM:Flow", + "channel": "conn.log or flow data" + }, + { + "name": "esxi:vmkernel", + "channel": "egress log analysis" + }, + { + "name": "esxi:vmkernel", + "channel": "egress logs" + }, + { + "name": "NSM:Flow", + "channel": "High volume flows with incomplete TCP sessions or single-packet bursts" + }, + { + "name": "NSM:Flow", + "channel": "Knock pattern: multiple REJ/S0 to distinct closed ports then successful connection to service_port" + }, + { + "name": "macos:unifiedlog", + "channel": "Firewall rule enable/disable or listen socket changes" + }, + { + "name": "networkdevice:syslog", + "channel": "Config/ACL/line vty changes, service enable (telnet/ssh/http(s)), module reloads" + }, + { + "name": "auditd:SYSCALL", + "channel": "ioctl: Changes to wireless network interfaces (up, down, reassociate)" + }, + { + "name": "macos:osquery", + "channel": "query: Historical list of associated SSIDs compared against baseline" + }, + { + "name": "NSM:Flow", + "channel": "First-time egress from host after new install to unknown update endpoints" + }, + { + "name": "NSM:Flow", + "channel": "First-time egress to unknown registries/mirrors immediately after install" + }, + { + "name": "NSM:Flow", + "channel": "New egress from app just installed to unknown update endpoints" + }, + { + "name": "esxi:vpxd", + "channel": "ESXi processes relaying traffic via SSH or unexpected ports" + }, + { + "name": "NSM:Flow", + "channel": "Outbound connection to mining pool port (3333, 4444, 5555)" + }, + { + "name": "NSM:Flow", + "channel": "Outbound traffic to mining pool upon container launch" + }, + { + "name": "NSM:Flow", + "channel": "Flow records with RSA key exchange on unexpected port" + }, + { + "name": "NSM:Flow", + "channel": "Outbound connections from web server binaries (apache2, nginx, php-fpm) to unknown external IPs" + }, + { + "name": "NSM:Flow", + "channel": "sustained outbound HTTPS sessions with high data volume" + }, + { + "name": "NSM:Flow", + "channel": "Connections from IDE hosts to marketplace/tunnel domains" + }, + { + "name": "macos:unifiedlog", + "channel": "Outbound connections from IDE processes to marketplace/tunnel domains" + }, + { + "name": "NSM:Flow", + "channel": "large HTTPS outbound uploads" + }, + { + "name": "esxi:vmkernel", + "channel": "network flows to external cloud services" + }, + { + "name": "NSM:Flow", + "channel": "TCP port 22 traffic" + }, + { + "name": "esxi:vmkernel", + "channel": "port 22 access" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "mobile-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:34.703000+00:00\"}, \"root['description']\": {\"new_value\": \"Summarized network packet data that captures session-level details such as source/destination IPs, ports, protocol types, timestamps, and data volume, without storing full packet payloads. This is commonly used for traffic analysis, anomaly detection, and network performance monitoring.\", \"old_value\": \"Summarized network packet data that captures session-level details such as source/destination IPs, ports, protocol types, timestamps, and data volume, without storing full packet payloads. This is commonly used for traffic analysis, anomaly detection, and network performance monitoring.\\n\\n*Data Collection Measures:*\\n\\n- Network Flow Logs (Metadata Collection)\\n - NetFlow \\n - Summarized metadata for network conversations (no packet payloads).\\n - sFlow (Sampled Flow Logging)\\n - Captures sampled packets from switches and routers.\\n - Used for real-time traffic monitoring and anomaly detection.\\n - Zeek (Bro) Flow Logs\\n - Zeek logs session-level details in logs like conn.log, http.log, dns.log, etc.\\n- Host-Based Collection\\n - Sysmon Event ID 3 \\u2013 Network Connection Initiated\\n - Logs process-level network activity, useful for detecting malicious outbound connections.\\n - AuditD (Linux) \\u2013 syscall=connect\\n - Monitors system calls for network connections. `auditctl -a always,exit -F arch=b64 -S connect -k network_activity`\\n- Cloud & SaaS Flow Monitoring\\n - AWS VPC Flow Logs\\n - Captures metadata for traffic between EC2 instances, security groups, and internet gateways.\\n - Azure NSG Flow Logs / Google VPC Flow Logs\\n - Logs ingress/egress traffic for cloud-based resources.\", \"diff\": \"--- \\n+++ \\n@@ -1,22 +1 @@\\n Summarized network packet data that captures session-level details such as source/destination IPs, ports, protocol types, timestamps, and data volume, without storing full packet payloads. This is commonly used for traffic analysis, anomaly detection, and network performance monitoring.\\n-\\n-*Data Collection Measures:*\\n-\\n-- Network Flow Logs (Metadata Collection)\\n- - NetFlow \\n- - Summarized metadata for network conversations (no packet payloads).\\n- - sFlow (Sampled Flow Logging)\\n- - Captures sampled packets from switches and routers.\\n- - Used for real-time traffic monitoring and anomaly detection.\\n- - Zeek (Bro) Flow Logs\\n- - Zeek logs session-level details in logs like conn.log, http.log, dns.log, etc.\\n-- Host-Based Collection\\n- - Sysmon Event ID 3 \\u2013 Network Connection Initiated\\n- - Logs process-level network activity, useful for detecting malicious outbound connections.\\n- - AuditD (Linux) \\u2013 syscall=connect\\n- - Monitors system calls for network connections. `auditctl -a always,exit -F arch=b64 -S connect -k network_activity`\\n-- Cloud & SaaS Flow Monitoring\\n- - AWS VPC Flow Logs\\n- - Captures metadata for traffic between EC2 instances, security groups, and internet gateways.\\n- - Azure NSG Flow Logs / Google VPC Flow Logs\\n- - Logs ingress/egress traffic for cloud-based resources.\"}, \"root['x_mitre_log_sources'][72]['channel']\": {\"new_value\": \"EventCode=2004, 2005, 2006\", \"old_value\": \"EventCode=2004,2005,2006\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Summarized network packet data that captures session-level dt1Summarized network packet data that captures session-level d
>etails such as source/destination IPs, ports, protocol types>etails such as source/destination IPs, ports, protocol types
>, timestamps, and data volume, without storing full packet p>, timestamps, and data volume, without storing full packet p
>ayloads. This is commonly used for traffic analysis, anomaly>ayloads. This is commonly used for traffic analysis, anomaly
> detection, and network performance monitoring.  *Data Colle> detection, and network performance monitoring.
>ction Measures:*  - Network Flow Logs (Metadata Collection)  
>    - NetFlow          - Summarized metadata for network con 
>versations (no packet payloads).     - sFlow (Sampled Flow L 
>ogging)         - Captures sampled packets from switches and 
> routers.         - Used for real-time traffic monitoring an 
>d anomaly detection.     - Zeek (Bro) Flow Logs         - Ze 
>ek logs session-level details in logs like conn.log, http.lo 
>g, dns.log, etc. - Host-Based Collection     - Sysmon Event  
>ID 3 \u2013 Network Connection Initiated         - Logs process-l 
>evel network activity, useful for detecting malicious outbou 
>nd connections.     - AuditD (Linux) \u2013 syscall=connect       
>   - Monitors system calls for network connections. `auditct 
>l -a always,exit -F arch=b64 -S connect -k network_activity` 
> - Cloud & SaaS Flow Monitoring     - AWS VPC Flow Logs      
>    - Captures metadata for traffic between EC2 instances, s 
>ecurity groups, and internet gateways.     - Azure NSG Flow  
>Logs / Google VPC Flow Logs         - Logs ingress/egress tr 
>affic for cloud-based resources. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.272000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0021", + "external_id": "DC0021" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "OS API Execution", + "description": "Calls made by a process to operating system-provided Application Programming Interfaces (APIs). These calls are essential for interacting with system resources such as memory, files, and hardware, or for performing system-level tasks. Monitoring these calls can provide insight into a process's intent, especially if the process is malicious.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Process", + "channel": "None" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Base", + "channel": "GetLocaleInfoW, GetTimeZoneInformation API calls" + }, + { + "name": "AWS:CloudTrail", + "channel": "GetMetadata, DescribeInstanceIdentity" + }, + { + "name": "macos:osquery", + "channel": "open, execve: Unexpected processes accessing or modifying critical files" + }, + { + "name": "auditd:SYSCALL", + "channel": "ptrace, ioctl" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "API tracing / stack tracing via ETW or telemetry-based EDR" + }, + { + "name": "EDR:memory", + "channel": "Behavioral API telemetry (GetProcAddress, LoadLibrary, VirtualAlloc)" + }, + { + "name": "networkdevice:syslog", + "channel": "aaa privilege_exec" + }, + { + "name": "macos:unifiedlog", + "channel": "None" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "APCQueueOperations" + }, + { + "name": "macos:unifiedlog", + "channel": "Invocation of SMLoginItemSetEnabled by non-system or recently installed application" + }, + { + "name": "macos:unifiedlog", + "channel": "flock|NSDistributedLock|FileHandle.*lockForWriting" + }, + { + "name": "etw:Microsoft-Windows-Directory-Services-SAM", + "channel": "api_call: Calls to DsAddSidHistory or related RPC operations" + }, + { + "name": "macos:unifiedlog", + "channel": "application logs referencing NSTimer, sleep, or launchd delays" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "High-frequency or suspicious sequence of QueryPerformanceCounter/GetTickCount API calls from a non-standard process lineage" + }, + { + "name": "auditd:SYSCALL", + "channel": "Rules capturing clock_gettime, time, gettimeofday syscalls when enabled" + }, + { + "name": "networkdevice:syslog", + "channel": "Unexpected reload, crashinfo, or boot message not tied to scheduled maintenance" + }, + { + "name": "etw:Microsoft-Windows-RPC", + "channel": "rpc_call: srvsvc.NetShareEnum / NetShareEnumAll from non-admin or unusual processes" + }, + { + "name": "NSM:Flow", + "channel": "smb_command: TreeConnectAndX to \\\\*\\IPC$ / srvsvc or Trans2/NT_CREATE for listing shares" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "name": "EDR:memory", + "channel": "API usage MFCreateDeviceSource, IAMStreamConfig, ICaptureGraphBuilder2, DirectShow filter graph creation from uncommon callers" + }, + { + "name": "auditd:SYSCALL", + "channel": "openat/read/ioctl: openat/read/ioctl on /dev/video* by uncommon user/process" + }, + { + "name": "macos:unifiedlog", + "channel": "Access decisions to kTCCServiceCamera for unexpected binaries" + }, + { + "name": "EDR:memory", + "channel": "Objective\u2011C/Swift calls to AVCaptureDevice/AVCaptureSession by non-whitelisted processes" + }, + { + "name": "auditd:SYSCALL", + "channel": "mmap, ptrace, process_vm_writev or direct memory ops" + }, + { + "name": "WinEventLog:Application", + "channel": "API call to AddMonitor invoked by non-installer process" + }, + { + "name": "etw:Microsoft-Windows-Win32k", + "channel": "SetWindowLong, SetClassLong, NtUserMessageCall, SendNotifyMessage, PostMessage" + }, + { + "name": "auditd:SYSCALL", + "channel": "unshare, mount, keyctl, setns syscalls executed by containerized processes" + }, + { + "name": "macos:unifiedlog", + "channel": "audio APIs" + }, + { + "name": "WinEventLog:Microsoft-Windows-COM/Operational", + "channel": "CLSID activation events where ProcessName=mmc.exe and CLSID not in allowed baseline" + }, + { + "name": "macos:unifiedlog", + "channel": "com.apple.securityd, com.apple.tccd" + }, + { + "name": "auditd:SYSCALL", + "channel": "send, recv, write: Abnormal interception or alteration of transmitted data" + }, + { + "name": "macos:osquery", + "channel": "CALCULATE: Integrity validation of transmitted data via hash checks" + }, + { + "name": "ETW:Token", + "channel": "token_analysis: API calls such as DuplicateTokenEx or ImpersonateLoggedOnUser" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "API Calls" + }, + { + "name": "etw:Microsoft-Windows-DotNETRuntime", + "channel": "AssemblyLoad/ModuleLoad (Loader keyword) from Microsoft-Windows-DotNETRuntime" + }, + { + "name": "EDR:memory", + "channel": "VirtualAlloc/VirtualProtect/MapViewOfFile indicators via stack/heap activity and ImageLoad" + }, + { + "name": "auditd:MMAP", + "channel": "memory region with RWX permissions allocated" + }, + { + "name": "snmp:trap", + "channel": "management queries" + }, + { + "name": "AWS:CloudTrail", + "channel": "Describe* or List* API calls" + }, + { + "name": "etw:Microsoft-Windows-Win32k", + "channel": "SendMessage, PostMessage, LVM_*" + }, + { + "name": "auditd:SYSCALL", + "channel": "sudo or pkexec invocation" + }, + { + "name": "macos:unifiedlog", + "channel": "authorization execute privilege requests" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "NtQueryInformationProcess" + }, + { + "name": "macos:unifiedlog", + "channel": "ptrace: Processes invoking ptrace with PTRACE_TRACEME flag" + }, + { + "name": "esxi:hostd", + "channel": "Remote access API calls and file uploads" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "NtUnmapViewOfSection, VirtualAllocEx, WriteProcessMemory, SetThreadContext, ResumeThread" + }, + { + "name": "linux:syslog", + "channel": "Execution of modified binaries or abnormal library load sequences" + }, + { + "name": "macos:unifiedlog", + "channel": "Calls to AuthorizationExecuteWithPrivileges() observed via Apple System Logger or security_auditing tools" + }, + { + "name": "macos:unifiedlog", + "channel": "access or unlock attempt to keychain database" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of input detection APIs (e.g., CGEventSourceKeyState)" + }, + { + "name": "auditd:SYSCALL", + "channel": "mount system call with bind or remap flags" + }, + { + "name": "AWS:CloudTrail", + "channel": "Decrypt" + }, + { + "name": "etw:Microsoft-Windows-Kernel-File", + "channel": "ZwSetEaFile or ZwQueryEaFile function calls" + }, + { + "name": "auditd:SYSCALL", + "channel": "fork/clone/daemon syscall tracing" + }, + { + "name": "fs:fsusage", + "channel": "Detached process execution with no associated parent" + }, + { + "name": "auditd:SYSCALL", + "channel": "ptrace, mmap, mprotect, open, dlopen" + }, + { + "name": "ETW:ProcThread", + "channel": "api_call: CreateProcessWithTokenW, CreateProcessAsUserW" + }, + { + "name": "EDR:memory", + "channel": "MemoryWriteToExecutable" + }, + { + "name": "ETW:Token", + "channel": "api_call: DuplicateTokenEx, ImpersonateLoggedOnUser, SetThreadToken" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "api_call: UpdateProcThreadAttribute (PROC_THREAD_ATTRIBUTE_PARENT_PROCESS) and CreateProcess* with EXTENDED_STARTUPINFO_PRESENT / StartupInfoEx" + }, + { + "name": "etw:Microsoft-Windows-Security-Auditing", + "channel": "api_call: LogonUser(A|W), LsaLogonUser, SetThreadToken, ImpersonateLoggedOnUser" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "API calls" + }, + { + "name": "auditd:SYSCALL", + "channel": "ptrace, mmap, process_vm_writev" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of dd or sed targeting /proc/*/mem" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "CreateTransaction, CreateFileTransacted, RollbackTransaction, NtCreateProcessEx, NtCreateThreadEx" + }, + { + "name": "ETW", + "channel": "Calls to GetUserDefaultUILanguage, GetSystemDefaultUILanguage, GetKeyboardLayoutList" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "WriteProcessMemory: WriteProcessMemory targeting regions containing KernelCallbackTable addresses" + }, + { + "name": "EDR:file", + "channel": "SetFileTime" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "mobile-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:36.999000+00:00\"}, \"root['description']\": {\"new_value\": \"Calls made by a process to operating system-provided Application Programming Interfaces (APIs). These calls are essential for interacting with system resources such as memory, files, and hardware, or for performing system-level tasks. Monitoring these calls can provide insight into a process's intent, especially if the process is malicious.\", \"old_value\": \"Calls made by a process to operating system-provided Application Programming Interfaces (APIs). These calls are essential for interacting with system resources such as memory, files, and hardware, or for performing system-level tasks. Monitoring these calls can provide insight into a process's intent, especially if the process is malicious.\\n\\n*Data Collection Measures:*\\n\\n- Endpoint Detection and Response (EDR) Tools:\\n - Leverage tools to monitor API execution behaviors at the process level.\\n - Example: Sysmon Event ID 10 captures API call traces for process access and memory allocation.\\n- Process Monitor (ProcMon):\\n - Use ProcMon to collect detailed logs of process and API activity. ProcMon can provide granular details on API usage and identify malicious behavior during analysis.\\n- Windows Event Logs:\\n - Use Event IDs from Windows logs for specific API-related activities:\\n - Event ID 4688: A new process has been created (can indirectly infer API use).\\n - Event ID 4657: A registry value has been modified (to monitor registry-altering APIs).\\n- Dynamic Analysis Tools:\\n - Tools like Cuckoo Sandbox, Flare VM, or Hybrid Analysis monitor API execution during malware detonation.\\n- Host-Based Logs:\\n - On Linux/macOS systems, leverage audit frameworks (e.g., `auditd`, `strace`) to capture and analyze system call usage that APIs map to.\\n- Runtime Monitors:\\n - Runtime security tools like Falco can monitor system-level calls for API execution.\\n- Debugging and Tracing:\\n - Use debugging tools like gdb (Linux) or WinDbg (Windows) for deep tracing of API executions in real time.\", \"diff\": \"--- \\n+++ \\n@@ -1,21 +1 @@\\n Calls made by a process to operating system-provided Application Programming Interfaces (APIs). These calls are essential for interacting with system resources such as memory, files, and hardware, or for performing system-level tasks. Monitoring these calls can provide insight into a process's intent, especially if the process is malicious.\\n-\\n-*Data Collection Measures:*\\n-\\n-- Endpoint Detection and Response (EDR) Tools:\\n- - Leverage tools to monitor API execution behaviors at the process level.\\n- - Example: Sysmon Event ID 10 captures API call traces for process access and memory allocation.\\n-- Process Monitor (ProcMon):\\n- - Use ProcMon to collect detailed logs of process and API activity. ProcMon can provide granular details on API usage and identify malicious behavior during analysis.\\n-- Windows Event Logs:\\n- - Use Event IDs from Windows logs for specific API-related activities:\\n- - Event ID 4688: A new process has been created (can indirectly infer API use).\\n- - Event ID 4657: A registry value has been modified (to monitor registry-altering APIs).\\n-- Dynamic Analysis Tools:\\n- - Tools like Cuckoo Sandbox, Flare VM, or Hybrid Analysis monitor API execution during malware detonation.\\n-- Host-Based Logs:\\n- - On Linux/macOS systems, leverage audit frameworks (e.g., `auditd`, `strace`) to capture and analyze system call usage that APIs map to.\\n-- Runtime Monitors:\\n- - Runtime security tools like Falco can monitor system-level calls for API execution.\\n-- Debugging and Tracing:\\n- - Use debugging tools like gdb (Linux) or WinDbg (Windows) for deep tracing of API executions in real time.\"}, \"root['x_mitre_log_sources'][19]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4656\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Calls made by a process to operating system-provided Applicat1Calls made by a process to operating system-provided Applica
>tion Programming Interfaces (APIs). These calls are essentia>tion Programming Interfaces (APIs). These calls are essentia
>l for interacting with system resources such as memory, file>l for interacting with system resources such as memory, file
>s, and hardware, or for performing system-level tasks. Monit>s, and hardware, or for performing system-level tasks. Monit
>oring these calls can provide insight into a process's inten>oring these calls can provide insight into a process's inten
>t, especially if the process is malicious.  *Data Collection>t, especially if the process is malicious.
> Measures:*  - Endpoint Detection and Response (EDR) Tools:  
>    - Leverage tools to monitor API execution behaviors at t 
>he process level.     - Example: Sysmon Event ID 10 captures 
> API call traces for process access and memory allocation. - 
> Process Monitor (ProcMon):     - Use ProcMon to collect det 
>ailed logs of process and API activity. ProcMon can provide  
>granular details on API usage and identify malicious behavio 
>r during analysis. - Windows Event Logs:     - Use Event IDs 
> from Windows logs for specific API-related activities:      
>    - Event ID 4688: A new process has been created (can ind 
>irectly infer API use).         - Event ID 4657: A registry  
>value has been modified (to monitor registry-altering APIs). 
> - Dynamic Analysis Tools:     - Tools like Cuckoo Sandbox,  
>Flare VM, or Hybrid Analysis monitor API execution during ma 
>lware detonation. - Host-Based Logs:     - On Linux/macOS sy 
>stems, leverage audit frameworks (e.g., `auditd`, `strace`)  
>to capture and analyze system call usage that APIs map to. - 
> Runtime Monitors:     - Runtime security tools like Falco c 
>an monitor system-level calls for API execution. - Debugging 
> and Tracing:     - Use debugging tools like gdb (Linux) or  
>WinDbg (Windows) for deep tracing of API executions in real  
>time. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.272000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0032", + "external_id": "DC0032" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Process Creation", + "description": "Refers to the event in which a new process (executable) is initialized by an operating system. This can involve parent-child process relationships, process arguments, and environmental variables. Monitoring process creation is crucial for detecting malicious behaviors, such as execution of unauthorized binaries, scripting abuse, or privilege escalation attempts.. ", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Process", + "channel": "None" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream 'eventMessage contains pubsub or broker'" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "name": "linux:osquery", + "channel": "Execution of binary resolved from $PATH not located in /usr/bin or /bin" + }, + { + "name": "macos:unifiedlog", + "channel": "Process execution path inconsistent with baseline PATH directories" + }, + { + "name": "macos:endpointsecurity", + "channel": "ES_EVENT_TYPE_NOTIFY_EXEC" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "name": "linux:osquery", + "channel": "process_events" + }, + { + "name": "macos:endpointsecurity", + "channel": "exec" + }, + { + "name": "macos:osquery", + "channel": "processes" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of launchctl with suspicious arguments" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve network tools" + }, + { + "name": "macos:osquery", + "channel": "process_events" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve calls to soffice.bin with suspicious macro execution flags" + }, + { + "name": "macos:unifiedlog", + "channel": "Process execution of Microsoft Word, Excel, PowerPoint with macro execution attempts" + }, + { + "name": "macos:osquery", + "channel": "process reading browser configuration paths" + }, + { + "name": "macos:unifiedlog", + "channel": "exec logs" + }, + { + "name": "auditd:EXECVE", + "channel": "execve: Processes launched with LD_PRELOAD/LD_LIBRARY_PATH pointing to non-system dirs" + }, + { + "name": "macos:endpointsecurity", + "channel": "exec: Process execution context for loaders calling dlopen/dlsym" + }, + { + "name": "auditd:EXECVE", + "channel": "EXECVE" + }, + { + "name": "auditd:EXECVE", + "channel": "execution of unexpected binaries during user shell startup" + }, + { + "name": "macos:unifiedlog", + "channel": "launch of Terminal.app or shell with non-standard environment setup" + }, + { + "name": "macos:endpointsecurity", + "channel": "ES_EVENT_TYPE_NOTIFY_EXEC with unusual parent-child process relationships from zsh" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of systemctl or service stop" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of launchctl or pkill" + }, + { + "name": "macos:unifiedlog", + "channel": "process::exec" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of klist, kinit, or tools interacting with ccache outside normal user context" + }, + { + "name": "macos:osquery", + "channel": "Execution of non-standard binaries accessing Kerberos APIs" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Electron-based binary spawning shell or script interpreter" + }, + { + "name": "macos:unifiedlog", + "channel": "Electron app spawning unexpected child process" + }, + { + "name": "esxi:shell", + "channel": "/root/.ash_history or /etc/init.d/*" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve calls with high-frequency or known bandwidth-intensive tools" + }, + { + "name": "macos:unifiedlog", + "channel": "exec or spawn calls to proxy tools or torrent clients" + }, + { + "name": "containers:osquery", + "channel": "bandwidth-intensive command execution from within a container namespace" + }, + { + "name": "macos:unifiedlog", + "channel": "process launch" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream --info --predicate 'subsystem == \"com.apple.cfprefsd\"'" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of security, sqlite3, or unauthorized binaries" + }, + { + "name": "macos:unifiedlog", + "channel": "Unexpected applications generating outbound DNS queries" + }, + { + "name": "linux:Sysmon", + "channel": "EventCode=1" + }, + { + "name": "macos:osquery", + "channel": "execve" + }, + { + "name": "macos:unifiedlog", + "channel": "Unexpected child process of Safari or Chrome" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve or syscall invoking vm artifact check commands (e.g., dmidecode, lspci, dmesg)" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of system_profiler, ioreg, kextstat with argument patterns related to VM/sandbox checks" + }, + { + "name": "macos:unifiedlog", + "channel": "process writes or modifies files in excluded paths" + }, + { + "name": "macos:unifiedlog", + "channel": "process" + }, + { + "name": "macos:unifiedlog", + "channel": "com.apple.mail.* exec.*" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of memory inspection tools (lldb, gdb, osqueryi)" + }, + { + "name": "esxi:vobd", + "channel": "/var/log/vobd.log" + }, + { + "name": "kubernetes:apiserver", + "channel": "kubectl exec or kubelet API calls targeting running pods" + }, + { + "name": "docker:audit", + "channel": "Process execution events within container namespace context" + }, + { + "name": "auditd:SYSCALL", + "channel": "process persists beyond parent shell termination" + }, + { + "name": "macos:unifiedlog", + "channel": "background process persists beyond user logout" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of scripts or binaries sourced from mail directories (/var/mail, ~/Maildir)" + }, + { + "name": "macos:unifiedlog", + "channel": "Preview.app, Safari.app, or Mail.app spawning new processes outside normal patterns" + }, + { + "name": "esxi:hostd", + "channel": "process execution across cloud VM" + }, + { + "name": "auditd:EXECVE", + "channel": "systemctl spawning managed processes" + }, + { + "name": "macos:unifiedlog", + "channel": "None" + }, + { + "name": "esxi:shell", + "channel": "/var/log/shell.log" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of processes linked to hijacked sessions (e.g., anomalous parent-child process lineage)" + }, + { + "name": "macos:unifiedlog", + "channel": "exec events where web process starts a shell/tooling" + }, + { + "name": "docker:events", + "channel": "Docker/Kubernetes audit of exec/attach (kubectl exec) or unexpected child processes inside container" + }, + { + "name": "macos:unifiedlog", + "channel": "exec of osascript, bash, curl with suspicious parameters" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of container management CLIs (docker, crictl, kubectl) or interpreted shells (sh, bash, python) within container context" + }, + { + "name": "macos:endpointsecurity", + "channel": "es_event_exec" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of discovery commands targeting backup binaries, processes, or config paths" + }, + { + "name": "macos:unifiedlog", + "channel": "Process execution logs showing discovery commands like mdfind, system_profiler, or launchctl list" + }, + { + "name": "macos:osquery", + "channel": "process_events OR launchd" + }, + { + "name": "auditd:EXECVE", + "channel": "execve" + }, + { + "name": "macos:osquery", + "channel": "launchd or process_events" + }, + { + "name": "macos:unifiedlog", + "channel": "process and file events via log stream" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of scripts or binaries spawned from browser processes" + }, + { + "name": "macos:unifiedlog", + "channel": "Browser processes launching unexpected interpreters (osascript, bash)" + }, + { + "name": "macos:unifiedlog", + "channel": "exec: Execution of defaults, plutil, or common editors (vim/nano) targeting plist files" + }, + { + "name": "auditd:SYSCALL", + "channel": "EXECVE" + }, + { + "name": "macos:unifiedlog", + "channel": "process:exec" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of bash, python, or perl processes spawned by browser/email client" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of osascript, bash, or Terminal initiated from Mail.app or Safari" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of /bin/sh,/bin/bash,/usr/bin/curl,/usr/bin/python by service accounts (e.g., apache, mysql, nobody) immediately after inbound network activity." + }, + { + "name": "macos:osquery", + "channel": "parent_name in ('sshd','httpd','screensharingd') spawning shells or scripting runtimes." + }, + { + "name": "macos:unifiedlog", + "channel": "process activity stream" + }, + { + "name": "auditd:SYSCALL", + "channel": "SYSCALL record where exe contains passwd/userdel/chage and auid != root" + }, + { + "name": "macos:unifiedlog", + "channel": "Post-login execution of unrecognized child process from launchd or loginwindow" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of base64|openssl|xxd|python|perl with arguments matching Base64 flags" + }, + { + "name": "macos:unifiedlog", + "channel": "process command line contains base64, -enc, openssl enc -base64" + }, + { + "name": "macos:endpointsecurity", + "channel": "exec: arguments contain Base64-like strings" + }, + { + "name": "esxi:shell", + "channel": "commands containing base64, openssl enc -base64, xxd -p" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of process launched via loginwindow session restore" + }, + { + "name": "macos:unifiedlog", + "channel": "process: exec + filewrite: ~/.ssh/authorized_keys" + }, + { + "name": "containerd:runtime", + "channel": "/var/log/containers/*.log" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of Java apps or other processes with hidden window attributes" + }, + { + "name": "macos:unifiedlog", + "channel": "Process Execution" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve on code or jetbrains-gateway with remote flags" + }, + { + "name": "macos:unifiedlog", + "channel": "process: code or jetbrains-gateway launching with --tunnel or --remote" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream --predicate 'processImagePath CONTAINS \"curl\" OR \"osascript\"'" + }, + { + "name": "auditd:EXECVE", + "channel": "Execution of dd, shred, wipe targeting block devices" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of sleep or ping command within script interpreted by bash/python" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve or socket/connect system calls from processes using crypto libraries" + }, + { + "name": "macos:unifiedlog", + "channel": "Process using AES/RC4 routines unexpectedly" + }, + { + "name": "linux:osquery", + "channel": "execution of known firewall binaries" + }, + { + "name": "auditd:SYSCALL", + "channel": "type=EXECVE or SYSCALL for /bin/date, /usr/bin/timedatectl, /sbin/hwclock, /bin/cat /etc/timezone, /bin/cat /proc/uptime" + }, + { + "name": "linux:osquery", + "channel": "execve: command like 'date', 'timedatectl', 'hwclock', 'cat /etc/timezone'" + }, + { + "name": "macos:unifiedlog", + "channel": "process exec events of systemsetup, date, ioreg with command_line parameters indicating time discovery" + }, + { + "name": "macos:endpointsecurity", + "channel": "exec: binary == \"/usr/sbin/systemsetup\" and args contains \"-gettimezone\"" + }, + { + "name": "macos:osquery", + "channel": "execve: command LIKE '%systemsetup -gettimezone%' OR '%date%'" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of osascript, curl, or unexpected automation" + }, + { + "name": "macos:unifiedlog", + "channel": "exec /usr/bin/pwpolicy" + }, + { + "name": "auditd:SYSCALL", + "channel": "socket(AF_PACKET|AF_INET, SOCK_RAW, *), setsockopt(\u2026 SO_ATTACH_FILTER|SO_ATTACH_BPF \u2026), bpf(cmd=BPF_PROG_LOAD), open/openat path=\"/dev/bpf*\" (BSD/macOS-like) or setcap cap_net_raw." + }, + { + "name": "linux:syslog", + "channel": "KERN messages about eBPF program load/verify or LSM denials related to bpf." + }, + { + "name": "OpenBSM:AuditTrail", + "channel": "open/openat of /dev/bpf*; ioctl BIOCSETF-like operations." + }, + { + "name": "macos:unifiedlog", + "channel": "Exec of tcpdump, rvictl, custom tools linked to libpcap.A.dylib; sysextd/systemextensionsctl events for NetworkExtension content filters." + }, + { + "name": "auditd:EXECVE", + "channel": "/usr/sbin/postfix, /usr/sbin/exim, /usr/sbin/sendmail" + }, + { + "name": "auditd:SYSCALL", + "channel": "execution of known flash tools (e.g., flashrom, fwupd)" + }, + { + "name": "macos:unifiedlog", + "channel": "com.apple.firmwareupdater activity or update-firmware binary invoked" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of system tools like dmidecode, lspci, lscpu, dmesg, systemd-detect-virt" + }, + { + "name": "macos:unifiedlog", + "channel": "exec or spawn of 'system_profiler', 'ioreg', 'kextstat', 'sysctl', or calls to sysctl API" + }, + { + "name": "macos:endpointSecurity", + "channel": "ES_EVENT_TYPE_NOTIFY_EXEC" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Suspicious binaries or scripts interacting with authentication binaries (sshd, gdm, login)" + }, + { + "name": "macos:osquery", + "channel": "execve: Processes unexpectedly invoking Keychain or authentication APIs" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: execve calls where a browser/webview process is parent and child is interpreter (python, sh, ruby) or downloader (curl, wget)" + }, + { + "name": "macos:unifiedlog", + "channel": "process_create: Process creation where parent is Safari/Google Chrome and child is script interpreter or signed-but-unusual helper binary" + }, + { + "name": "auditd:EXECVE", + "channel": "None" + }, + { + "name": "macos:unifiedlog", + "channel": "process:launch" + }, + { + "name": "auditd:EXECVE", + "channel": "Shell commands invoked by SQL process such as postgres, mysqld, or mariadbd" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of smbclient, smbmap, rpcclient, nmblookup, crackmapexec smb" + }, + { + "name": "macos:endpointsecurity", + "channel": "ES_EVENT_TYPE_NOTIFY_EXEC: Process execution of \"sharing -l\", \"smbutil view\", \"mount_smbfs\"" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of scp, rsync, curl with remote destination" + }, + { + "name": "macos:unifiedlog", + "channel": "logMessage contains pbpaste or osascript" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve call with argv matching known disk enumeration commands (lsblk, parted, fdisk)" + }, + { + "name": "macos:unifiedlog", + "channel": "process launch of diskutil or system_profiler with SPStorageDataType" + }, + { + "name": "esxi:hostd", + "channel": "execution of esxcli with args matching 'storage', 'filesystem', 'core device list'" + }, + { + "name": "macos:unifiedlog", + "channel": "Mail.app executing with parameters updating rules state" + }, + { + "name": "esxi:shell", + "channel": "/var/log/vmkernel.log, /var/log/vmkwarning.log" + }, + { + "name": "macos:endpointsecurity", + "channel": "exec: Exec of ffmpeg, avfoundation-based binaries, or custom signed apps accessing camera" + }, + { + "name": "kubernetes:apiserver", + "channel": "exec into pod followed by secret retrieval via API" + }, + { + "name": "macos:unifiedlog", + "channel": "process_name IN (\"VBoxManage\", \"prlctl\") AND command CONTAINS (\"list\", \"show\")" + }, + { + "name": "macos:unifiedlog", + "channel": "exec srm|exec openssl|exec gpg" + }, + { + "name": "linux:osquery", + "channel": "Process execution with LD_PRELOAD or modified library path" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of process with DYLD_INSERT_LIBRARIES set" + }, + { + "name": "linux:Sysmon", + "channel": "process creation events linked to container namespaces executing host-level binaries" + }, + { + "name": "macos:unifiedlog", + "channel": "process and signing chain events" + }, + { + "name": "macos:unifiedlog", + "channel": "launchservices events for misleading extensions" + }, + { + "name": "fs:fsusage", + "channel": "Execution of disguised binaries" + }, + { + "name": "linux:osquery", + "channel": "process listening or connecting on non-standard ports" + }, + { + "name": "macos:unifiedlog", + "channel": "launchd services binding to non-standard ports" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve, connect" + }, + { + "name": "esxi:cron", + "channel": "process or cron activity" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of binaries with unsigned or anomalously signed certificates" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve logging for /usr/bin/systemctl and systemd-run" + }, + { + "name": "macos:osquery", + "channel": "Invocation of osascript or dylib injection" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of files saved in mail or download directories" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of Terminal, osascript, or other interpreters originating from Mail or Preview" + }, + { + "name": "macos:unifiedlog", + "channel": "process events" + }, + { + "name": "linux:syslog", + "channel": "Unauthorized sudo or shell access, especially leading to file changes in /var/www or /srv/http" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of unexpected terminal or web scripts modifying /Library/WebServer/Documents" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of CLI tools like psql, mysql, mongo, sqlite3" + }, + { + "name": "macos:unifiedlog", + "channel": "Process start of Java or native DB client tools" + }, + { + "name": "macos:unifiedlog", + "channel": "loginwindow or tccd-related entries" + }, + { + "name": "macos:osquery", + "channel": "query: process_events, launchd, and tcc.db access" + }, + { + "name": "ebpf:syscalls", + "channel": "process execution or network connect from just-created container PID namespace" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of pip, npm, gem, or similar package managers" + }, + { + "name": "macos:unifiedlog", + "channel": "Command line invocation of pip3, brew install, npm install from interactive Terminal" + }, + { + "name": "auditd:SYSCALL", + "channel": "fork/exec of service via PID 1 (systemd)" + }, + { + "name": "auditd:EXECVE", + "channel": "Execution of ssh/scp/sftp without corresponding authentication log" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of ssh or sftp without corresponding login event" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: execve where exe=/usr/bin/python3 or similar interpreter" + }, + { + "name": "macos:unifiedlog", + "channel": "launch of remote desktop app or helper binary" + }, + { + "name": "macos:unifiedlog", + "channel": "Unexpected processes making network calls based on DNS-derived ports" + }, + { + "name": "macos:unifiedlog", + "channel": "launchctl spawning new processes" + }, + { + "name": "macos:unifiedlog", + "channel": "launchctl activity and process creation" + }, + { + "name": "containerd:events", + "channel": "New container with suspicious image name or high resource usage" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of Python, Swift, or other binaries invoking archiving libraries" + }, + { + "name": "linux:osquery", + "channel": "Processes linked with libssl or crypto libraries making outbound connections" + }, + { + "name": "macos:unifiedlog", + "channel": "Process invoking SSL routines from Security framework" + }, + { + "name": "auditd:SYSCALL", + "channel": "Execution of binaries located in /etc/init.d/ or systemd service paths" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of binary listed in newly modified LaunchAgent plist" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of bless or nvram modifying boot parameters" + }, + { + "name": "macos:unifiedlog", + "channel": "Unexpected processes registered with launchd" + }, + { + "name": "macos:unifiedlog", + "channel": "Process launch" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of curl, osascript, or unexpected Office processes" + }, + { + "name": "macos:osquery", + "channel": "exec" + }, + { + "name": "macos:unifiedlog", + "channel": "Trust validation failures or bypass attempts during notarization and code signing checks" + }, + { + "name": "esxi:vmkernel", + "channel": "spawned shell or execution environment activity" + }, + { + "name": "macos:unifiedlog", + "channel": "process_exec: image in {/bin/bash,/bin/zsh,/usr/bin/osascript,/usr/bin/python*,/usr/bin/curl,/usr/bin/ssh,/usr/bin/open} AND parent in {Preview, TextEdit, Microsoft Word, Microsoft Excel, AdobeReader, Archive Utility, Finder}" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: exe in {/bin/bash,/bin/sh,/usr/bin/python*,/usr/bin/perl,/usr/bin/php,/usr/bin/node,/usr/bin/curl,/usr/bin/wget,/usr/bin/xdg-open,/usr/bin/ssh,/usr/bin/rundll32 (wine)} AND ppid process is a document viewer/browser" + }, + { + "name": "auditd:EXECVE", + "channel": "Execution of dd/sgdisk with arguments writing to sector 0 or partition table" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of zip, ditto, hdiutil, or openssl by processes not normally associated with archiving" + }, + { + "name": "macos:unifiedlog", + "channel": "process execution events for chmod, chown, chflags with unusual parameters or targets" + }, + { + "name": "m365:defender", + "channel": "AdvancedHunting(DeviceEvents, ProcessCreate, ImageLoad, AMSI/ETW derived signals)" + }, + { + "name": "macos:unifiedlog", + "channel": "execve or dylib load from memory without backing file" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Commands that alter firewall or start listeners: iptables|nft|ufw|firewall-cmd|pfctl|systemctl start sshd/telnet/dropbear; raw-socket/libpcap tools (tcpdump, tshark, nmap --raw)." + }, + { + "name": "macos:unifiedlog", + "channel": "exec: Execution of pfctl, socketfilterfw, launchctl start ssh/telnet, libpcap consumers." + }, + { + "name": "esxi:shell", + "channel": "Shell Execution" + }, + { + "name": "macos:unifiedlog", + "channel": "Unusual child process tree indicating attempted recovery after crash" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of binaries/scripts presenting false health messages for security daemons" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of processes mimicking Apple Security & Privacy GUIs" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve, setifflags" + }, + { + "name": "macos:osquery", + "channel": "process_events where path like '%tcpdump%'" + }, + { + "name": "auditd:EXECVE", + "channel": "Execution of dd, shred, or wipe with arguments targeting block devices" + }, + { + "name": "auditd:EXECVE", + "channel": "systemctl stop auditd, kill -9 , or modifications to /etc/selinux/config" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of curl, git, or Office processes with network connections" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream - process subsystem" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve calls for qemu-system*, kvm, or VBoxHeadless" + }, + { + "name": "macos:unifiedlog", + "channel": "Process execution for VBoxHeadless, prl_vm_app, vmware-vmx" + }, + { + "name": "macos:unifiedlog", + "channel": "process logs" + }, + { + "name": "esxi:shell", + "channel": "None" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of interpreters (python, perl), custom binaries, or shell utilities with long arguments containing non-standard tokens" + }, + { + "name": "macos:endpointsecurity", + "channel": "ES_EVENT_TYPE_NOTIFY_EXEC: arguments contain long, non-standard tokens / custom alphabets" + }, + { + "name": "macos:unifiedlog", + "channel": "command line or log output shows non-standard encoding routines" + }, + { + "name": "esxi:shell", + "channel": "commands containing long non-standard tokens or custom lookup tables" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of /usr/sbin/installer spawning child process from within /private/tmp or package contents" + }, + { + "name": "auditd:SYSCALL", + "channel": "Execution of dpkg or rpm followed by fork/execve from within postinst, prerm, etc." + }, + { + "name": "macos:unifiedlog", + "channel": "execve: Helper tools invoked through XPC executing unexpected binaries" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of modified binary without valid signature" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: exe in (/usr/bin/bash,/usr/bin/sh,/usr/bin/zsh,/usr/bin/python*) AND cmdline matches '(curl|wget).*(\\||\\|\\s*sh|bash)|base64\\s*-d|python\\s*-c'" + }, + { + "name": "macos:unifiedlog", + "channel": "exec: ParentImage in (Terminal, iTerm2) AND Image in (/bin/zsh,/bin/bash,/usr/bin/python*) AND CommandLine matches '(curl|wget).*(\\||\\|\\s*sh|bash)|base64 -D|python -c'" + }, + { + "name": "macos:unifiedlog", + "channel": "process created with repeated ICMP or UDP flood behavior" + }, + { + "name": "fs:fsusage", + "channel": "binary execution of security_authtrampoline" + }, + { + "name": "macos:unifiedlog", + "channel": "process: exec" + }, + { + "name": "esxi:vmkernel", + "channel": "Exec" + }, + { + "name": "macos:unifiedlog", + "channel": "Child processes of Safari, Chrome, or Firefox executing scripting interpreters" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of older or non-standard interpreters" + }, + { + "name": "linux:osquery", + "channel": "process execution events for permission modification utilities with command-line analysis" + }, + { + "name": "macos:unifiedlog", + "channel": "process execution events for chmod, chown, chflags with parameter analysis and target path examination" + }, + { + "name": "macos:osquery", + "channel": "process execution monitoring for permission modification utilities with command-line argument analysis" + }, + { + "name": "auditd:SYSCALL", + "channel": "Invocation of packet generation tools (e.g., hping3, nping) or fork bombs" + }, + { + "name": "macos:osquery", + "channel": "Execution of flooding tools or compiled packet generators" + }, + { + "name": "esxi:hostd", + "channel": "process" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve for proxy tools" + }, + { + "name": "macos:unifiedlog", + "channel": "process, socket, and DNS logs" + }, + { + "name": "macos:osquery", + "channel": "process_events table" + }, + { + "name": "macos:unifiedlog", + "channel": "Command line containing `trap` or `echo 'trap` written to login shell files" + }, + { + "name": "macos:unifiedlog", + "channel": "log collect --predicate" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve or nanosleep with no stdout/stderr I/O" + }, + { + "name": "macos:unifiedlog", + "channel": "launchd or osascript spawns process with delay command" + }, + { + "name": "linux:syslog", + "channel": "systemd-udevd spawning user-defined action from RUN+=" + }, + { + "name": "ebpf:syscalls", + "channel": "execve" + }, + { + "name": "macos:unifiedlog", + "channel": "process:spawn" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream --predicate 'eventMessage contains \"exec\"'" + }, + { + "name": "auditd:EXECVE", + "channel": "cat|less|grep accessing .bash_history from a non-shell process" + }, + { + "name": "auditd:EXECVE", + "channel": "Process execution via .desktop Exec path from /etc/xdg/autostart or ~/.config/autostart" + }, + { + "name": "auditd:SYSCALL", + "channel": "Execution of dpkg, rpm, or other package manager with list flag" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of system_profiler or osascript invoking enumeration" + }, + { + "name": "auditd:SYSCALL", + "channel": "apache2 or nginx spawning sh, bash, or python interpreter" + }, + { + "name": "macos:unifiedlog", + "channel": "httpd spawning bash, zsh, python, or osascript" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of /usr/libexec/security_authtrampoline or child processes originating from non-trusted binaries triggering credential prompts" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of security or osascript" + }, + { + "name": "macos:unifiedlog", + "channel": "launchd spawning processes tied to new or modified LaunchDaemon .plist entries" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of ping, nping, or crafted network packets via bash or python to reflection services" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of commands modifying iptables/nftables to block selective IPs" + }, + { + "name": "macos:unifiedlog", + "channel": "System process modifications altering DNS/proxy settings" + }, + { + "name": "containerd:Events", + "channel": "unusual process spawned from container image context" + }, + { + "name": "macos:osquery", + "channel": "curl, python scripts, rsync with internal share URLs" + }, + { + "name": "macos:unifiedlog", + "channel": "process: spawn, exec" + }, + { + "name": "macos:osquery", + "channel": "Rapid spawning of resource-heavy applications (e.g., Preview, Safari, Office)" + }, + { + "name": "macos:unifiedlog", + "channel": "Process creation events where command line = pmset with arguments affecting sleep, hibernatemode, displaysleep" + }, + { + "name": "macos:unifiedlog", + "channel": "Unexpected apps performing repeated DNS lookups" + }, + { + "name": "macos:unifiedlog", + "channel": "launchservices or loginwindow events" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve with LD_PRELOAD or linker-related environment variables set" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of process with DYLD_INSERT_LIBRARIES set" + }, + { + "name": "macos:unifiedlog", + "channel": "Suspicious Swift/Objective-C or scripting processes writing archive-like outputs" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of re-parented process" + }, + { + "name": "linux:osquery", + "channel": "Anomalous parent PID change" + }, + { + "name": "macos:unifiedlog", + "channel": "Process creation with parent PID of 1 (launchd)" + }, + { + "name": "linux:osquery", + "channel": "child process invoking dynamic linker post-ptrace" + }, + { + "name": "macos:osquery", + "channel": "Processes executing kextload, spctl, or modifying kernel extension directories" + }, + { + "name": "macos:osquery", + "channel": "Unsigned or ad-hoc signed process executions in user contexts" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of diskutil or hdiutil attaching hidden partitions" + }, + { + "name": "macos:unifiedlog", + "channel": "process execution events for discovery utilities (system_profiler, sw_vers, dscl, networksetup) with command-line parameter analysis" + }, + { + "name": "macos:osquery", + "channel": "process event monitoring with focus on discovery utilities and cryptographic framework usage correlation" + }, + { + "name": "macos:unifiedlog", + "channel": "Unexpected apps generating frequent DNS queries" + }, + { + "name": "macos:unifiedlog", + "channel": "process exec" + }, + { + "name": "auditd:SYSCALL", + "channel": "socket: Suspicious creation of AF_UNIX sockets outside expected daemons" + }, + { + "name": "macos:unifiedlog", + "channel": "Non-standard processes invoking financial applications or payment APIs" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Agent/headless flags (listen/connect/reverse/tunnel) or remote-control binaries spawning shells" + }, + { + "name": "auditd:SYSCALL", + "channel": "systemctl enable/start: Creation/enablement of custom .service units in /etc/systemd/system" + }, + { + "name": "macos:unifiedlog", + "channel": "Process exec of remote-control apps or binaries with headless/connect flags" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: systemctl stop, service stop, or kill -9 on security daemons (e.g., falcon-sensor, auditd)" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of launchctl unload, kill, or removal of security agent daemons" + }, + { + "name": "macos:unifiedlog", + "channel": "process activity, exec events" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream process subsystem" + }, + { + "name": "macos:unifiedlog", + "channel": "process:exec and kext load events" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream --info --predicate 'eventMessage CONTAINS \"exec\"'" + }, + { + "name": "WinEventLog:Microsoft-Windows-DotNETRuntime", + "channel": "Unexpected AppDomain creation events or anomalous AppDomainManager assembly load behavior" + }, + { + "name": "auditd:SYSCALL", + "channel": "Execution of network stress tools or anomalies in socket/syscall behavior" + }, + { + "name": "macos:unifiedlog", + "channel": "Unsigned binary execution following SIP change" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Commands altering firewall or enabling listeners (iptables, nft, ufw, firewall-cmd, systemctl start *ssh*/*telnet*, ip route add, tcpdump, tshark)" + }, + { + "name": "macos:unifiedlog", + "channel": "exec: Execution of /sbin/pfctl, /usr/libexec/ApplicationFirewall/socketfilterfw, ifconfig, tcpdump, npcap/libpcap consumers" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of zip, ditto, hdiutil, or openssl by non-terminal parent processes" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of binaries with TCC protected access under unexpected parent processes such as Finder.app, SystemUIServer, or nsurlsessiond" + }, + { + "name": "WinEventLog:AppLocker", + "channel": "EventCode=8003, 8004" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve, unlink" + }, + { + "name": "macos:osquery", + "channel": "launchd, processes" + }, + { + "name": "linux:osquery", + "channel": "socat, ssh, or nc processes opening unexpected ports" + }, + { + "name": "macos:unifiedlog", + "channel": "process execution of ssh with -L/-R forwarding flags" + }, + { + "name": "macos:unifiedlog", + "channel": "launchd or cron spawning mining binaries" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve or socket/connect system calls for processes using RSA handshake" + }, + { + "name": "macos:unifiedlog", + "channel": "Process invoking SecKeyCreateRandomKey or asymmetric crypto APIs" + }, + { + "name": "azure:vmguest", + "channel": "Unexpected execution of cloud agent processes (e.g., WindowsAzureGuestAgent.exe, ssm-agent) followed by arbitrary script or binary execution" + }, + { + "name": "macos:unifiedlog", + "channel": "Script interpreter invoked by nginx/apache worker process" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of Office binaries with network activity" + }, + { + "name": "macos:unifiedlog", + "channel": "launch of bash/zsh/python/osascript targeting key file locations" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of /sbin/emond with child processes launched" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "provider: ETW CreateProcess events linking msbuild.exe to suspicious children where standard logs are incomplete" + }, + { + "name": "macos:unifiedlog", + "channel": "shutdown -h now or reboot" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of Code.app, idea, JetBrainsToolbox, eclipse with install/extension flags" + }, + { + "name": "macos:unifiedlog", + "channel": "process execution events for system discovery utilities (system_profiler, sysctl, networksetup, ioreg) with parameter analysis" + }, + { + "name": "OpenBSM:AuditTrail", + "channel": "BSM audit events for process execution and system call monitoring during reconnaissance" + }, + { + "name": "esxi:hostd", + "channel": "host daemon events related to VM operations and configuration queries during reconnaissance" + }, + { + "name": "esxi:vmkernel", + "channel": "VMware kernel events for hardware and system configuration access during environmental validation" + }, + { + "name": "linux:osquery", + "channel": "processes modifying environment variables related to history logging" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: parent process is usb/hid device handler, child process bash/python invoked" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of curl, rclone, or Office apps invoking network sessions" + }, + { + "name": "macos:unifiedlog", + "channel": "exec: Execution of kextstat, kextfind, or ioreg targeting driver information" + }, + { + "name": "macos:endpointsecurity", + "channel": "exec events" + }, + { + "name": "macos:unifiedlog", + "channel": "Process creation involving binaries interacting with resource fork data" + }, + { + "name": "macos:unifiedlog", + "channel": "process event" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of suspicious exploit binaries targeting security daemons" + }, + { + "name": "macos:osquery", + "channel": "execve: Unsigned or unnotarized processes launched with high privileges" + }, + { + "name": "macos:unifiedlog", + "channel": "security OR injection attempts into 1Password OR LastPass" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_data_source_ref": "", + "x_mitre_domains": [ + "ics-attack", + "mobile-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 19:28:39.339000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/datacomponents/DC0032\", \"old_value\": \"https://attack.mitre.org/data-components/DC0032\"}, \"root['description']\": {\"new_value\": \"Refers to the event in which a new process (executable) is initialized by an operating system. This can involve parent-child process relationships, process arguments, and environmental variables. Monitoring process creation is crucial for detecting malicious behaviors, such as execution of unauthorized binaries, scripting abuse, or privilege escalation attempts.. \", \"old_value\": \"Refers to the event in which a new process (executable) is initialized by an operating system. This can involve parent-child process relationships, process arguments, and environmental variables. Monitoring process creation is crucial for detecting malicious behaviors, such as execution of unauthorized binaries, scripting abuse, or privilege escalation attempts.\\n\\n*Data Collection Measures:*\\n\\n- Endpoint Detection and Response (EDR) Tools:\\n - EDRs provide process telemetry, tracking execution flows and arguments.\\n- Windows Event Logs:\\n - Event ID 4688 (Audit Process Creation): Captures process creation with associated parent process.\\n- Sysmon (Windows):\\n - Event ID 1 (Process Creation): Provides detailed logging\\n- Linux/macOS Monitoring:\\n - AuditD (execve syscall): Logs process creation.\\n - eBPF/XDP: Used for low-level monitoring of system calls related to process execution.\\n - OSQuery: Allows SQL-like queries to track process events (process_events table).\\n - Apple Endpoint Security Framework (ESF): Monitors process creation on macOS.\\n- Network-Based Monitoring:\\n - Zeek (Bro) Logs: Captures network-based process execution related to remote shells.\\n - Syslog/OSSEC: Tracks execution of processes on distributed systems.\\n- Behavioral SIEM Rules:\\n - Monitor process creation for uncommon binaries in user directories.\\n - Detect processes with suspicious command-line arguments. \", \"diff\": \"--- \\n+++ \\n@@ -1,21 +1 @@\\n-Refers to the event in which a new process (executable) is initialized by an operating system. This can involve parent-child process relationships, process arguments, and environmental variables. Monitoring process creation is crucial for detecting malicious behaviors, such as execution of unauthorized binaries, scripting abuse, or privilege escalation attempts.\\n-\\n-*Data Collection Measures:*\\n-\\n-- Endpoint Detection and Response (EDR) Tools:\\n- - EDRs provide process telemetry, tracking execution flows and arguments.\\n-- Windows Event Logs:\\n- - Event ID 4688 (Audit Process Creation): Captures process creation with associated parent process.\\n-- Sysmon (Windows):\\n- - Event ID 1 (Process Creation): Provides detailed logging\\n-- Linux/macOS Monitoring:\\n- - AuditD (execve syscall): Logs process creation.\\n- - eBPF/XDP: Used for low-level monitoring of system calls related to process execution.\\n- - OSQuery: Allows SQL-like queries to track process events (process_events table).\\n- - Apple Endpoint Security Framework (ESF): Monitors process creation on macOS.\\n-- Network-Based Monitoring:\\n- - Zeek (Bro) Logs: Captures network-based process execution related to remote shells.\\n- - Syslog/OSSEC: Tracks execution of processes on distributed systems.\\n-- Behavioral SIEM Rules:\\n- - Monitor process creation for uncommon binaries in user directories.\\n- - Detect processes with suspicious command-line arguments. \\n+Refers to the event in which a new process (executable) is initialized by an operating system. This can involve parent-child process relationships, process arguments, and environmental variables. Monitoring process creation is crucial for detecting malicious behaviors, such as execution of unauthorized binaries, scripting abuse, or privilege escalation attempts.. \"}, \"root['x_mitre_log_sources'][293]['channel']\": {\"new_value\": \"EventCode=8003, 8004\", \"old_value\": \"EventCode=8003,8004\", \"new_path\": \"root['x_mitre_log_sources'][290]['channel']\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][140]\": {\"name\": \"WinEventlog:Security\", \"channel\": \"EventCode=4688\"}, \"root['x_mitre_log_sources'][197]\": {\"name\": \"WinEventLog:Microsoft-Windows-Security-Auditing\", \"channel\": \"EventCode=4688\"}, \"root['x_mitre_log_sources'][249]\": {\"name\": \"WinEventLog:security\", \"channel\": \"EventCode=4688\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Refers to the event in which a new process (executable) is it1Refers to the event in which a new process (executable) is i
>nitialized by an operating system. This can involve parent-c>nitialized by an operating system. This can involve parent-c
>hild process relationships, process arguments, and environme>hild process relationships, process arguments, and environme
>ntal variables. Monitoring process creation is crucial for d>ntal variables. Monitoring process creation is crucial for d
>etecting malicious behaviors, such as execution of unauthori>etecting malicious behaviors, such as execution of unauthori
>zed binaries, scripting abuse, or privilege escalation attem>zed binaries, scripting abuse, or privilege escalation attem
>pts.  *Data Collection Measures:*  - Endpoint Detection and >pts.. 
>Response (EDR) Tools:     - EDRs provide process telemetry,  
>tracking execution flows and arguments. - Windows Event Logs 
>:     - Event ID 4688 (Audit Process Creation): Captures pro 
>cess creation with associated parent process. - Sysmon (Wind 
>ows):     - Event ID 1 (Process Creation): Provides detailed 
> logging - Linux/macOS Monitoring:     - AuditD (execve sysc 
>all): Logs process creation.     - eBPF/XDP: Used for low-le 
>vel monitoring of system calls related to process execution. 
>     - OSQuery: Allows SQL-like queries to track process eve 
>nts (process_events table).     - Apple Endpoint Security Fr 
>amework (ESF): Monitors process creation on macOS. - Network 
>-Based Monitoring:     - Zeek (Bro) Logs: Captures network-b 
>ased process execution related to remote shells.     - Syslo 
>g/OSSEC: Tracks execution of processes on distributed system 
>s. - Behavioral SIEM Rules:     - Monitor process creation f 
>or uncommon binaries in user directories.     - Detect proce 
>sses with suspicious command-line arguments.  
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--ee575f4a-2d4f-48f6-b18b-89067760adc1", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.272000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0034", + "external_id": "DC0034" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Process Metadata", + "description": "Contextual data about a running process, which may include information such as environment variables, image name, user/owner, etc.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Process", + "channel": "None" + }, + { + "name": "macos:unifiedlog", + "channel": "subsystem=com.apple.process" + }, + { + "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational", + "channel": "CodeIntegrity/WDAC events indicating unsigned/invalid DLL loads" + }, + { + "name": "linux:syslog", + "channel": "sudo or service accounts invoking loaders with suspicious env vars" + }, + { + "name": "macos:osquery", + "channel": "Process Context" + }, + { + "name": "esxi:auth", + "channel": "user session" + }, + { + "name": "networkdevice:syslog", + "channel": "Admin activity" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve call for sudo where euid != uid" + }, + { + "name": "macos:unifiedlog", + "channel": "subsystem=com.apple.TCC" + }, + { + "name": "macos:unifiedlog", + "channel": "exec of binary with setuid/setgid and EUID != UID" + }, + { + "name": "macos:unifiedlog", + "channel": "process" + }, + { + "name": "auditd:SYSCALL", + "channel": "Use of fork/exec with DISPLAY unset or redirected" + }, + { + "name": "EDR:Telemetry", + "channel": "Process lineage and API usage enrichment (GetSystemTime, GetTimeZoneInformation, NtQuerySystemTime)" + }, + { + "name": "esxi:hostd", + "channel": "/var/log/hostd.log API calls reading/altering time/ntp settings" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve, prctl, or ptrace activity affecting process memory or command-line arguments" + }, + { + "name": "linux:osquery", + "channel": "Cross-reference argv[0] with actual executable path and parent process metadata" + }, + { + "name": "WinEventLog:AppLocker", + "channel": "AppLocker audit/blocks showing developer utilities executing scripts/binaries outside policy" + }, + { + "name": "EDR:hunting", + "channel": "Correlation of signer info, parent-child lineage, rare invocation context (user host role), and API surfaces (CreateProcess*, LoadLibrary*)" + }, + { + "name": "WinEventLog:Microsoft-Windows-Security-Mitigations/KernelMode", + "channel": "ETW telemetry indicating ClickOnce deployment (dfsvc.exe) launching payloads" + }, + { + "name": "etw:Microsoft-Windows-ClickOnce", + "channel": "provider: Event Tracing for Windows (ETW) events associated with ClickOnce deployment (dfsvc.exe activity)" + }, + { + "name": "WinEventLog:Microsoft-Windows-Windows Camera Frame Server/Operational", + "channel": "Process session start/stop events for camera pipeline by unexpected executables" + }, + { + "name": "linux:osquery", + "channel": "select: path LIKE '/dev/video%'" + }, + { + "name": "linux:osquery", + "channel": "state=attached/debugged" + }, + { + "name": "macos:unifiedlog", + "channel": "Code Execution & Entitlement Access" + }, + { + "name": "macos:unifiedlog", + "channel": "Process opening SSH_AUTH_SOCK or /tmp/ssh-* socket not owned by same UID" + }, + { + "name": "macos:unifiedlog", + "channel": "code signature/memory protection" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve with UID \u2260 EUID" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve with escalated privileges" + }, + { + "name": "AWS:CloudTrail", + "channel": "cross-account or unexpected assume role" + }, + { + "name": "macos:unifiedlog", + "channel": "log collect from launchd and process start" + }, + { + "name": "containerd:events", + "channel": "Docker or containerd image pulls and process executions" + }, + { + "name": "linux:syslog", + "channel": "Kernel or daemon warnings of downgraded TLS or cryptographic settings" + }, + { + "name": "macos:unifiedlog", + "channel": "Modifications or writes to EFI system partition for downgraded bootloaders" + }, + { + "name": "macos:unifiedlog", + "channel": "non-shell process tree accessing bash history" + }, + { + "name": "linux:osquery", + "channel": "process metadata mismatch between /proc and runtime attributes" + }, + { + "name": "linux:osquery", + "channel": "process environment variables containing LD_PRELOAD" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "EventCode=400, 403" + }, + { + "name": "macos:osquery", + "channel": "Process Execution + Hash" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "process_start: EventHeader.ProcessId true parent vs reported PPID mismatch" + }, + { + "name": "macos:endpointsecurity", + "channel": "ES_EVENT_TYPE_NOTIFY_EXEC, ES_EVENT_TYPE_NOTIFY_MMAP" + }, + { + "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational", + "channel": "Unsigned/invalid signature modules or images loaded by msbuild.exe or its children" + }, + { + "name": "WinEventLog:Microsoft-Windows-DeviceGuard/Operational", + "channel": "WDAC policy audit/block affecting msbuild.exe spawned payloads" + }, + { + "name": "WinEventLog:Microsoft-Windows-SmartAppControl/Operational", + "channel": "Smart App Control decisions (audit/block) for msbuild.exe-launched executables" + }, + { + "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational", + "channel": "Unsigned or untrusted modules loaded during JamPlus.exe runtime" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "mobile-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:35.331000+00:00\"}, \"root['x_mitre_log_sources'][36]['channel']\": {\"new_value\": \"EventCode=400, 403\", \"old_value\": \"EventCode=400,403\"}}}", + "previous_version": "2.0" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--61f1d40e-f3d0-4cc6-aa2d-937b6204194f", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.272000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0033", + "external_id": "DC0033" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Process Termination", + "description": "The exit or termination of a running process on a system. This can occur due to normal operations, user-initiated commands, or malicious actions such as process termination by malware to disable security controls.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Process", + "channel": "None" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "EventCode=5" + }, + { + "name": "linux:syslog", + "channel": "Unexpected termination of daemons or critical services not aligned with admin change tickets" + }, + { + "name": "macos:osquery", + "channel": "process_termination: Unexpected termination of processes tied to vulnerable or high-value services" + }, + { + "name": "esxi:hostd", + "channel": "Log entries indicating VM powered off or forcibly terminated" + }, + { + "name": "macos:unifiedlog", + "channel": "Terminal process killed (killall Terminal) immediately after sudoers modification" + }, + { + "name": "auditd:SYSCALL", + "channel": "exit_group" + }, + { + "name": "macos:unifiedlog", + "channel": "process.*exit.*code" + }, + { + "name": "linux:osquery", + "channel": "unexpected termination of syslog or rsyslog processes" + }, + { + "name": "auditd:SYSCALL", + "channel": "Process segfault or abnormal termination after invoking vulnerable syscall sequence" + }, + { + "name": "auditd:SYSCALL", + "channel": "kill syscalls targeting logging/security processes" + }, + { + "name": "macos:unifiedlog", + "channel": "Termination of syspolicyd or XProtect processes" + }, + { + "name": "docker:runtime", + "channel": "Termination of monitoring sidecar or security container" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "mobile-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:36.181000+00:00\"}, \"root['description']\": {\"new_value\": \"The exit or termination of a running process on a system. This can occur due to normal operations, user-initiated commands, or malicious actions such as process termination by malware to disable security controls.\", \"old_value\": \"The exit or termination of a running process on a system. This can occur due to normal operations, user-initiated commands, or malicious actions such as process termination by malware to disable security controls.\\n\\n*Data Collection Measures:*\\n\\n- Endpoint Detection and Response (EDR) Tools:\\n - Monitor process termination events.\\n- Windows Event Logs:\\n - Event ID 4689 (Process Termination) \\u2013 Captures when a process exits, including process ID and parent process.\\n - Event ID 7036 (Service Control Manager) \\u2013 Monitors system service stops.\\n- Sysmon (Windows):\\n - Event ID 5 (Process Termination) \\u2013 Detects when a process exits, including parent-child relationships.\\n- Linux/macOS Monitoring:\\n - AuditD (`execve`, `exit_group`, `kill` syscalls) \\u2013 Captures process termination via command-line interactions.\\n - eBPF/XDP: Monitors low-level system calls related to process termination.\\n - OSQuery: The processes table can be queried for abnormal exits.\", \"diff\": \"--- \\n+++ \\n@@ -1,15 +1 @@\\n The exit or termination of a running process on a system. This can occur due to normal operations, user-initiated commands, or malicious actions such as process termination by malware to disable security controls.\\n-\\n-*Data Collection Measures:*\\n-\\n-- Endpoint Detection and Response (EDR) Tools:\\n- - Monitor process termination events.\\n-- Windows Event Logs:\\n- - Event ID 4689 (Process Termination) \\u2013 Captures when a process exits, including process ID and parent process.\\n- - Event ID 7036 (Service Control Manager) \\u2013 Monitors system service stops.\\n-- Sysmon (Windows):\\n- - Event ID 5 (Process Termination) \\u2013 Detects when a process exits, including parent-child relationships.\\n-- Linux/macOS Monitoring:\\n- - AuditD (`execve`, `exit_group`, `kill` syscalls) \\u2013 Captures process termination via command-line interactions.\\n- - eBPF/XDP: Monitors low-level system calls related to process termination.\\n- - OSQuery: The processes table can be queried for abnormal exits.\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1The exit or termination of a running process on a system. Tht1The exit or termination of a running process on a system. Th
>is can occur due to normal operations, user-initiated comman>is can occur due to normal operations, user-initiated comman
>ds, or malicious actions such as process termination by malw>ds, or malicious actions such as process termination by malw
>are to disable security controls.  *Data Collection Measures>are to disable security controls.
>:*  - Endpoint Detection and Response (EDR) Tools:     - Mon 
>itor process termination events. - Windows Event Logs:     - 
> Event ID 4689 (Process Termination) \u2013 Captures when a proce 
>ss exits, including process ID and parent process.     - Eve 
>nt ID 7036 (Service Control Manager) \u2013 Monitors system servi 
>ce stops. - Sysmon (Windows):     - Event ID 5 (Process Term 
>ination) \u2013 Detects when a process exits, including parent-ch 
>ild relationships. - Linux/macOS Monitoring:     - AuditD (` 
>execve`, `exit_group`, `kill` syscalls) \u2013 Captures process t 
>ermination via command-line interactions.     - eBPF/XDP: Mo 
>nitors low-level system calls related to process termination 
>.     - OSQuery: The processes table can be queried for abno 
>rmal exits. 
" + } + ], + "revocations": [], + "deprecations": [], + "deletions": [] + }, + "detectionstrategies": { + "additions": [], + "major_version_changes": [], + "minor_version_changes": [], + "other_version_changes": [], + "patches": [], + "revocations": [], + "deprecations": [], + "deletions": [] + }, + "analytics": { + "additions": [], + "major_version_changes": [], + "minor_version_changes": [], + "other_version_changes": [], + "patches": [], + "revocations": [], + "deprecations": [], + "deletions": [] + } + }, + "ics-attack": { + "techniques": { + "additions": [], + "major_version_changes": [], + "minor_version_changes": [], + "other_version_changes": [], + "patches": [], + "revocations": [], + "deprecations": [], + "deletions": [] + }, + "software": { + "additions": [], + "major_version_changes": [], + "minor_version_changes": [], + "other_version_changes": [], + "patches": [], + "revocations": [], + "deprecations": [], + "deletions": [] + }, + "groups": { + "additions": [], + "major_version_changes": [], + "minor_version_changes": [], + "other_version_changes": [], + "patches": [], + "revocations": [], + "deprecations": [], + "deletions": [] + }, + "campaigns": { + "additions": [], + "major_version_changes": [], + "minor_version_changes": [], + "other_version_changes": [], + "patches": [], + "revocations": [], + "deprecations": [], + "deletions": [] + }, + "assets": { + "additions": [], + "major_version_changes": [], + "minor_version_changes": [], + "other_version_changes": [], + "patches": [], + "revocations": [], + "deprecations": [], + "deletions": [] + }, + "mitigations": { + "additions": [], + "major_version_changes": [], + "minor_version_changes": [], + "other_version_changes": [], + "patches": [], + "revocations": [], + "deprecations": [], + "deletions": [] + }, + "datasources": { + "additions": [], + "major_version_changes": [], + "minor_version_changes": [], + "other_version_changes": [], + "patches": [], + "revocations": [], + "deprecations": [], + "deletions": [] + }, + "datacomponents": { + "additions": [], + "major_version_changes": [], + "minor_version_changes": [], + "other_version_changes": [], + "patches": [ + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--9c2fa0ae-7abc-485a-97f6-699e3b6cf9fa", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.272000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0038", + "external_id": "DC0038" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Application Log Content", + "description": "Application Log Content refers to logs generated by applications or services, providing a record of their activity. These logs may include metrics, errors, performance data, and operational alerts from web, mail, or other applications. These logs are vital for monitoring application behavior and detecting malicious activities or anomalies. Examples: \n\n- Web Application Logs: These logs include information about requests, responses, errors, and security events (e.g., unauthorized access attempts).\n- Email Application Logs: Logs contain metadata about emails sent, received, or blocked (e.g., sender/receiver addresses, message IDs).\n- SaaS Application Logs: Activity logs include user logins, configuration changes, and access to sensitive resources.\n- Cloud Application Logs: Logs detail control plane activities, including API calls, instance modifications, and network changes.\n- System/Application Monitoring Logs: Logs provide insights into application performance, errors, and anomalies.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Application Log", + "channel": "None" + }, + { + "name": "WinEventLog:Application", + "channel": "Outlook errors loading or processing custom form templates" + }, + { + "name": "m365:unified", + "channel": "Unusual form activity within Outlook client, including load of non-default forms" + }, + { + "name": "saas:okta", + "channel": "Conditional Access policy rule modified or MFA requirement disabled" + }, + { + "name": "ApplicationLog:EntraIDPortal", + "channel": "DeviceRegistration events" + }, + { + "name": "ApplicationLog:Intune/MDM Logs", + "channel": "Enrollment events (e.g., MDMDeviceRegistration)" + }, + { + "name": "m365:purview", + "channel": "MailItemsAccessed & Exchange Audit" + }, + { + "name": "m365:purview", + "channel": "MailItemsAccessed, Search-Mailbox events" + }, + { + "name": "WinEventLog:Application", + "channel": "Office Add-in load errors, abnormal loading context, or unsigned add-in warnings" + }, + { + "name": "m365:unified", + "channel": "SendOnBehalf, MessageSend, ClickThrough, MailItemsAccessed" + }, + { + "name": "Application:Mail", + "channel": "smtpd$.*$: .*from=[.*@internaldomain.com](mailto:.*@internaldomain.com) to=[.*@internaldomain.com](mailto:.*@internaldomain.com)" + }, + { + "name": "saas:slack", + "channel": "file_upload, message_send, message_click" + }, + { + "name": "saas:teams", + "channel": "ChatMessageSent, ChatMessageEdited, LinkClick" + }, + { + "name": "saas:gmail", + "channel": "SendEmail, OpenAttachment, ClickLink" + }, + { + "name": "m365:unified", + "channel": "SendOnBehalf, MessageSend, AttachmentPreviewed" + }, + { + "name": "WinEventLog:System", + "channel": "Changes to applicationhost.config or DLLs loaded by w3wp.exe" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=6416" + }, + { + "name": "WinEventLog:System", + "channel": "Device started/installed (UMDF) GUIDs" + }, + { + "name": "linux:syslog", + "channel": "usb * new|thunderbolt|pci .* added|block.*: new .* device" + }, + { + "name": "macos:unifiedlog", + "channel": "Device attached|enumerated VID/PID" + }, + { + "name": "m365:unified", + "channel": "Send/Receive: Emails with suspicious sender domains, spoofed headers, or anomalous attachment types" + }, + { + "name": "Application:Mail", + "channel": "Inbound messages with anomalous headers, spoofed SPF/DKIM failures" + }, + { + "name": "macos:unifiedlog", + "channel": "Inbound email activity with suspicious domains or mismatched sender information" + }, + { + "name": "m365:unified", + "channel": "FileAccessed: Access of email attachments by Office applications" + }, + { + "name": "saas:collaboration", + "channel": "MessagePosted: Suspicious links or attachment delivery via collaboration tools (Slack, Teams, Zoom)" + }, + { + "name": "ApplicationLog:IIS", + "channel": "IIS W3C logs in C:\\inetpub\\logs\\LogFiles\\W3SVC* (spikes in 5xx, RCE/SQLi/path traversal/JNDI patterns)" + }, + { + "name": "ApplicationLog:WebServer", + "channel": "/var/log/httpd/access_log, /var/log/apache2/access.log, /var/log/nginx/access.log with exploit indicators and burst errors" + }, + { + "name": "macos:unifiedlog", + "channel": "App/web server logs ingested via unified logging or filebeat (nginx/apache/node)." + }, + { + "name": "ApplicationLog:Ingress", + "channel": "Kubernetes NGINX/Envoy ingress controller logs with anomalous payloads and 5xx spikes" + }, + { + "name": "esxi:hostd", + "channel": "/var/log/hostd.log anomalies (faults, crashes, restarts) around inbound connections" + }, + { + "name": "esxi:vmkernel", + "channel": "vmkernel / OpenSLP logs for malformed requests" + }, + { + "name": "networkdevice:controlplane", + "channel": "Syslog from edge devices with HTTP 500s on mgmt portal, SmartInstall events, unexpected CLI commands" + }, + { + "name": "WinEventLog:Application", + "channel": "Outlook rule execution failure or abnormal rule execution context" + }, + { + "name": "m365:unified", + "channel": "Creation or modification of inbox rule outside of normal user behavior" + }, + { + "name": "m365:unified", + "channel": "Send/Receive: Inbound emails containing embedded or shortened URLs" + }, + { + "name": "Application:Mail", + "channel": "Inbound emails containing hyperlinks from suspicious sources" + }, + { + "name": "macos:unifiedlog", + "channel": "Received messages with embedded or shortened URLs" + }, + { + "name": "azure:signinlogs", + "channel": "ConsentGrant: Suspicious consent grants to non-approved or unknown applications" + }, + { + "name": "m365:unified", + "channel": "AppRegistration: Unexpected application registration or OAuth authorization" + }, + { + "name": "m365:unified", + "channel": "MessageSend, MessageRead, or FileAttached events containing credential-like patterns" + }, + { + "name": "m365:exchange", + "channel": "Emails containing cleartext secrets (password=, api_key=, token=) shared across internal/external domains" + }, + { + "name": "saas:slack", + "channel": "chat.postMessage, files.upload, or discovery API calls involving token/credential regex" + }, + { + "name": "linux:syslog", + "channel": "Inbound messages from webmail services containing attachments or URLs" + }, + { + "name": "macos:unifiedlog", + "channel": "Received messages containing embedded links or attachments from non-enterprise services" + }, + { + "name": "WinEventLog:System", + "channel": "EventCode=1000" + }, + { + "name": "linux:syslog", + "channel": "kernel|systemd messages indicating 'segmentation fault'|'core dumped'|'service terminated unexpectedly' for sshd, smbd, vsftpd, mysqld, httpd, etc." + }, + { + "name": "esxi:hostd", + "channel": "Keywords: 'Backtrace','Signal 11','PANIC','hostd restarted','assert' or 'Service terminated unexpectedly' in /var/log/hostd.log, /var/log/vmkernel.log, /var/log/syslog.log." + }, + { + "name": "macos:unifiedlog", + "channel": "process 'crashed'|'EXC_BAD_ACCESS' for sshd, screensharingd, httpd; launchd restarts of these daemons." + }, + { + "name": "esxi:hostd", + "channel": "unexpected script/command invocations via hostd" + }, + { + "name": "linux:syslog", + "channel": "System daemons initiating encrypted sessions with unexpected destinations" + }, + { + "name": "esxi:vpxd", + "channel": "Symmetric crypto routines triggered for external session" + }, + { + "name": "AWS:CloudTrail", + "channel": "SendEmail" + }, + { + "name": "AWS:CloudTrail", + "channel": "InvokeModel" + }, + { + "name": "saas:openai", + "channel": "High volume of requests to /v1/chat/completions or /v1/images/generations" + }, + { + "name": "m365:unified", + "channel": "Set-Mailbox, Add-InboxRule, RegisterWebhook" + }, + { + "name": "saas:application", + "channel": "High-frequency invocation of SMS-related API endpoints from publicly accessible OTP or verification forms (e.g., Twilio: SendMessage, Cognito: AdminCreateUser) with irregular destination patterns." + }, + { + "name": "NSM:Connections", + "channel": "PushNotificationSent" + }, + { + "name": "saas:okta", + "channel": "MFAChallengeIssued" + }, + { + "name": "WinEventLog:Application", + "channel": "Exchange Transport Service loads unusual .NET assembly or errors upon transport agent execution" + }, + { + "name": "linux:syslog", + "channel": "milter configuration updated, transport rule initialized, unexpected script execution" + }, + { + "name": "WinEventLog:Application", + "channel": "Unexpected spikes in request volume, application-level errors, or thread pool exhaustion in web or API logs" + }, + { + "name": "linux:syslog", + "channel": "Repetitive HTTP 408, 500, or 503 errors logged within short timeframe" + }, + { + "name": "macos:unifiedlog", + "channel": "opendirectoryd crashes or abnormal authentication errors" + }, + { + "name": "m365:unified", + "channel": "ConsentGranted: Abuse of application integrations to mint tokens bypassing MFA" + }, + { + "name": "WinEventLog:Application", + "channel": "Browser or plugin/application logs showing script errors, plugin enumerations, or unusual extension load events" + }, + { + "name": "linux:syslog", + "channel": "Application or browser logs (webview errors, plugin enumerations) indicating suspicious script evaluation or plugin loads" + }, + { + "name": "macos:unifiedlog", + "channel": "Logs from unifiedlogging that show browser crashes, plugin enumerations, extension installs or errors around the same time as suspicious network fetches" + }, + { + "name": "m365:unified", + "channel": "Application Consent grants, new OAuth client registrations, or unusual admin-level activities executed by a user account shortly after suspected drive-by compromise" + }, + { + "name": "WinEventLog:Application", + "channel": "Outlook logs indicating failure to load or render HTML page in Home Page view" + }, + { + "name": "m365:unified", + "channel": "Folder configuration updated with external or HTML-formatted Home Page via Set-MailboxFolder" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=1102" + }, + { + "name": "linux:cli", + "channel": "cleared or truncated .bash_history" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream cleared or truncated" + }, + { + "name": "m365:unified", + "channel": "PurgeAuditLogs, Remove-MailboxAuditLog" + }, + { + "name": "WinEventLog:System", + "channel": "EventCode=104" + }, + { + "name": "WinEventLog:Application", + "channel": "EventCode=1000" + }, + { + "name": "EDR:detection", + "channel": "ThreatDetected, QuarantineLog" + }, + { + "name": "macos:unifiedlog", + "channel": "quarantine or AV-related subsystem" + }, + { + "name": "EDR:detection", + "channel": "ThreatLog" + }, + { + "name": "azure:signinlogs", + "channel": "Modify Conditional Access Policy" + }, + { + "name": "m365:unified", + "channel": "Set-CsOnlineUser or UpdateAuthPolicy" + }, + { + "name": "m365:unified", + "channel": "New-InboxRule or Set-InboxRule events recorded in Exchange Online" + }, + { + "name": "ApplicationLog:MailServer", + "channel": "Unexpected additions of sieve rules or filtering directives" + }, + { + "name": "m365:unified", + "channel": "Transport rule or inbox rule creation events" + }, + { + "name": "ApplicationLog:Outlook", + "channel": "Outlook client-level rule creation actions not consistent with normal user activity" + }, + { + "name": "kubernetes:orchestrator", + "channel": "Access to orchestrator logs containing credentials (Docker/Kubernetes logs)" + }, + { + "name": "WinEventLog:Application", + "channel": "Service crash, unhandled exception, or application hang warnings for critical services (e.g., IIS, DNS, SQL Server)" + }, + { + "name": "journald:systemd", + "channel": "Repeated service restart attempts or unit failures" + }, + { + "name": "macos:unifiedlog", + "channel": "Repeated process crashes logged by CrashReporter or system instability logs in com.apple.console" + }, + { + "name": "docker:events", + "channel": "Container exited with non-zero code repeatedly in short period" + }, + { + "name": "WinEventLog:Application", + "channel": "SCCM, Intune logs" + }, + { + "name": "macos:jamf", + "channel": "RemoteCommandExecution" + }, + { + "name": "networkdevice:syslog", + "channel": "config push events" + }, + { + "name": "linux:syslog", + "channel": "processes binding to non-standard ports or sshd configured on unexpected port" + }, + { + "name": "m365:unified", + "channel": "GAL Lookup or Address Book download" + }, + { + "name": "esxi:hostd", + "channel": "Guest Operations API invocation: StartProgramInGuest, ListProcessesInGuest, ListFileInGuest, InitiateFileTransferFromGuest" + }, + { + "name": "m365:unified", + "channel": "Send/Receive: Inbound emails with attachments from suspicious or spoofed senders" + }, + { + "name": "Application:Mail", + "channel": "Inbound email attachments logged from MTAs with suspicious metadata" + }, + { + "name": "macos:unifiedlog", + "channel": "Inbound messages with attachments from suspicious domains" + }, + { + "name": "WinEventLog:Application", + "channel": "Unexpected web application errors or CMS logs showing modification to index.html, default.aspx, or other public-facing files" + }, + { + "name": "m365:unified", + "channel": "certificate added or modified in application credentials" + }, + { + "name": "saas:Snowflake", + "channel": "QUERY: Large or repeated SELECT * queries to sensitive tables" + }, + { + "name": "saas:Airtable", + "channel": "EXPORT: User-triggered data export via GUI or API" + }, + { + "name": "ApplicationLog:CallRecords", + "channel": "Outbound or inbound calls to high-risk or blocklisted numbers" + }, + { + "name": "networkdevice:syslog", + "channel": "SIP REGISTER, INVITE, or unusual call destination metadata" + }, + { + "name": "macos:unifiedlog", + "channel": "Outgoing or incoming calls with non-standard caller IDs or unusual metadata" + }, + { + "name": "m365:unified", + "channel": "Unusual MFA requests or OAuth consent events temporally aligned with user-reported vishing call" + }, + { + "name": "docker:daemon", + "channel": "container_create,container_start" + }, + { + "name": "saas:github", + "channel": "Bulk access to multiple files or large volume of repo requests within short time window" + }, + { + "name": "m365:exchange", + "channel": "Transport Rule Modification" + }, + { + "name": "m365:exchange", + "channel": "Admin Audit Logs, Transport Rules" + }, + { + "name": "saas:application", + "channel": "High-volume API calls or traffic via messaging or webhook service" + }, + { + "name": "m365:unified", + "channel": "Set federation settings on domain|Set domain authentication|Add federated identity provider" + }, + { + "name": "linux:syslog", + "channel": "system daemons initiating TLS sessions outside expected services" + }, + { + "name": "m365:unified", + "channel": "SendOnBehalf/SendAs: Emails sent where the sending identity mismatches account ownership" + }, + { + "name": "Application:Mail", + "channel": "Mismatch between authenticated username and From header in email" + }, + { + "name": "macos:unifiedlog", + "channel": "Mail.app or third-party clients sending messages with mismatched From headers" + }, + { + "name": "gcp:workspaceaudit", + "channel": "SendAs: Outbound messages with alias identities that differ from primary account" + }, + { + "name": "m365:unified", + "channel": "Set-MailboxAutoReplyConfiguration: Unexpected rule changes creating impersonated replies" + }, + { + "name": "m365:unified", + "channel": "SendOnBehalf/SendAs: Office Suite initiated messages using impersonated identities" + }, + { + "name": "linux:syslog", + "channel": "browser/office crash, segfault, abnormal termination" + }, + { + "name": "macos:unifiedlog", + "channel": "process crash, abort, code signing violations" + }, + { + "name": "saas:okta", + "channel": "WebUI access to administrator dashboard" + }, + { + "name": "m365:unified", + "channel": "Read-only configuration review from GUI" + }, + { + "name": "saas:box", + "channel": "User navigated to admin interface" + }, + { + "name": "azure:signinlogs", + "channel": "Register PTA Agent or Modify AD FS trust" + }, + { + "name": "m365:unified", + "channel": "Modify Federation Settings or Update Authentication Policy" + }, + { + "name": "saas:okta", + "channel": "Federation configuration update or signing certificate change" + }, + { + "name": "macos:unifiedlog", + "channel": "Configuration profile modified or new profile installed" + }, + { + "name": "journald:Application", + "channel": "Segfault or crash log entry associated with specific application binary" + }, + { + "name": "macos:unifiedlog", + "channel": "Crash log entries for a process receiving malformed input or known exploit patterns" + }, + { + "name": "AWS:CloudWatch", + "channel": "Repeated crash pattern within container or instance logs" + }, + { + "name": "esxi:hostd", + "channel": "unexpected script invocations producing long encoded strings" + }, + { + "name": "docker:runtime", + "channel": "execution of cloud CLI tool (e.g., aws, az) inside container" + }, + { + "name": "WinEventLog:Application", + "channel": "VPN, Citrix, or remote access gateway logs showing external IP addresses" + }, + { + "name": "NSM:Connections", + "channel": "Failed password or accepted password for SSH users" + }, + { + "name": "ApplicationLog:API", + "channel": "Docker/Kubernetes API access from external sources" + }, + { + "name": "m365:unified", + "channel": "Send/Receive: Unusual spikes in inbound messages to a single recipient" + }, + { + "name": "Application:Mail", + "channel": "High-frequency inbound mail activity to a specific recipient address" + }, + { + "name": "m365:exchange", + "channel": "MailDelivery: High-frequency delivery of messages or attachments to a single recipient" + }, + { + "name": "macos:unifiedlog", + "channel": "Repetitive inbound email delivery activity logged within a short time window" + }, + { + "name": "saas:confluence", + "channel": "access.content" + }, + { + "name": "m365:unified", + "channel": "PowerShell: Add-MailboxPermission" + }, + { + "name": "AWS:CloudTrail", + "channel": "InvokeFunction: Unexpected or repeated invocation of functions not tied to known workflows" + }, + { + "name": "m365:exchange", + "channel": "New-InboxRule: Automation that triggers abnormal forwarding or external link generation" + }, + { + "name": "saas:googledrive", + "channel": "FileOpen / FileAccess: Event-driven script triggering on user file actions" + }, + { + "name": "networkdevice:syslog", + "channel": "Failed authentication requests redirected to non-standard portals" + }, + { + "name": "saas:okta", + "channel": "System API Call: user.read, group.read" + }, + { + "name": "esxi:hostd", + "channel": "Host daemon command log entries related to vib enumeration" + }, + { + "name": "m365:unified", + "channel": "Add-MailboxPermission or Set-ManagementRoleAssignment" + }, + { + "name": "WinEventLog:Application", + "channel": "Outlook rule creation, form load, or homepage redirection" + }, + { + "name": "m365:mailboxaudit", + "channel": "Outlook rule creation or custom form deployment" + }, + { + "name": "saas:zoom", + "channel": "unusual web session tokens and automation patterns during login" + }, + { + "name": "WinEventLog:Application", + "channel": "High-frequency errors or hangs from resource-intensive application components (e.g., .NET, IIS, Office Suite)" + }, + { + "name": "linux:syslog", + "channel": "Error/warning logs from services indicating load spike or worker exhaustion" + }, + { + "name": "macos:unifiedlog", + "channel": "Application errors or resource contention from excessive frontend or script invocation" + }, + { + "name": "AWS:CloudWatch", + "channel": "Elevated 5xx response rates in application logs or gateway layer" + }, + { + "name": "m365:messagetrace", + "channel": "AuthenticationDetails=fail OR SPF=fail OR DKIM=fail OR DMARC=fail" + }, + { + "name": "linux:syslog", + "channel": "SPF fail OR DKIM fail OR DMARC fail OR mismatched from_domain vs return_path_domain" + }, + { + "name": "macos:unifiedlog", + "channel": "SPF fail OR DKIM fail OR DMARC fail OR mismatched header vs envelope domains" + }, + { + "name": "saas:email", + "channel": "AuthenticationFailures (SPF/DKIM/DMARC) OR Domain Mismatch" + }, + { + "name": "WinEventLog:System", + "channel": "EventCode=1341, 1342, 1020, 1063" + }, + { + "name": "linux:syslog", + "channel": "suspicious DHCP lease assignment with unexpected DNS or gateway" + }, + { + "name": "macos:unifiedlog", + "channel": "new DHCP configuration with anomalous DNS or router values" + }, + { + "name": "WinEventLog:Application", + "channel": "Exchange logs or header artifacts" + }, + { + "name": "macos:unifiedlog", + "channel": "Mail or AppleScript subsystem" + }, + { + "name": "m365:exchange", + "channel": "MessageTrace logs" + }, + { + "name": "linux:syslog", + "channel": "opened document|clicked link|segfault|abnormal termination|sandbox" + }, + { + "name": "macos:unifiedlog", + "channel": "opened document|clicked link|EXC_BAD_ACCESS|abort|LSQuarantine" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "name": "m365:unified", + "channel": "Set-PartnerOfRecord / CompanyAdministrator role assignments / New-DelegatedAdminRelationship" + }, + { + "name": "AWS:CloudTrail", + "channel": "CreateUser|AttachRolePolicy|CreateAccessKey|UpdateAssumeRolePolicy|CreateLoginProfile" + }, + { + "name": "azure:activity", + "channel": "Add role assignment / ElevateAccess / Create service principal" + }, + { + "name": "saas:googleworkspace", + "channel": "OAuth2 authorization grants / Admin role assignments" + }, + { + "name": "m365:unified", + "channel": "Add-DelegatedAdmin, Set-PartnerOfRecord, Add-MailboxPermission, Set-OrganizationRelationship" + }, + { + "name": "linux:syslog", + "channel": "Authentication attempts into finance-related servers from unusual IPs or times" + }, + { + "name": "macos:unifiedlog", + "channel": "Anomalous keychain access attempts targeting payment credentials" + }, + { + "name": "saas:finance", + "channel": "Transaction/Transfer: Unusual or large transactions initiated outside business hours or by unusual accounts" + }, + { + "name": "saas:audit", + "channel": "Rule/ConfigChange: Auto-forward rules, delegate assignments, or changes to financial approval workflows" + }, + { + "name": "m365:unified", + "channel": "MailSend: Outlook messages with suspicious subject/body terms (e.g., urgent payment, wire transfer) targeting finance teams" + }, + { + "name": "m365:unified", + "channel": "FileAccessed, FileDownloaded, SearchQueried" + }, + { + "name": "m365:unified", + "channel": "Detection of hidden macro streams or SetHiddenAttribute actions" + }, + { + "name": "m365:unified", + "channel": "RunMacro" + }, + { + "name": "azure:audit", + "channel": "App registrations or consent grants by abnormal users or at unusual times" + }, + { + "name": "azure:signinlogs", + "channel": "Resource access initiated using application credentials, not user accounts" + }, + { + "name": "saas:slack", + "channel": "OAuth token use by unknown app client_id accessing private channels or files" + }, + { + "name": "esxi:esxupdate", + "channel": "/var/log/esxupdate.log contains VIB installed with `--force` or `--no-sig-check` and non-standard acceptance levels" + }, + { + "name": "linux:syslog", + "channel": "sshd sessions with unusual port forwarding parameters" + }, + { + "name": "saas:audit", + "channel": "Application added or consent granted: Integration persisting after original user disabled" + }, + { + "name": "linux:syslog", + "channel": "Non-standard processes negotiating SSL/TLS key exchanges" + }, + { + "name": "esxi:vpxd", + "channel": "ESXi process initiating asymmetric handshake with external host" + }, + { + "name": "WinEventLog:Application", + "channel": "Unusual DLL/plugin registration for IIS/SQL/Apache or unexpected error logs" + }, + { + "name": "linux:syslog", + "channel": "Module registration or stacktrace logs indicating segmentation faults or unknown module errors" + }, + { + "name": "esxi:hostd", + "channel": "New extension/module install with unknown vendor ID" + }, + { + "name": "m365:unified", + "channel": "FileUploaded or FileCopied events" + }, + { + "name": "saas:salesforce", + "channel": "DataExport, RestAPI, Login, ReportExport" + }, + { + "name": "saas:hubspot", + "channel": "contact_viewed, contact_exported, login" + }, + { + "name": "saas:slack", + "channel": "conversations.history, files.list, users.info, audit_logs" + }, + { + "name": "m365:unified", + "channel": "TeamsMessageAccess, TeamsExport, ExternalAppAccess" + }, + { + "name": "m365:unified", + "channel": "TeamsMessagesAccessedViaEDiscovery, TeamsGraphMessageExport" + }, + { + "name": "m365:unified", + "channel": "FileAccessed" + }, + { + "name": "m365:messagetrace", + "channel": "X-MS-Exchange-Organization-AutoForwarded" + }, + { + "name": "linux:syslog", + "channel": "Segfaults, kernel oops, or crashes in security software processes" + }, + { + "name": "macos:unifiedlog", + "channel": "Abnormal terminations of com.apple.security.* or 3rd-party security daemons" + }, + { + "name": "AWS:CloudTrail", + "channel": "StopLogging, DeleteTrail, UpdateTrail: API calls that disable or modify logging services" + }, + { + "name": "m365:unified", + "channel": "ApplicationModified, ConsentGranted: Unexpected app consent or modification events linked to security evasion" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:36.580000+00:00\"}, \"root['description']\": {\"new_value\": \"Application Log Content refers to logs generated by applications or services, providing a record of their activity. These logs may include metrics, errors, performance data, and operational alerts from web, mail, or other applications. These logs are vital for monitoring application behavior and detecting malicious activities or anomalies. Examples: \\n\\n- Web Application Logs: These logs include information about requests, responses, errors, and security events (e.g., unauthorized access attempts).\\n- Email Application Logs: Logs contain metadata about emails sent, received, or blocked (e.g., sender/receiver addresses, message IDs).\\n- SaaS Application Logs: Activity logs include user logins, configuration changes, and access to sensitive resources.\\n- Cloud Application Logs: Logs detail control plane activities, including API calls, instance modifications, and network changes.\\n- System/Application Monitoring Logs: Logs provide insights into application performance, errors, and anomalies.\", \"old_value\": \"Application Log Content refers to logs generated by applications or services, providing a record of their activity. These logs may include metrics, errors, performance data, and operational alerts from web, mail, or other applications. These logs are vital for monitoring application behavior and detecting malicious activities or anomalies. Examples: \\n\\n- Web Application Logs: These logs include information about requests, responses, errors, and security events (e.g., unauthorized access attempts).\\n- Email Application Logs: Logs contain metadata about emails sent, received, or blocked (e.g., sender/receiver addresses, message IDs).\\n- SaaS Application Logs: Activity logs include user logins, configuration changes, and access to sensitive resources.\\n- Cloud Application Logs: Logs detail control plane activities, including API calls, instance modifications, and network changes.\\n- System/Application Monitoring Logs: Logs provide insights into application performance, errors, and anomalies.\\n\\nThis data component can be collected through the following measures:\\n\\nConfigure Application Logging\\n\\n- Enable logging within the application or service.\\n- Examples:\\n - Web Servers: Enable access and error logs in NGINX or Apache.\\n - Email Systems: Enable audit logging in Microsoft Exchange or Gmail.\\n\\nCentralized Log Management\\n\\n- Use log management solutions like Splunk, or a cloud-native logging solution.\\n- Configure the application to send logs to a centralized system for analysis.\\n\\nCloud-Specific Collection\\n\\n- Use services like AWS CloudWatch, Azure Monitor, or Google Cloud Operations Suite for cloud-based applications.\\n- Ensure logging is enabled for all critical resources (e.g., API calls, IAM changes).\\n\\nSIEM Integration\\n\\n- Integrate application logs with a SIEM platform (e.g., Splunk, QRadar) for real-time correlation and analysis.\\n- Use parsers to standardize log formats and extract key fields like timestamps, user IDs, and error codes.\", \"diff\": \"--- \\n+++ \\n@@ -5,27 +5,3 @@\\n - SaaS Application Logs: Activity logs include user logins, configuration changes, and access to sensitive resources.\\n - Cloud Application Logs: Logs detail control plane activities, including API calls, instance modifications, and network changes.\\n - System/Application Monitoring Logs: Logs provide insights into application performance, errors, and anomalies.\\n-\\n-This data component can be collected through the following measures:\\n-\\n-Configure Application Logging\\n-\\n-- Enable logging within the application or service.\\n-- Examples:\\n- - Web Servers: Enable access and error logs in NGINX or Apache.\\n- - Email Systems: Enable audit logging in Microsoft Exchange or Gmail.\\n-\\n-Centralized Log Management\\n-\\n-- Use log management solutions like Splunk, or a cloud-native logging solution.\\n-- Configure the application to send logs to a centralized system for analysis.\\n-\\n-Cloud-Specific Collection\\n-\\n-- Use services like AWS CloudWatch, Azure Monitor, or Google Cloud Operations Suite for cloud-based applications.\\n-- Ensure logging is enabled for all critical resources (e.g., API calls, IAM changes).\\n-\\n-SIEM Integration\\n-\\n-- Integrate application logs with a SIEM platform (e.g., Splunk, QRadar) for real-time correlation and analysis.\\n-- Use parsers to standardize log formats and extract key fields like timestamps, user IDs, and error codes.\"}, \"root['x_mitre_log_sources'][17]['name']\": {\"new_value\": \"WinEventLog:System\", \"old_value\": \"WinEventLog:Microsoft-Windows-DriverFrameworks-UserMode/Operational\"}, \"root['x_mitre_log_sources'][37]['name']\": {\"new_value\": \"azure:signinlogs\", \"old_value\": \"azure:signinLogs\"}, \"root['x_mitre_log_sources'][75]['name']\": {\"new_value\": \"WinEventLog:System\", \"old_value\": \"WinEventLog:Application\", \"new_path\": \"root['x_mitre_log_sources'][44]['name']\"}, \"root['x_mitre_log_sources'][75]['channel']\": {\"new_value\": \"EventCode=1000\", \"old_value\": \"EventCode=1000-1026\", \"new_path\": \"root['x_mitre_log_sources'][44]['channel']\"}, \"root['x_mitre_log_sources'][44]['channel']\": {\"new_value\": \"EventCode=1341, 1342, 1020, 1063\", \"old_value\": \"EventCode=7031,7034,1000,1001\", \"new_path\": \"root['x_mitre_log_sources'][161]['channel']\"}, \"root['x_mitre_log_sources'][172]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\", \"new_path\": \"root['x_mitre_log_sources'][169]['channel']\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][130]\": {\"name\": \"WinEventLog:Application\", \"channel\": \"EventCode=1000, 1001, 1002\"}, \"root['x_mitre_log_sources'][163]\": {\"name\": \"WinEventLog:System\", \"channel\": \"EventCode=1341,1342,1020,1063\"}, \"root['x_mitre_log_sources'][169]\": {\"name\": \"WinEventLog:Application\", \"channel\": \"EventCode=1000,1001\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Application Log Content refers to logs generated by applicatt1Application Log Content refers to logs generated by applicat
>ions or services, providing a record of their activity. Thes>ions or services, providing a record of their activity. Thes
>e logs may include metrics, errors, performance data, and op>e logs may include metrics, errors, performance data, and op
>erational alerts from web, mail, or other applications. Thes>erational alerts from web, mail, or other applications. Thes
>e logs are vital for monitoring application behavior and det>e logs are vital for monitoring application behavior and det
>ecting malicious activities or anomalies. Examples:   - Web >ecting malicious activities or anomalies. Examples:   - Web 
>Application Logs: These logs include information about reque>Application Logs: These logs include information about reque
>sts, responses, errors, and security events (e.g., unauthori>sts, responses, errors, and security events (e.g., unauthori
>zed access attempts). - Email Application Logs: Logs contain>zed access attempts). - Email Application Logs: Logs contain
> metadata about emails sent, received, or blocked (e.g., sen> metadata about emails sent, received, or blocked (e.g., sen
>der/receiver addresses, message IDs). - SaaS Application Log>der/receiver addresses, message IDs). - SaaS Application Log
>s: Activity logs include user logins, configuration changes,>s: Activity logs include user logins, configuration changes,
> and access to sensitive resources. - Cloud Application Logs> and access to sensitive resources. - Cloud Application Logs
>: Logs detail control plane activities, including API calls,>: Logs detail control plane activities, including API calls,
> instance modifications, and network changes. - System/Appli> instance modifications, and network changes. - System/Appli
>cation Monitoring Logs: Logs provide insights into applicati>cation Monitoring Logs: Logs provide insights into applicati
>on performance, errors, and anomalies.  This data component >on performance, errors, and anomalies.
>can be collected through the following measures:  Configure  
>Application Logging  - Enable logging within the application 
> or service. - Examples:     - Web Servers: Enable access an 
>d error logs in NGINX or Apache.     - Email Systems: Enable 
> audit logging in Microsoft Exchange or Gmail.  Centralized  
>Log Management  - Use log management solutions like Splunk,  
>or a cloud-native logging solution. - Configure the applicat 
>ion to send logs to a centralized system for analysis.  Clou 
>d-Specific Collection  - Use services like AWS CloudWatch, A 
>zure Monitor, or Google Cloud Operations Suite for cloud-bas 
>ed applications. - Ensure logging is enabled for all critica 
>l resources (e.g., API calls, IAM changes).  SIEM Integratio 
>n  - Integrate application logs with a SIEM platform (e.g.,  
>Splunk, QRadar) for real-time correlation and analysis. - Us 
>e parsers to standardize log formats and extract key fields  
>like timestamps, user IDs, and error codes. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--685f917a-e95e-4ba0-ade1-c7d354dae6e0", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.273000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0064", + "external_id": "DC0064" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Command Execution", + "description": "Command Execution involves monitoring and capturing the execution of textual commands (including shell commands, cmdlets, and scripts) within an operating system or application. These commands may include arguments or parameters and are typically executed through interpreters such as `cmd.exe`, `bash`, `zsh`, `PowerShell`, or programmatic execution. Examples: \n\n- Windows Command Prompt\n - dir \u2013 Lists directory contents.\n - net user \u2013 Queries or manipulates user accounts.\n - tasklist \u2013 Lists running processes.\n- PowerShell\n - Get-Process \u2013 Retrieves processes running on a system.\n - Set-ExecutionPolicy \u2013 Changes PowerShell script execution policies.\n - Invoke-WebRequest \u2013 Downloads remote resources.\n- Linux Shell\n - ls \u2013 Lists files in a directory.\n - cat /etc/passwd \u2013 Reads the user accounts file.\n - curl http://malicious-site.com \u2013 Retrieves content from a malicious URL.\n- Container Environments\n - docker exec \u2013 Executes a command inside a running container.\n - kubectl exec \u2013 Runs commands in Kubernetes pods.\n- macOS Terminal\n - open \u2013 Opens files or URLs.\n - dscl . -list /Users \u2013 Lists all users on the system.\n - osascript -e \u2013 Executes AppleScript commands.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Command", + "channel": "None" + }, + { + "name": "auditd:SYSCALL", + "channel": "execution of realmd, samba-tool, or ldapmodify with user-related arguments" + }, + { + "name": "macos:unifiedlog", + "channel": "dsconfigad or dscl with create or append options for AD-bound users" + }, + { + "name": "EDR:AMSI", + "channel": "None" + }, + { + "name": "linux:syslog", + "channel": "cron activity" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "Get-ADTrust|GetAllTrustRelationships" + }, + { + "name": "gcp:audit", + "channel": "None" + }, + { + "name": "auditd:SYSCALL", + "channel": "Execution of script interpreters by systemd timer (ExecStart)" + }, + { + "name": "AWS:CloudTrail", + "channel": "InvokeFunction" + }, + { + "name": "m365:unified", + "channel": "Automated forwarding or file sync initiated by a logic app" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "name": "linux:syslog", + "channel": "Suspicious script or command execution targeting browser folders" + }, + { + "name": "esxi:shell", + "channel": "snapshot create/copy, esxcli" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Commands like systemctl stop , service stop, or kill -9 " + }, + { + "name": "macos:unifiedlog", + "channel": "launchctl unload, kill, or pkill commands affecting daemons or background services" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of security-agent detection or enumeration commands" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream --predicate" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "Execution of Microsoft script to enumerate custom forms in Outlook mailbox" + }, + { + "name": "m365:messagetrace", + "channel": "Inbound email triggers execution of mailbox-stored custom form" + }, + { + "name": "auditd:EXECVE", + "channel": "Use of mv or cp to rename files with '.' prefix" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of chflags hidden or SetFile -a V" + }, + { + "name": "esxi:shell", + "channel": "interactive shell" + }, + { + "name": "networkdevice:cli", + "channel": "CLI command" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream" + }, + { + "name": "esxi:vmkernel", + "channel": "/var/log/vmkernel.log" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve calls to locale, timedatectl, or cat /etc/timezone" + }, + { + "name": "macos:unifiedlog", + "channel": "defaults read -g AppleLocale, systemsetup -gettimezone" + }, + { + "name": "macos:unifiedlog", + "channel": "profiles install -type=configuration" + }, + { + "name": "auditd:SYSCALL", + "channel": "sleep function usage or loops (nanosleep, usleep) in scripts" + }, + { + "name": "m365:unified", + "channel": "Search-Mailbox, Get-MessageTrace, eDiscovery requests" + }, + { + "name": "EDR:cli", + "channel": "Command Line Telemetry" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream --predicate 'eventMessage contains \"loginwindow\" or \"pfctl\"'" + }, + { + "name": "networkdevice:syslog", + "channel": "Command Audit / Configuration Change" + }, + { + "name": "WinEventLog:Microsoft-Office/OutlookAddinMonitor", + "channel": "Outlook loading add-in via unexpected load path or non-default profile context" + }, + { + "name": "macos:unifiedlog", + "channel": "exec or sudo usage with NOPASSWD context or echo modifying sudoers" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "name": "auditd:EXECVE", + "channel": "execve: Execution of update-ca-certificates or trust anchor modification commands" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of /usr/bin/security add-trusted-cert or keychain modifications to System.keychain" + }, + { + "name": "auditd:EXECVE", + "channel": "gcore, gdb, strings, hexdump execution" + }, + { + "name": "auditd:SYSCALL", + "channel": "connect, execve, write" + }, + { + "name": "esxi:hostd", + "channel": "command execution" + }, + { + "name": "auditd:EXECVE", + "channel": "Execution of auditctl, systemctl stop auditd, or kill -9 auditd" + }, + { + "name": "macos:syslog", + "channel": "system.log" + }, + { + "name": "esxi:hostd", + "channel": "/var/log/hostd.log" + }, + { + "name": "esxi:shell", + "channel": "/var/log/shell.log" + }, + { + "name": "docker:daemon", + "channel": "docker exec or docker run with unexpected command/entrypoint" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve call including 'nohup' or trailing '&'" + }, + { + "name": "macos:unifiedlog", + "channel": "nohup, disown, or osascript execution patterns" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "CommandLine=copy-item or robocopy from UNC path" + }, + { + "name": "esxi:shell", + "channel": "invoked remote scripts (esxcli)" + }, + { + "name": "auditd:EXECVE", + "channel": "execution of systemctl with subcommands start, stop, enable, disable" + }, + { + "name": "networkdevice:cli", + "channel": "Policy Update" + }, + { + "name": "auditd:SYSCALL", + "channel": "None" + }, + { + "name": "AWS:CloudTrail", + "channel": "eventName: RunInstances, CreateUser, PutRolePolicy, InvokeCommand" + }, + { + "name": "gcp:audit", + "channel": "methodName: setIamPolicy, startInstance, createServiceAccount" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Commands executed within an SSH session where no matching logon/authentication event exists" + }, + { + "name": "esxi:hostd", + "channel": "modification of config files or shell command execution" + }, + { + "name": "kubernetes:audit", + "channel": "Shell process (e.g., /bin/sh, /bin/bash) spawned in a container without an interactive session attached (i.e., automation anomaly)" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of 'profiles install -type=configuration'" + }, + { + "name": "macos:unifiedlog", + "channel": "subsystem:com.apple.Terminal" + }, + { + "name": "networkdevice:syslog", + "channel": "eventlog" + }, + { + "name": "esxi:hostd", + "channel": "shell access or job registration" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "PowerShell launched from outlook.exe or triggered without user invocation" + }, + { + "name": "m365:messagetrace", + "channel": "Inbound email matches crafted rule trigger pattern tied to persistence logic" + }, + { + "name": "linus:syslog", + "channel": "None" + }, + { + "name": "linux:syslog", + "channel": "Unusual outbound transfers from CLI tools like base64, gzip, or netcat" + }, + { + "name": "macos:unifiedlog", + "channel": "base64 or curl processes chained within short execution window" + }, + { + "name": "esxi:shell", + "channel": "base64 or gzip use within shell session" + }, + { + "name": "macos:unifiedlog", + "channel": "exec: Invocation of /usr/bin/defaults write or /usr/bin/plutil modifying plist keys" + }, + { + "name": "auditd:SYSCALL", + "channel": "chmod, execve" + }, + { + "name": "macos:unifiedlog", + "channel": "chmod command with arguments including '+s', 'u+s', or numeric values 4000\u20136777" + }, + { + "name": "macos:unifiedlog", + "channel": "command includes dscl . delete or sysadminctl --deleteUser" + }, + { + "name": "fs:fsusage", + "channel": "file system activity monitor" + }, + { + "name": "networkdevice:cli", + "channel": "ip ssh pubkey-chain" + }, + { + "name": "esxi:shell", + "channel": "scripts or binaries with misleading names" + }, + { + "name": "auditd:EXECVE", + "channel": "Execution of GUI-related binaries with suppressed window/display flags" + }, + { + "name": "linuxsyslog", + "channel": "nslcd or winbind logs" + }, + { + "name": "macos:unifiedlog", + "channel": "DS daemon log entries" + }, + { + "name": "esxi:hostd", + "channel": "logline inspection" + }, + { + "name": "macos:unifiedlog", + "channel": "diskutil eraseDisk / asr restore with destructive flags" + }, + { + "name": "networkdevice:cli", + "channel": "erase flash:, erase startup-config, format disk" + }, + { + "name": "networkdevice:syslog", + "channel": "command_exec" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: iptables, nft, firewall-cmd modifications" + }, + { + "name": "macos:unifiedlog", + "channel": "pfctl -d, socketfilterfw --setglobalstate off, or modifications to com.apple.alf" + }, + { + "name": "esxi:hostd", + "channel": "esxcli network firewall set commands" + }, + { + "name": "docker:events", + "channel": "container exec rm|container stop --force" + }, + { + "name": "esxi:hostd", + "channel": "event stream" + }, + { + "name": "networkdevice:cli", + "channel": "CLI command logs" + }, + { + "name": "esxi:shell", + "channel": "/var/log/shell.log entries containing \"esxcli system clock get\"" + }, + { + "name": "networkdevice:syslog", + "channel": "command-exec: CLI commands containing \"show clock\", \"show clock detail\", \"show timezone\" executed by suspicious user/source" + }, + { + "name": "networkdevice:cli", + "channel": "cmd: cmd=show clock detail" + }, + { + "name": "auditd:EXECVE", + "channel": "curl -X POST, wget --post-data" + }, + { + "name": "linux:syslog", + "channel": "sudo chage|grep pam_pwquality|cat /etc/login.defs" + }, + { + "name": "macos:unifiedlog", + "channel": "pwpolicy|PasswordPolicy" + }, + { + "name": "networkdevice:syslog", + "channel": "cmd='show aaa*' OR 'show running-config | include password|aaa' OR 'show aaa common-criteria policy all'" + }, + { + "name": "networkdevice:syslog", + "channel": "CLI command audit" + }, + { + "name": "networkdevice:cli", + "channel": "Execution of commands to load, copy, or replace system images (e.g., 'copy tftp flash', 'boot system')" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "Execution of PowerShell script to enumerate or remove malicious Home Page folder config" + }, + { + "name": "m365:messagetrace", + "channel": "Inbound email triggering Outlook to auto-access folder tied to malicious Home Page" + }, + { + "name": "macos:unifiedlog", + "channel": "Command line contains smbutil view //, mount_smbfs //" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Invocation of scp, rsync, curl, or sftp" + }, + { + "name": "esxi:hostd", + "channel": "scp/ssh used to move file across hosts" + }, + { + "name": "auditd:EXECVE", + "channel": "command line arguments containing lsblk, fdisk, parted" + }, + { + "name": "macos:unifiedlog", + "channel": "log messages related to disk enumeration context or Terminal session" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve calls modifying local mail filter configuration files" + }, + { + "name": "esxi:hostd", + "channel": "None" + }, + { + "name": "esxi:shell", + "channel": "None" + }, + { + "name": "networkdevice:cli", + "channel": "None" + }, + { + "name": "linux:syslog", + "channel": "sudo execution of ffmpeg/gst-launch/v4l2-ctl by non-standard user" + }, + { + "name": "docker:api", + "channel": "docker logs access or container inspect commands from non-administrative users" + }, + { + "name": "esxi:shell", + "channel": "command IN (\"esxcli vm process list\", \"vim-cmd vmsvc/getallvms\")" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: process_name IN (\"virsh\", \"VBoxManage\", \"qemu-img\") AND command IN (\"list\", \"info\")" + }, + { + "name": "esxi:shell", + "channel": "openssl|tar|dd" + }, + { + "name": "AWS:CloudTrail", + "channel": "SSM RunCommand" + }, + { + "name": "azure:activity", + "channel": "Intune PowerShell Scripts" + }, + { + "name": "m365:exchange", + "channel": "Cmdlet: Get-GlobalAddressList, Get-Recipient" + }, + { + "name": "networkdevice:cli", + "channel": "Execution of commands like 'show running-config', 'copy running-config', or 'export config'" + }, + { + "name": "esxi:syslog", + "channel": "boot logs" + }, + { + "name": "networkdevice:syslog", + "channel": "system boot logs" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: service stop syslog, systemctl stop rsyslog, kill -9 syslog" + }, + { + "name": "macos:unifiedlog", + "channel": "defaults write com.apple.system.logging or logd manipulation" + }, + { + "name": "esxi:hostd", + "channel": "esxcli system syslog config set or reload" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: openssl pkcs12, certutil, keytool" + }, + { + "name": "macos:unifiedlog", + "channel": "process calling security find-certificate, export, or import" + }, + { + "name": "networkdevice:cli", + "channel": "Execution of CLI commands altering crypto parameters (e.g., 'crypto key generate rsa modulus 512')" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Process in container namespace executes curl|wget|bash|sh|python|nc with outbound args" + }, + { + "name": "m365:exchange", + "channel": "Get-RoleGroup, Get-DistributionGroup" + }, + { + "name": "auditd:SYSCALL", + "channel": "execution of systemctl or service with enable/start parameters" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of cat, less, grep, journalctl targeting log directories (/var/log/)" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of log show, fs_usage, or cat targeting system.log" + }, + { + "name": "AWS:CloudTrail", + "channel": "GetLogEvents: High frequency log exports from CloudWatch or equivalent services" + }, + { + "name": "esxi:shell", + "channel": "Execution of cat, tail, grep targeting /var/log/vmkernel.log or /var/log/hostd.log" + }, + { + "name": "esxi:shell", + "channel": "CLI usage logs" + }, + { + "name": "macos:syslog", + "channel": "/var/log/system.log" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of launchctl load/unload/start commands" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "Exchange Cmdlets" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of python, perl, or custom binaries invoking compression libraries" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve, USER_CMD" + }, + { + "name": "auditd:USER_CMD", + "channel": "USER_CMD" + }, + { + "name": "esxi:shell", + "channel": "Command execution trace" + }, + { + "name": "auditd:SYSCALL", + "channel": "bash/zsh of base64, tar, gzip, or openssl immediately after file write" + }, + { + "name": "linux:osquery", + "channel": "Command-line includes base64 -d or openssl enc -d" + }, + { + "name": "macos:unifiedlog", + "channel": "base64 -d or osascript invoked on staged file" + }, + { + "name": "auditd:EXECVE", + "channel": "exec: Execution of dd, efibootmgr, or flashrom modifying firmware/boot partitions" + }, + { + "name": "auditd:EXECVE", + "channel": "curl -d, wget --post-data" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Processes executing sendmail/postfix with forged headers" + }, + { + "name": "macos:unifiedlog", + "channel": "diskutil partitionDisk or eraseVolume with partition scheme modifications" + }, + { + "name": "networkdevice:cli", + "channel": "format flash:, format disk, reformat commands" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of tar, gzip, bzip2, xz, zip, or openssl with compression/encryption arguments" + }, + { + "name": "auditd:PROCTITLE", + "channel": "proctitle contains chmod, chown, setfacl, or attr commands with suspicious parameters" + }, + { + "name": "esxi:shell", + "channel": "shell command execution for chmod, chown, or file permission modification on VMFS or system files" + }, + { + "name": "networkdevice:Firewall", + "channel": "Audit trail or CLI/API access indicating commands like no access-list, delete rule-set, clear config" + }, + { + "name": "auditd:EXECVE", + "channel": "grep/cat/awk on files with password fields" + }, + { + "name": "macos:unifiedlog", + "channel": "grep/cat on files matching credential patterns" + }, + { + "name": "kubernetes:audit", + "channel": "process execution involving curl, grep, or awk on secrets" + }, + { + "name": "AWS:CloudTrail", + "channel": "command-line execution invoking credential enumeration" + }, + { + "name": "auditd:SYSCALL", + "channel": "promiscuous mode transitions (ioctl or ifconfig)" + }, + { + "name": "fs:fsusage", + "channel": "access to BPF devices or interface IOCTLs" + }, + { + "name": "networkdevice:syslog", + "channel": "exec command='monitor capture'" + }, + { + "name": "WinEventLog:Microsoft-Office-Alerts", + "channel": "Unexpected DLL or component loaded at Office startup" + }, + { + "name": "m365:office", + "channel": "Startup execution includes non-default component" + }, + { + "name": "macos:unifiedlog", + "channel": "diskutil eraseDisk/zeroDisk or asr restore with destructive flags" + }, + { + "name": "networkdevice:cli", + "channel": "erase flash:, erase nvram:, format disk" + }, + { + "name": "macos:unifiedlog", + "channel": "spctl --master-disable, csrutil disable, or defaults write to disable Gatekeeper" + }, + { + "name": "esxi:shell", + "channel": "esxcli system syslog config set --loghost='' or stopping hostd service" + }, + { + "name": "networkdevice:syslog", + "channel": "no logging buffered, no aaa new-model, disable firewall" + }, + { + "name": "auditd:EXECVE", + "channel": "git push, curl -X POST" + }, + { + "name": "linux:cli", + "channel": "command logging" + }, + { + "name": "esxi:hostd", + "channel": "command log" + }, + { + "name": "networkdevice:cli", + "channel": "command logs" + }, + { + "name": "networkdevice:syslog", + "channel": "interactive shell logging" + }, + { + "name": "esxi:hostd", + "channel": "Execution of '/bin/vmx' or modifications to '/etc/rc.local.d/local.sh'" + }, + { + "name": "auditd:SYSCALL", + "channel": "chattr, rm, shred, dd run on recovery directories or partitions" + }, + { + "name": "networkdevice:syslog", + "channel": "command sequence: erase \u2192 format \u2192 reload" + }, + { + "name": "macos:unifiedlog", + "channel": "process: at, job runner" + }, + { + "name": "macos:osquery", + "channel": "Interpreter exec with suspicious arguments as above" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of curl or wget writing files to /tmp/* followed by chmod or execution" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of downgraded interpreters such as python2 or forced fallback commands" + }, + { + "name": "auditd:PROCTITLE", + "channel": "proctitle contains chmod, chown, chgrp, setfacl, or attr with suspicious parameters (777, 755, +x, -R)" + }, + { + "name": "auditd:EXECVE", + "channel": "Execution of gsettings set org.gnome.login-screen disable-user-list true" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of dscl . create with IsHidden=1" + }, + { + "name": "linux:syslog", + "channel": "sshd logs" + }, + { + "name": "esxi:shell", + "channel": "Shell Access/Command Execution" + }, + { + "name": "networkdevice:syslog", + "channel": "CLI Command Logging" + }, + { + "name": "auditd:CONFIG_CHANGE", + "channel": "udev rule reload or trigger command executed" + }, + { + "name": "linux:cli", + "channel": "Shell history logs" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream --predicate 'processImagePath contains \"zip\" OR \"base64\"'" + }, + { + "name": "networkdevice:cli", + "channel": "command logging" + }, + { + "name": "esxi:hostd", + "channel": "Command Execution" + }, + { + "name": "macos:osquery", + "channel": "launchd + process_events" + }, + { + "name": "esxi:vmkernel", + "channel": "DCUI shell start, BusyBox activity" + }, + { + "name": "esxi:hostd", + "channel": "remote CLI + vim-cmd logging" + }, + { + "name": "networkdevice:syslog", + "channel": "CLI Command Audit" + }, + { + "name": "m365:defender", + "channel": "Activity Log: Command Invocation" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "CmdletName: Get-Recipient, Get-User" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "Execution of 'Get-WmiObject Win32_Product' or similar PowerShell cmdlets" + }, + { + "name": "linux:shell", + "channel": "Manual invocation of software enumeration commands via interactive shell" + }, + { + "name": "auditd:SYSCALL", + "channel": "Command line arguments including SPApplicationsDataType" + }, + { + "name": "AWS:CloudTrail", + "channel": "ssm:GetCommandInvocation" + }, + { + "name": "esxi:shell", + "channel": "esxcli software vib list" + }, + { + "name": "auditd:EXECVE", + "channel": "execution of setfattr or getfattr commands" + }, + { + "name": "macos:unifiedlog", + "channel": "xattr utility execution with -w or -p flags" + }, + { + "name": "auditd:SYSCALL", + "channel": "Execution of spoofing tools (e.g., hping3, nping, scapy) sending UDP packets to known amplifier ports" + }, + { + "name": "auditd:SYSCALL", + "channel": "execution of tools like cat, grep, or awk on credential files" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of 'security', 'cat', or 'grep' commands accessing credential storage" + }, + { + "name": "linux:syslog", + "channel": "CLI access to 'show running-config', 'show password', or 'cat config.txt'" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of curl, rsync, wget with internal knowledge base or IPs" + }, + { + "name": "esxi:shell", + "channel": "/root/.ash_history" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of systemctl, loginctl, or systemd-inhibit commands related to sleep/hibernate" + }, + { + "name": "auditd:SYSCALL", + "channel": "Execution of xev, xdotool, or input activity emulators" + }, + { + "name": "macos:unifiedlog", + "channel": "launchctl load or boot-time plist registration" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of interpreters creating archive-like outputs without calling tar/gzip" + }, + { + "name": "networkdevice:syslog", + "channel": "command audit" + }, + { + "name": "networkdevice:cli", + "channel": "Interface commands" + }, + { + "name": "macos:unifiedlog", + "channel": "dscl -create" + }, + { + "name": "esxi:vmkernel", + "channel": "esxcli system account add" + }, + { + "name": "ebpf:syscalls", + "channel": "useradd or /etc/passwd modified inside container" + }, + { + "name": "auditd:SYSCALL", + "channel": "Execution of insmod, modprobe, or rmmod commands by non-standard users or outside expected timeframes" + }, + { + "name": "macos:unifiedlog", + "channel": "kextload execution from Terminal or suspicious paths" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "Execution of PowerShell without -NoProfile flag" + }, + { + "name": "auditd:EXECVE", + "channel": "Process execution of update-ca-certificates or openssl with suspicious arguments" + }, + { + "name": "macos:unifiedlog", + "channel": "xattr -d com.apple.quarantine or similar removal commands" + }, + { + "name": "azure:signinlogs", + "channel": "OperationName=SetDomainAuthentication OR Update-MsolFederatedDomain" + }, + { + "name": "linux:syslog", + "channel": "Sudo or root escalation followed by filesystem mount commands" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4101" + }, + { + "name": "networkdevice:cli", + "channel": "Execution of privileged commands such as 'copy tftp flash', 'boot system', or 'debug memory'" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve syscalls for discovery commands (uname, hostname, id, whoami, ps, netstat, mount) with command-line parameter analysis" + }, + { + "name": "auditd:PROCTITLE", + "channel": "process title records containing discovery command sequences and environmental assessment patterns" + }, + { + "name": "macos:unifiedlog", + "channel": "Security framework operations including keychain access, cryptographic operations, and certificate validation" + }, + { + "name": "m365:unified", + "channel": "Set-Mailbox, New-InboxRule" + }, + { + "name": "macos:unifiedlog", + "channel": "None" + }, + { + "name": "networkdevice:cli", + "channel": "Execution of commands disabling crypto hardware acceleration (e.g., 'no crypto engine enable')" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of curl, wget, or custom scripts accessing financial endpoints" + }, + { + "name": "auditd:EXECVE", + "channel": "Execution of chattr to set +i or +a attributes" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of chflags hidden or setfile -a V" + }, + { + "name": "esxi:shell", + "channel": "mv, rename, or chmod commands moving VM files into hidden directories" + }, + { + "name": "esxi:hostd", + "channel": "execution + payload hints" + }, + { + "name": "linux:osquery", + "channel": "process_events.command_line" + }, + { + "name": "macos:unifiedlog", + "channel": "process:spawn, process:exec" + }, + { + "name": "esxi:vobd", + "channel": "shell session start" + }, + { + "name": "networkdevice:cli", + "channel": "shell command" + }, + { + "name": "WinEventLog:Microsoft-Office-Alerts", + "channel": "Office application warning or alert on macro execution from template" + }, + { + "name": "m365:unified", + "channel": "Set-Mailbox, Set-MailboxPolicy, Set-TrustedLocation" + }, + { + "name": "m365:office", + "channel": "Execution of unsigned macro from template" + }, + { + "name": "linux:cli", + "channel": "Terminal Command History" + }, + { + "name": "macos:unifiedlog", + "channel": "csrutil disable" + }, + { + "name": "macos:unifiedlog", + "channel": "log show --predicate 'process == '" + }, + { + "name": "networkdevice:syslog", + "channel": "Privilege-level command execution" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of tar, gzip, bzip2, or openssl with output redirection" + }, + { + "name": "saas:PRMetadata", + "channel": "Commit message or branch name contains encoded strings or payload indicators" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of launchctl with setenv or bootout targeting TCC.db or AppleScript under Finder context" + }, + { + "name": "esxi:shell", + "channel": "`esxcli software vib install` with `--force` or `--no-sig-check` from shell history or `shell.log`" + }, + { + "name": "AWS:CloudTrail", + "channel": "SendCommand, StartSession, ExecuteCommand: Unexpected AWS Systems Manager command execution targeting EC2 instances" + }, + { + "name": "esxi:vmkernel", + "channel": "Unexpected restarts of management agents or shell access" + }, + { + "name": "auditd:EXECVE", + "channel": "curl or wget with POST/PUT options" + }, + { + "name": "networkdevice:syslog", + "channel": "Detected CLI command to export key material" + }, + { + "name": "networkdevice:config", + "channel": "PKI export or certificate manipulation commands" + }, + { + "name": "macos:unifiedlog", + "channel": "command execution triggered by emond (e.g., shell, curl, python)" + }, + { + "name": "esxi:vmkernel", + "channel": "esxcli, vim-cmd invocation" + }, + { + "name": "esxi:shell", + "channel": "CLI session activity" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve=/sbin/shutdown or /sbin/reboot" + }, + { + "name": "esxi:shell", + "channel": "esxcli system shutdown or reboot invoked" + }, + { + "name": "networkdevice:syslog", + "channel": "reload command issued" + }, + { + "name": "auditd:PROCTITLE", + "channel": "command-line execution patterns for system discovery utilities (uname, hostname, ifconfig, netstat, lsof, ps, mount)" + }, + { + "name": "esxi:shell", + "channel": "shell command execution for system discovery (vim-cmd, esxcli, vmware-cmd) targeting VM inventory and host configuration" + }, + { + "name": "vpxd.log", + "channel": "VM inventory queries and configuration enumeration through vCenter API calls" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve calls modifying HISTFILE or HISTCONTROL via unset/export" + }, + { + "name": "macos:unifiedlog", + "channel": "Set or unset HIST* variables in shell environment" + }, + { + "name": "esxi:shell", + "channel": "unset HISTFILE or HISTFILESIZE modifications" + }, + { + "name": "networkdevice:cli", + "channel": "Commands like 'no logging' or equivalents that disable session history" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve calls to /usr/bin/locale or shell execution of $LANG" + }, + { + "name": "macos:unifiedlog", + "channel": "defaults read -g AppleLocale or systemsetup -gettimezone" + }, + { + "name": "networkdevice:cli", + "channel": "Execution of commands such as 'copy tftp flash', 'boot system ', 'reload'" + }, + { + "name": "auditd:EXECVE", + "channel": "curl -T, rclone copy" + }, + { + "name": "auditd:SYSCALL", + "channel": "execution of systemctl or service with enable/start/modify" + }, + { + "name": "macos:unifiedlog", + "channel": "launchctl load/unload or plist file modification" + }, + { + "name": "networkdevice:syslog", + "channel": "syslog facility LOCAL7 or trap messages" + }, + { + "name": "linux:cli", + "channel": "/home/*/.bash_history" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of lsmod, modinfo, or cat /proc/modules" + }, + { + "name": "networkdevice:config", + "channel": "Configuration changes referencing 'boot system tftp' or modification of startup-config pointing to external TFTP servers" + }, + { + "name": "macos:unifiedlog", + "channel": "dscl . -create" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of commands like `ls -l@`, `xattr -l`, or custom tools interacting with resource forks" + }, + { + "name": "esxi:vpxd", + "channel": "vCenter Management" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "mobile-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:34.849000+00:00\"}, \"root['description']\": {\"new_value\": \"Command Execution involves monitoring and capturing the execution of textual commands (including shell commands, cmdlets, and scripts) within an operating system or application. These commands may include arguments or parameters and are typically executed through interpreters such as `cmd.exe`, `bash`, `zsh`, `PowerShell`, or programmatic execution. Examples: \\n\\n- Windows Command Prompt\\n - dir \\u2013 Lists directory contents.\\n - net user \\u2013 Queries or manipulates user accounts.\\n - tasklist \\u2013 Lists running processes.\\n- PowerShell\\n - Get-Process \\u2013 Retrieves processes running on a system.\\n - Set-ExecutionPolicy \\u2013 Changes PowerShell script execution policies.\\n - Invoke-WebRequest \\u2013 Downloads remote resources.\\n- Linux Shell\\n - ls \\u2013 Lists files in a directory.\\n - cat /etc/passwd \\u2013 Reads the user accounts file.\\n - curl http://malicious-site.com \\u2013 Retrieves content from a malicious URL.\\n- Container Environments\\n - docker exec \\u2013 Executes a command inside a running container.\\n - kubectl exec \\u2013 Runs commands in Kubernetes pods.\\n- macOS Terminal\\n - open \\u2013 Opens files or URLs.\\n - dscl . -list /Users \\u2013 Lists all users on the system.\\n - osascript -e \\u2013 Executes AppleScript commands.\", \"old_value\": \"Command Execution involves monitoring and capturing the execution of textual commands (including shell commands, cmdlets, and scripts) within an operating system or application. These commands may include arguments or parameters and are typically executed through interpreters such as `cmd.exe`, `bash`, `zsh`, `PowerShell`, or programmatic execution. Examples: \\n\\n- Windows Command Prompt\\n - dir \\u2013 Lists directory contents.\\n - net user \\u2013 Queries or manipulates user accounts.\\n - tasklist \\u2013 Lists running processes.\\n- PowerShell\\n - Get-Process \\u2013 Retrieves processes running on a system.\\n - Set-ExecutionPolicy \\u2013 Changes PowerShell script execution policies.\\n - Invoke-WebRequest \\u2013 Downloads remote resources.\\n- Linux Shell\\n - ls \\u2013 Lists files in a directory.\\n - cat /etc/passwd \\u2013 Reads the user accounts file.\\n - curl http://malicious-site.com \\u2013 Retrieves content from a malicious URL.\\n- Container Environments\\n - docker exec \\u2013 Executes a command inside a running container.\\n - kubectl exec \\u2013 Runs commands in Kubernetes pods.\\n- macOS Terminal\\n - open \\u2013 Opens files or URLs.\\n - dscl . -list /Users \\u2013 Lists all users on the system.\\n - osascript -e \\u2013 Executes AppleScript commands.\\n\\nThis data component can be collected through the following measures:\\n\\nEnable Command Logging\\n\\n- Windows:\\n - Enable PowerShell logging: `Set-ExecutionPolicy Bypass`, `Set-ItemProperty -Path \\\"HKLM:\\\\SOFTWARE\\\\Policies\\\\Microsoft\\\\Windows\\\\PowerShell\\\\ScriptBlockLogging\\\" -Name EnableScriptBlockLogging -Value 1`\\n - Enable Windows Event Logging:\\n - Event ID 4688: Tracks process creation, including command-line arguments.\\n - Event ID 4104: Logs PowerShell script block execution.\\n- Linux/macOS:\\n - Enable shell history logging in `.bashrc` or `.zshrc`: `export HISTTIMEFORMAT=\\\"%d/%m/%y %T \\\"`, `export PROMPT_COMMAND='history -a; history -w'`\\n - Use audit frameworks (e.g., `auditd`) to log command executions. Example rule to log all `execve` syscalls: `-a always,exit -F arch=b64 -S execve -k cmd_exec`\\n- Containers:\\n - Use runtime-specific tools like Docker\\u2019s --log-driver or Kubernetes Audit Logs to capture exec commands.\\n\\nIntegrate with Centralized Logging\\n\\n- Collect logs using a SIEM (e.g., Splunk) or cloud-based log aggregation tools like AWS CloudWatch or Azure Monitor. Example Splunk Search for Windows Event 4688:\\n`index=windows EventID=4688 CommandLine=*`\\n\\nUse Endpoint Detection and Response (EDR) Tools\\n\\n- Monitor command executions via EDR solutions \\n\\nDeploy Sysmon for Advanced Logging (Windows)\\n\\n- Use Sysmon's Event ID 1 to log process creation with command-line arguments\", \"diff\": \"--- \\n+++ \\n@@ -19,31 +19,3 @@\\n - open \\u2013 Opens files or URLs.\\n - dscl . -list /Users \\u2013 Lists all users on the system.\\n - osascript -e \\u2013 Executes AppleScript commands.\\n-\\n-This data component can be collected through the following measures:\\n-\\n-Enable Command Logging\\n-\\n-- Windows:\\n- - Enable PowerShell logging: `Set-ExecutionPolicy Bypass`, `Set-ItemProperty -Path \\\"HKLM:\\\\SOFTWARE\\\\Policies\\\\Microsoft\\\\Windows\\\\PowerShell\\\\ScriptBlockLogging\\\" -Name EnableScriptBlockLogging -Value 1`\\n- - Enable Windows Event Logging:\\n- - Event ID 4688: Tracks process creation, including command-line arguments.\\n- - Event ID 4104: Logs PowerShell script block execution.\\n-- Linux/macOS:\\n- - Enable shell history logging in `.bashrc` or `.zshrc`: `export HISTTIMEFORMAT=\\\"%d/%m/%y %T \\\"`, `export PROMPT_COMMAND='history -a; history -w'`\\n- - Use audit frameworks (e.g., `auditd`) to log command executions. Example rule to log all `execve` syscalls: `-a always,exit -F arch=b64 -S execve -k cmd_exec`\\n-- Containers:\\n- - Use runtime-specific tools like Docker\\u2019s --log-driver or Kubernetes Audit Logs to capture exec commands.\\n-\\n-Integrate with Centralized Logging\\n-\\n-- Collect logs using a SIEM (e.g., Splunk) or cloud-based log aggregation tools like AWS CloudWatch or Azure Monitor. Example Splunk Search for Windows Event 4688:\\n-`index=windows EventID=4688 CommandLine=*`\\n-\\n-Use Endpoint Detection and Response (EDR) Tools\\n-\\n-- Monitor command executions via EDR solutions \\n-\\n-Deploy Sysmon for Advanced Logging (Windows)\\n-\\n-- Use Sysmon's Event ID 1 to log process creation with command-line arguments\"}, \"root['x_mitre_log_sources'][4]['channel']\": {\"new_value\": \"cron activity\", \"old_value\": \"/var/log/syslog or journalctl\"}, \"root['x_mitre_log_sources'][10]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}, \"root['x_mitre_log_sources'][35]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4104\"}, \"root['x_mitre_log_sources'][226]['name']\": {\"new_value\": \"azure:signinlogs\", \"old_value\": \"azure:signinLogs\", \"new_path\": \"root['x_mitre_log_sources'][222]['name']\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][36]\": {\"name\": \"WinEventLog:Powershell\", \"channel\": \"EventCode=4104\"}, \"root['x_mitre_log_sources'][66]\": {\"name\": \"WinEventLog:PowerShell\", \"channel\": \"EventCode=4103,4104\"}, \"root['x_mitre_log_sources'][90]\": {\"name\": \"WinEventLog:PowerShell\", \"channel\": \"EventCode=4103\"}, \"root['x_mitre_log_sources'][212]\": {\"name\": \"WinEventLog:PowerShell\", \"channel\": \"EventCode=4103,4104,4105, 4106\"}, \"root['x_mitre_log_sources'][230]\": {\"name\": \"WinEventLog:PowerShell\", \"channel\": \"EventCode=4105\"}, \"root['x_mitre_log_sources'][231]\": {\"name\": \"WinEventLog:PowerShell\", \"channel\": \"EventCode=4106\"}, \"root['x_mitre_log_sources'][269]\": {\"name\": \"WinEventLog:PowerShell\", \"channel\": \"EventCode=4103, 4104\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Command Execution involves monitoring and capturing the exect1Command Execution involves monitoring and capturing the exec
>ution of textual commands (including shell commands, cmdlets>ution of textual commands (including shell commands, cmdlets
>, and scripts) within an operating system or application. Th>, and scripts) within an operating system or application. Th
>ese commands may include arguments or parameters and are typ>ese commands may include arguments or parameters and are typ
>ically executed through interpreters such as `cmd.exe`, `bas>ically executed through interpreters such as `cmd.exe`, `bas
>h`, `zsh`, `PowerShell`, or programmatic execution. Examples>h`, `zsh`, `PowerShell`, or programmatic execution. Examples
>:   - Windows Command Prompt     - dir \u2013 Lists directory con>:   - Windows Command Prompt     - dir \u2013 Lists directory con
>tents.     - net user \u2013 Queries or manipulates user accounts>tents.     - net user \u2013 Queries or manipulates user accounts
>.     - tasklist \u2013 Lists running processes. - PowerShell    >.     - tasklist \u2013 Lists running processes. - PowerShell    
> - Get-Process \u2013 Retrieves processes running on a system.   > - Get-Process \u2013 Retrieves processes running on a system.   
>  - Set-ExecutionPolicy \u2013 Changes PowerShell script executio>  - Set-ExecutionPolicy \u2013 Changes PowerShell script executio
>n policies.     - Invoke-WebRequest \u2013 Downloads remote resou>n policies.     - Invoke-WebRequest \u2013 Downloads remote resou
>rces. - Linux Shell     - ls \u2013 Lists files in a directory.  >rces. - Linux Shell     - ls \u2013 Lists files in a directory.  
>   - cat /etc/passwd \u2013 Reads the user accounts file.     - c>   - cat /etc/passwd \u2013 Reads the user accounts file.     - c
>url http://malicious-site.com \u2013 Retrieves content from a mal>url http://malicious-site.com \u2013 Retrieves content from a mal
>icious URL. - Container Environments     - docker exec \u2013 Exe>icious URL. - Container Environments     - docker exec \u2013 Exe
>cutes a command inside a running container.     - kubectl ex>cutes a command inside a running container.     - kubectl ex
>ec \u2013 Runs commands in Kubernetes pods. - macOS Terminal     >ec \u2013 Runs commands in Kubernetes pods. - macOS Terminal     
>- open \u2013 Opens files or URLs.     - dscl . -list /Users \u2013 Li>- open \u2013 Opens files or URLs.     - dscl . -list /Users \u2013 Li
>sts all users on the system.     - osascript -e \u2013 Executes A>sts all users on the system.     - osascript -e \u2013 Executes A
>ppleScript commands.  This data component can be collected t>ppleScript commands.
>hrough the following measures:  Enable Command Logging  - Wi 
>ndows:     - Enable PowerShell logging: `Set-ExecutionPolicy 
> Bypass`, `Set-ItemProperty -Path \"HKLM:\\SOFTWARE\\Policies\\M 
>icrosoft\\Windows\\PowerShell\\ScriptBlockLogging\" -Name Enable 
>ScriptBlockLogging -Value 1`     - Enable Windows Event Logg 
>ing:         - Event ID 4688: Tracks process creation, inclu 
>ding command-line arguments.         - Event ID 4104: Logs P 
>owerShell script block execution. - Linux/macOS:     - Enabl 
>e shell history logging in `.bashrc` or `.zshrc`: `export HI 
>STTIMEFORMAT=\"%d/%m/%y %T \"`, `export PROMPT_COMMAND='histor 
>y -a; history -w'`     - Use audit frameworks (e.g., `auditd 
>`) to log command executions. Example rule to log all `execv 
>e` syscalls: `-a always,exit -F arch=b64 -S execve -k cmd_ex 
>ec` - Containers:     - Use runtime-specific tools like Dock 
>er\u2019s --log-driver or Kubernetes Audit Logs to capture exec c 
>ommands.  Integrate with Centralized Logging  - Collect logs 
> using a SIEM (e.g., Splunk) or cloud-based log aggregation  
>tools like AWS CloudWatch or Azure Monitor. Example Splunk S 
>earch for Windows Event 4688: `index=windows EventID=4688 Co 
>mmandLine=*`  Use Endpoint Detection and Response (EDR) Tool 
>s  - Monitor command executions via EDR solutions   Deploy S 
>ysmon for Advanced Logging (Windows)  - Use Sysmon's Event I 
>D 1 to log process creation with command-line arguments 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--3d6e6b3b-4aa8-40e1-8c47-91db0f313d9f", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.273000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0042", + "external_id": "DC0042" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Drive Creation", + "description": "The activity of assigning a new drive letter or creating a mount point for a data storage device, such as a USB, network share, or external hard drive, enabling access to its content on a host system. Examples: \n\n- USB Drive Insertion: A USB drive is plugged in and automatically assigned the letter `E:\\` on a Windows machine.\n- Network Drive Mapping: A network share `\\\\server\\share` is mapped to the drive `Z:\\`.\n- Virtual Drive Creation: A virtual disk is mounted on `/mnt/virtualdrive` using an ISO image or a virtual hard disk (VHD).\n- Cloud Storage Mounting: Google Drive is mounted as `G:\\` on a Windows machine using a cloud sync tool.\n- External Storage Integration: An external HDD or SSD is connected and assigned `/mnt/external` on a Linux system..", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Drive", + "channel": "None" + }, + { + "name": "WinEventLog:System", + "channel": "Kernel-PnP 410/400 device install, disk added" + }, + { + "name": "auditd:SYSCALL", + "channel": "mknod,open,openat" + }, + { + "name": "macos:unifiedlog", + "channel": "mounted|appeared|DA: disk* attached" + }, + { + "name": "WinEventLog:System", + "channel": "EventCode=1006" + }, + { + "name": "auditd:SYSCALL", + "channel": "Removable media mount notification" + }, + { + "name": "macos:unifiedlog", + "channel": "com.apple.diskarbitration" + }, + { + "name": "WinEventLog:System", + "channel": "EventCode=1006, 10001" + }, + { + "name": "auditd:SYSCALL", + "channel": "device event logs" + }, + { + "name": "linux:osquery", + "channel": "mount_events" + }, + { + "name": "macos:unifiedlog", + "channel": "Volume Mount + File Read" + }, + { + "name": "WinEventLog:System", + "channel": "EventCode=2003" + }, + { + "name": "auditd:SYSCALL", + "channel": "udev events or drive enumeration involving TinyPilot paths or device classes" + }, + { + "name": "linux:syslog", + "channel": "Device attach logs containing TinyPilot/PiKVM identifiers" + }, + { + "name": "macos:unifiedlog", + "channel": "Hardware enumeration events via IOKit or USBMuxd showing TinyPilot or unknown keyboard/mouse" + }, + { + "name": "auditd:SYSCALL", + "channel": "Kernel Device Events - USB Block Devices" + }, + { + "name": "maos:osquery", + "channel": "mount_events" + }, + { + "name": "macos:unifiedlog", + "channel": "Volume Mount + Process Trace + File Read" + }, + { + "name": "journald:systemd", + "channel": "udisks2 or udevd logs" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream --predicate 'eventMessage contains \"USBMSC\"'" + }, + { + "name": "linux:syslog", + "channel": "New HID device enumeration with type 'keyboard' followed by immediate input injection" + }, + { + "name": "macos:unifiedlog", + "channel": "New IOUSB keyboard/HID device enumerated with suspicious attributes" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:37.342000+00:00\"}, \"root['description']\": {\"new_value\": \"The activity of assigning a new drive letter or creating a mount point for a data storage device, such as a USB, network share, or external hard drive, enabling access to its content on a host system. Examples: \\n\\n- USB Drive Insertion: A USB drive is plugged in and automatically assigned the letter `E:\\\\` on a Windows machine.\\n- Network Drive Mapping: A network share `\\\\\\\\server\\\\share` is mapped to the drive `Z:\\\\`.\\n- Virtual Drive Creation: A virtual disk is mounted on `/mnt/virtualdrive` using an ISO image or a virtual hard disk (VHD).\\n- Cloud Storage Mounting: Google Drive is mounted as `G:\\\\` on a Windows machine using a cloud sync tool.\\n- External Storage Integration: An external HDD or SSD is connected and assigned `/mnt/external` on a Linux system..\", \"old_value\": \"The activity of assigning a new drive letter or creating a mount point for a data storage device, such as a USB, network share, or external hard drive, enabling access to its content on a host system. Examples: \\n\\n- USB Drive Insertion: A USB drive is plugged in and automatically assigned the letter `E:\\\\` on a Windows machine.\\n- Network Drive Mapping: A network share `\\\\\\\\server\\\\share` is mapped to the drive `Z:\\\\`.\\n- Virtual Drive Creation: A virtual disk is mounted on `/mnt/virtualdrive` using an ISO image or a virtual hard disk (VHD).\\n- Cloud Storage Mounting: Google Drive is mounted as `G:\\\\` on a Windows machine using a cloud sync tool.\\n- External Storage Integration: An external HDD or SSD is connected and assigned `/mnt/external` on a Linux system.\\n\\nThis data component can be collected through the following measures:\\n\\nWindows Event Logs\\n\\n- Relevant Events:\\n - Event ID 98: Logs the creation of a volume (mount or new drive letter assignment).\\n - Event ID 1006: Logs removable storage device insertions.\\n- Configuration: Enable \\\"Removable Storage Events\\\" in the Group Policy settings:\\n`Computer Configuration > Administrative Templates > System > Removable Storage Access`\\n\\nLinux System Logs\\n\\n- Command-Line Monitoring: Use `dmesg` or `journalctl` to monitor mount events.\\n\\n- Auditd Configuration: Add audit rules to track mount points.\\n- Logs can be reviewed in /var/log/audit/audit.log.\\n\\nmacOS System Logs\\n\\n- Unified Logs: Monitor system logs for mount activity:\\n- Command-Line Tools: Use `diskutil list` to verify newly created or mounted drives.\\n\\nEndpoint Detection and Response (EDR) Tools\\n\\n- EDR solutions can log removable drive usage and network-mounted drives. Configure EDR policies to alert on suspicious drive creation events.\\n\\nSIEM Tools\\n\\n- Centralize logs from multiple platforms into a SIEM (e.g., Splunk) to correlate and alert on suspicious drive creation activities.\", \"diff\": \"--- \\n+++ \\n@@ -4,34 +4,4 @@\\n - Network Drive Mapping: A network share `\\\\\\\\server\\\\share` is mapped to the drive `Z:\\\\`.\\n - Virtual Drive Creation: A virtual disk is mounted on `/mnt/virtualdrive` using an ISO image or a virtual hard disk (VHD).\\n - Cloud Storage Mounting: Google Drive is mounted as `G:\\\\` on a Windows machine using a cloud sync tool.\\n-- External Storage Integration: An external HDD or SSD is connected and assigned `/mnt/external` on a Linux system.\\n-\\n-This data component can be collected through the following measures:\\n-\\n-Windows Event Logs\\n-\\n-- Relevant Events:\\n- - Event ID 98: Logs the creation of a volume (mount or new drive letter assignment).\\n- - Event ID 1006: Logs removable storage device insertions.\\n-- Configuration: Enable \\\"Removable Storage Events\\\" in the Group Policy settings:\\n-`Computer Configuration > Administrative Templates > System > Removable Storage Access`\\n-\\n-Linux System Logs\\n-\\n-- Command-Line Monitoring: Use `dmesg` or `journalctl` to monitor mount events.\\n-\\n-- Auditd Configuration: Add audit rules to track mount points.\\n-- Logs can be reviewed in /var/log/audit/audit.log.\\n-\\n-macOS System Logs\\n-\\n-- Unified Logs: Monitor system logs for mount activity:\\n-- Command-Line Tools: Use `diskutil list` to verify newly created or mounted drives.\\n-\\n-Endpoint Detection and Response (EDR) Tools\\n-\\n-- EDR solutions can log removable drive usage and network-mounted drives. Configure EDR policies to alert on suspicious drive creation events.\\n-\\n-SIEM Tools\\n-\\n-- Centralize logs from multiple platforms into a SIEM (e.g., Splunk) to correlate and alert on suspicious drive creation activities.\\n+- External Storage Integration: An external HDD or SSD is connected and assigned `/mnt/external` on a Linux system..\"}, \"root['x_mitre_log_sources'][4]['name']\": {\"new_value\": \"WinEventLog:System\", \"old_value\": \"WinEventLog:Microsoft-Windows-Partition/Diagnostic\"}, \"root['x_mitre_log_sources'][7]['channel']\": {\"new_value\": \"EventCode=1006, 10001\", \"old_value\": \"EventCode=1006,10001\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][11]\": {\"name\": \"WinEventLog:Microsoft-Windows-DriverFrameworks-UserMode/Operational\", \"channel\": \"EventCode=2003\"}, \"root['x_mitre_log_sources'][19]\": {\"name\": \"WinEventLog:System\", \"channel\": \"EventCode=20001/20003\"}, \"root['x_mitre_log_sources'][22]\": {\"name\": \"WinEventLog:System\", \"channel\": \"20001-20003\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1The activity of assigning a new drive letter or creating a mt1The activity of assigning a new drive letter or creating a m
>ount point for a data storage device, such as a USB, network>ount point for a data storage device, such as a USB, network
> share, or external hard drive, enabling access to its conte> share, or external hard drive, enabling access to its conte
>nt on a host system. Examples:   - USB Drive Insertion: A US>nt on a host system. Examples:   - USB Drive Insertion: A US
>B drive is plugged in and automatically assigned the letter >B drive is plugged in and automatically assigned the letter 
>`E:\\` on a Windows machine. - Network Drive Mapping: A netwo>`E:\\` on a Windows machine. - Network Drive Mapping: A netwo
>rk share `\\\\server\\share` is mapped to the drive `Z:\\`. - Vi>rk share `\\\\server\\share` is mapped to the drive `Z:\\`. - Vi
>rtual Drive Creation: A virtual disk is mounted on `/mnt/vir>rtual Drive Creation: A virtual disk is mounted on `/mnt/vir
>tualdrive` using an ISO image or a virtual hard disk (VHD). >tualdrive` using an ISO image or a virtual hard disk (VHD). 
>- Cloud Storage Mounting: Google Drive is mounted as `G:\\` o>- Cloud Storage Mounting: Google Drive is mounted as `G:\\` o
>n a Windows machine using a cloud sync tool. - External Stor>n a Windows machine using a cloud sync tool. - External Stor
>age Integration: An external HDD or SSD is connected and ass>age Integration: An external HDD or SSD is connected and ass
>igned `/mnt/external` on a Linux system.  This data componen>igned `/mnt/external` on a Linux system..
>t can be collected through the following measures:  Windows  
>Event Logs  - Relevant Events:     - Event ID 98: Logs the c 
>reation of a volume (mount or new drive letter assignment).  
>    - Event ID 1006: Logs removable storage device insertion 
>s. - Configuration: Enable \"Removable Storage Events\" in the 
> Group Policy settings: `Computer Configuration > Administra 
>tive Templates > System > Removable Storage Access`  Linux S 
>ystem Logs  - Command-Line Monitoring: Use `dmesg` or `journ 
>alctl` to monitor mount events.  - Auditd Configuration: Add 
> audit rules to track mount points. - Logs can be reviewed i 
>n /var/log/audit/audit.log.  macOS System Logs  - Unified Lo 
>gs: Monitor system logs for mount activity: - Command-Line T 
>ools: Use `diskutil list` to verify newly created or mounted 
> drives.  Endpoint Detection and Response (EDR) Tools  - EDR 
> solutions can log removable drive usage and network-mounted 
> drives. Configure EDR policies to alert on suspicious drive 
> creation events.  SIEM Tools  - Centralize logs from multip 
>le platforms into a SIEM (e.g., Splunk) to correlate and ale 
>rt on suspicious drive creation activities. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--4dcd8ba3-2075-4f8b-941e-39884ffaac08", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.273000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0046", + "external_id": "DC0046" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Drive Modification", + "description": "The alteration of a drive letter, mount point, or other attributes of a data storage device, which could involve reassignment, renaming, permissions changes, or other modifications. Examples: \n\n- Drive Letter Reassignment: A USB drive previously assigned `E:\\` is reassigned to `D:\\` on a Windows machine.\n- Mount Point Change: On a Linux system, a mounted storage device at `/mnt/external` is moved to `/mnt/storage`.\n- Drive Permission Changes: A shared drive's permissions are modified to allow write access for unauthorized users or processes.\n- Renaming of a Drive: A network drive labeled \"HR_Share\" is renamed to \"Shared_Resources.\"\n- Modification of Cloud-Integrated Drives: A cloud storage mount such as Google Drive is modified to sync only specific folders.\n\nThis data component can be collected through the following measures:\n\nWindows Event Logs\n\n- Relevant Events:\n - Event ID 98: Indicates changes to a volume (e.g., drive letter reassignment).\n - Event ID 1006: Logs permission modifications or changes to removable storage.\n- Configuration: Enable \"Storage Operational Logs\" in the Event Viewer:\n`Applications and Services Logs > Microsoft > Windows > Storage-Tiering > Operational`\n\nLinux System Logs\n\n- Auditd Configuration: Add audit rules to track changes to mounted drives: `auditctl -w /mnt/ -p w -k drive_modification`\n- Command-Line Monitoring: Use `dmesg` or `journalctl` to observe drive modifications.\n\nmacOS System Logs\n\n- Unified Logs: Collect mount or drive modification events: `log show --info | grep \"Volume modified\"`\n- Command-Line Monitoring: Use `diskutil` to track changes:\n\nEndpoint Detection and Response (EDR) Tools\n\n- Configure policies in EDR solutions to monitor and log changes to drive configurations or attributes.\n\nSIEM Tools\n\n- Aggregate logs from multiple systems into a centralized platform like Splunk to correlate events and alert on suspicious drive modification activities.\n", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Drive", + "channel": "None" + }, + { + "name": "networkdevice:runtime", + "channel": "Firmware image uploaded via TFTP/FTP/SCP" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "Raw disk write access via \\\\.\\PhysicalDrive* or \\\\.\\C:" + }, + { + "name": "macos:unifiedlog", + "channel": "IOKit disk write calls targeting raw devices" + }, + { + "name": "linux:syslog", + "channel": "Block device write errors or unusual bootloader activity" + }, + { + "name": "networkdevice:firmware", + "channel": "Unexpected firmware image upload events via TFTP/FTP/SCP" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "Raw write attempts targeting \\\\.\\PhysicalDrive0 or sector 0 (MBR/partition table)" + }, + { + "name": "macos:unifiedlog", + "channel": "IOKit raw disk write to EFI/boot partition sectors" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "Raw disk writes targeting \\\\.\\PhysicalDrive* or MBR locations" + }, + { + "name": "macos:unifiedlog", + "channel": "IOKit raw disk write activity targeting physical devices" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_data_source_ref": "", + "x_mitre_domains": [ + "enterprise-attack", + "ics-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-22 19:03:17.198000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/datacomponents/DC0046\", \"old_value\": \"https://attack.mitre.org/data-components/DC0046\"}}}", + "previous_version": "2.0" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--235b7491-2d2b-4617-9a52-3c0783680f71", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.273000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0055", + "external_id": "DC0055" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "File Access", + "description": "To events where a file is opened or accessed, making its contents available to the requester. This includes reading, executing, or interacting with files by authorized or unauthorized entities. Examples include logging file access events (e.g., Windows Event ID 4663), monitoring file reads, and detecting unusual file access patterns. Examples: \n\n- File Read Operations: A user opens a sensitive document (e.g., financial_report.xlsx) on a shared drive.\n- File Execution: A script or executable file is accessed and executed (e.g., malware.exe is run from a temporary directory).\n- Unauthorized File Access: An unauthorized user attempts to access a protected configuration file (e.g., `/etc/passwd` on Linux or `System32` files on Windows).\n- File Access Patterns: Bulk access to multiple files in a short time (e.g., mass access to documents on a file server).\n- File Access via Network: Files on a network share are accessed remotely (e.g., logs of SMB file access).", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "File", + "channel": "None" + }, + { + "name": "m365:unified", + "channel": "FileAccessed, MailboxAccessed" + }, + { + "name": "auditd:SYSCALL", + "channel": "open, read, or stat of browser config files" + }, + { + "name": "macos:unifiedlog", + "channel": "Access to ~/Library/*/Safari or Chrome directories by non-browser processes" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "name": "macos:unifiedlog", + "channel": "file events" + }, + { + "name": "gcp:audit", + "channel": "Write operations to storage" + }, + { + "name": "esxi:vmkernel", + "channel": "VMFS access logs" + }, + { + "name": "macos:endpointsecurity", + "channel": "ES_EVENT_TYPE_NOTIFY_OPEN: Open of .dylib/.so in user-writable locations" + }, + { + "name": "auditd:SYSCALL", + "channel": "open: File access attempt on /tmp/krb5cc_* or /tmp/krb5.ccache" + }, + { + "name": "macos:unifiedlog", + "channel": "Kerberos framework calls to API:{uuid} cache outside normal process lineage" + }, + { + "name": "auditd:SYSCALL", + "channel": "openat" + }, + { + "name": "auditd:FILE", + "channel": "/home/*/.mozilla/firefox/*/logins.json OR /home/*/.config/google-chrome/*/Login Data" + }, + { + "name": "macos:unifiedlog", + "channel": "~/Library/Application Support/Google/Chrome/*/Login Data OR ~/Library/Application Support/Firefox/*/logins.json" + }, + { + "name": "auditd:SYSCALL", + "channel": "open" + }, + { + "name": "auditd:FILE", + "channel": "/proc/*/mem read attempt" + }, + { + "name": "auditd:PATH", + "channel": "Read access to known backup software configuration files (e.g., /etc/rsnapshot.conf, /opt/veeam/config.ini)" + }, + { + "name": "macos:unifiedlog", + "channel": "Read access to Time Machine plist files or CCC configurations in ~/Library/Preferences/" + }, + { + "name": "auditd:SYSCALL", + "channel": "open, read" + }, + { + "name": "linux:syslog", + "channel": "auth.log or custom tool logs" + }, + { + "name": "fs:fsusage", + "channel": "file" + }, + { + "name": "linux:syslog", + "channel": "/var/log/syslog" + }, + { + "name": "macos:osquery", + "channel": "file_events" + }, + { + "name": "auditd:SYSCALL", + "channel": "open, flock, fcntl, unlink" + }, + { + "name": "fs:fsusage", + "channel": "File Access Monitor" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream - file subsystem" + }, + { + "name": "auditd:SYSCALL", + "channel": "read/open of sensitive files" + }, + { + "name": "macos:unifiedlog", + "channel": "file read of sensitive directories" + }, + { + "name": "esxi:hostd", + "channel": "datastore file access" + }, + { + "name": "auditd:SYSCALL", + "channel": "Unusual processes accessing or modifying cookie databases" + }, + { + "name": "macos:unifiedlog", + "channel": "Abnormal process access to Safari or Chrome cookie storage" + }, + { + "name": "auditd:SYSCALL", + "channel": "PATH records referencing /dev/video*" + }, + { + "name": "macos:endpointsecurity", + "channel": "open: Process opens AppleCamera/IOUSB device nodes or AVFoundation frameworks" + }, + { + "name": "ebpf:syscalls", + "channel": "container_file_activity" + }, + { + "name": "fs:fsusage", + "channel": "Disk Activity Tracing" + }, + { + "name": "macos:keychain", + "channel": "Access to Keychain DB or system.keychain" + }, + { + "name": "auditd:SYSCALL", + "channel": "open, read: /etc/ssl/, /etc/pki/, ~/.pki/nssdb/" + }, + { + "name": "macos:keychain", + "channel": "~/Library/Keychains, /Library/Keychains" + }, + { + "name": "m365:unified", + "channel": "Bulk downloads or API extractions from Microsoft-hosted data repositories (e.g., Dynamics 365)" + }, + { + "name": "auditd:PATH", + "channel": "open: Access to sensitive log files (/var/log/auth.log, /var/log/secure, /var/log/syslog)" + }, + { + "name": "macos:unifiedlog", + "channel": "open: Access to /var/log/system.log or related security event logs" + }, + { + "name": "azure:activity", + "channel": "CollectGuestLogs: Unexpected collection of guest logs by Azure VM Agent outside normal maintenance windows" + }, + { + "name": "esxi:hostd", + "channel": "read: Access to sensitive log files by non-admin users" + }, + { + "name": "auditd:SYSCALL", + "channel": "Processes reading credential or token cache files" + }, + { + "name": "auditd:SYSCALL", + "channel": "read/open of sensitive file directories" + }, + { + "name": "esxi:hostd", + "channel": "datastore/log file access" + }, + { + "name": "fs:fsusage", + "channel": "filesystem activity" + }, + { + "name": "WinEventLog:Microsoft-Windows-Windows Defender/Operational", + "channel": "Suspicious file execution on removable media path" + }, + { + "name": "auditd:PATH", + "channel": "PATH" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/read of sensitive config or secret files" + }, + { + "name": "macos:unifiedlog", + "channel": "open/read of *.plist or .env files" + }, + { + "name": "ebpf:syscalls", + "channel": "open/read on secret mount paths" + }, + { + "name": "CloudTrail:GetObject", + "channel": "sensitive credential files in buckets or local image storage" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/read of sensitive directories" + }, + { + "name": "macos:unifiedlog", + "channel": "read of user document directories" + }, + { + "name": "esxi:syslog", + "channel": "guest OS outbound transfer logs" + }, + { + "name": "fs:fsusage", + "channel": "Filesystem Call Monitoring" + }, + { + "name": "esxi:hostd", + "channel": "vSphere File API Access" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/read: Access to /proc/self/status with focus on TracerPID field" + }, + { + "name": "fs:fsusage", + "channel": "read/write" + }, + { + "name": "esxis:vmkernel", + "channel": "Datastore Access" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/read access to ~/.bash_history" + }, + { + "name": "macos:endpointsecurity", + "channel": "open or read syscall to ~/.bash_history" + }, + { + "name": "macos:unifiedlog", + "channel": "read access to ~/Library/Keychains/login.keychain-db" + }, + { + "name": "auditd:SYSCALL", + "channel": "open,read" + }, + { + "name": "macos:unifiedlog", + "channel": "filesystem and process events" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/read system calls to ~/.bash_history or /etc/shadow" + }, + { + "name": "macos:unifiedlog", + "channel": "read access to ~/Library/Keychains or history files by terminal processes" + }, + { + "name": "auditd:SYSCALL", + "channel": "read of /run/secrets or docker volumes by non-entrypoint process" + }, + { + "name": "macos:unifiedlog", + "channel": "access to /Volumes/SharePoint or network mount" + }, + { + "name": "auditd:SYSCALL", + "channel": "Reads of ~/.bash_history, ~/.mozilla, or access to /dev/input" + }, + { + "name": "macos:unifiedlog", + "channel": "Access to ~/Library/Safari/Bookmarks.plist or recent files" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/read" + }, + { + "name": "macos:unifiedlog", + "channel": "access to keychain database" + }, + { + "name": "auditd:PATH", + "channel": "file read" + }, + { + "name": "linux:syslog", + "channel": "kernel messages related to cryptographic operations, module loading, and filesystem access patterns" + }, + { + "name": "fs:fsevents", + "channel": "file system events indicating access to system configuration files and environmental information sources" + }, + { + "name": "macos:endpointsecurity", + "channel": "es_event_open, es_event_exec" + }, + { + "name": "auditd:SYSCALL", + "channel": "open: Access to named pipes or FIFO in /tmp or /dev/shm by unexpected processes" + }, + { + "name": "auditd:SYSCALL", + "channel": "open or read to browser cookie storage" + }, + { + "name": "fs:fsusage", + "channel": "file open for known browser cookie paths" + }, + { + "name": "auditd:SYSCALL", + "channel": "open, read, mount" + }, + { + "name": "fs:fsusage", + "channel": "file reads/writes from /Volumes/" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream - file provider subsystem" + }, + { + "name": "auditd:SYSCALL", + "channel": "file" + }, + { + "name": "kubernetes:audit", + "channel": "GET or LIST requests to /var/run/secrets/kubernetes.io/serviceaccount/ followed by access to the Kubernetes API server" + }, + { + "name": "auditd:SYSCALL", + "channel": "Access to /var/lib/sss/secrets/secrets.ldb or .secrets.mkey" + }, + { + "name": "fs:quarantine", + "channel": "/var/log/quarantine.log" + }, + { + "name": "desktop:file_manager", + "channel": "nautilus, dolphin, or gvfs logs" + }, + { + "name": "linux:osquery", + "channel": "/proc/*/maps access" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/read of sensitive directories (/etc, /home/*)" + }, + { + "name": "macos:unifiedlog", + "channel": "read/write of user documents prior to upload" + }, + { + "name": "esxi:hostd", + "channel": "file copy or datastore upload via HTTPS" + }, + { + "name": "macos:unifiedlog", + "channel": "open/read access to private key files (id_rsa, *.pem, *.p12)" + }, + { + "name": "linux:osquery", + "channel": "None" + }, + { + "name": "macos:osquery", + "channel": "None" + }, + { + "name": "fs:fileevents", + "channel": "File system access events with kFSEventStreamEventFlagItemRemoved, kFSEventStreamEventFlagItemRenamed flags for environmental artifact collection (/System/Library, /usr/sbin, plist files)" + }, + { + "name": "auditd:FS", + "channel": "read: File access to /proc/modules or /sys/module/" + }, + { + "name": "macos:unifiedlog", + "channel": "read: File access to /System/Library/Extensions/ or related kernel extension paths" + }, + { + "name": "auditd:SYSCALL", + "channel": "PATH" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/read on ~/.local/share/keepassxc/* OR ~/.password-store/*" + }, + { + "name": "macos:unifiedlog", + "channel": "*.opvault OR *.ldb OR *.kdbx" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:35.674000+00:00\"}, \"root['description']\": {\"new_value\": \"To events where a file is opened or accessed, making its contents available to the requester. This includes reading, executing, or interacting with files by authorized or unauthorized entities. Examples include logging file access events (e.g., Windows Event ID 4663), monitoring file reads, and detecting unusual file access patterns. Examples: \\n\\n- File Read Operations: A user opens a sensitive document (e.g., financial_report.xlsx) on a shared drive.\\n- File Execution: A script or executable file is accessed and executed (e.g., malware.exe is run from a temporary directory).\\n- Unauthorized File Access: An unauthorized user attempts to access a protected configuration file (e.g., `/etc/passwd` on Linux or `System32` files on Windows).\\n- File Access Patterns: Bulk access to multiple files in a short time (e.g., mass access to documents on a file server).\\n- File Access via Network: Files on a network share are accessed remotely (e.g., logs of SMB file access).\", \"old_value\": \"To events where a file is opened or accessed, making its contents available to the requester. This includes reading, executing, or interacting with files by authorized or unauthorized entities. Examples include logging file access events (e.g., Windows Event ID 4663), monitoring file reads, and detecting unusual file access patterns. Examples: \\n\\n- File Read Operations: A user opens a sensitive document (e.g., financial_report.xlsx) on a shared drive.\\n- File Execution: A script or executable file is accessed and executed (e.g., malware.exe is run from a temporary directory).\\n- Unauthorized File Access: An unauthorized user attempts to access a protected configuration file (e.g., `/etc/passwd` on Linux or `System32` files on Windows).\\n- File Access Patterns: Bulk access to multiple files in a short time (e.g., mass access to documents on a file server).\\n- File Access via Network: Files on a network share are accessed remotely (e.g., logs of SMB file access).\\n\\nThis data component can be collected through the following measures:\\n\\nWindows\\n\\n- Windows Event Logs: Event ID 4663: Captures file system auditing details, including who accessed the file, access type, and file name.\\n- Sysmon:\\n - Event ID 11: Logs file creation time changes.\\n - Event ID 1 (process creation): Can provide insight into files executed.\\n- PowerShell: Commands to monitor file access in real-time: `Get-WinEvent -FilterHashtable @{LogName='Security'; ID=4663}`\\n\\nLinux\\n\\n- Auditd: Monitor file access events using audit rules: `auditctl -w /path/to/file -p rwxa -k file_access`\\n- View logs: `ausearch -k file_access`\\n- Inotify: Use inotify to track file access on Linux: `inotifywait -m /path/to/watch -e access`\\n\\nmacOS\\n\\n- Unified Logs: Monitor file access using the macOS Unified Logging System.\\n- FSEvents: File System Events can track file accesses: `fs_usage | grep open`\\n\\nNetwork Devices\\n\\n- SMB/CIFS Logs: Monitor file access over network shares using logs from SMB or CIFS protocol.\\n- NAS Logs: Collect logs from network-attached storage systems for file access events.\\n\\nSIEM Integration\\n\\n- Collect file access logs from all platforms (Windows, Linux, macOS) and centralize in a SIEM for correlation and analysis.\", \"diff\": \"--- \\n+++ \\n@@ -5,33 +5,3 @@\\n - Unauthorized File Access: An unauthorized user attempts to access a protected configuration file (e.g., `/etc/passwd` on Linux or `System32` files on Windows).\\n - File Access Patterns: Bulk access to multiple files in a short time (e.g., mass access to documents on a file server).\\n - File Access via Network: Files on a network share are accessed remotely (e.g., logs of SMB file access).\\n-\\n-This data component can be collected through the following measures:\\n-\\n-Windows\\n-\\n-- Windows Event Logs: Event ID 4663: Captures file system auditing details, including who accessed the file, access type, and file name.\\n-- Sysmon:\\n- - Event ID 11: Logs file creation time changes.\\n- - Event ID 1 (process creation): Can provide insight into files executed.\\n-- PowerShell: Commands to monitor file access in real-time: `Get-WinEvent -FilterHashtable @{LogName='Security'; ID=4663}`\\n-\\n-Linux\\n-\\n-- Auditd: Monitor file access events using audit rules: `auditctl -w /path/to/file -p rwxa -k file_access`\\n-- View logs: `ausearch -k file_access`\\n-- Inotify: Use inotify to track file access on Linux: `inotifywait -m /path/to/watch -e access`\\n-\\n-macOS\\n-\\n-- Unified Logs: Monitor file access using the macOS Unified Logging System.\\n-- FSEvents: File System Events can track file accesses: `fs_usage | grep open`\\n-\\n-Network Devices\\n-\\n-- SMB/CIFS Logs: Monitor file access over network shares using logs from SMB or CIFS protocol.\\n-- NAS Logs: Collect logs from network-attached storage systems for file access events.\\n-\\n-SIEM Integration\\n-\\n-- Collect file access logs from all platforms (Windows, Linux, macOS) and centralize in a SIEM for correlation and analysis.\"}, \"root['x_mitre_log_sources'][4]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][12]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4656, 4663\"}, \"root['x_mitre_log_sources'][17]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4656,4663\"}, \"root['x_mitre_log_sources'][18]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4670, 4663\"}, \"root['x_mitre_log_sources'][21]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4656\"}, \"root['x_mitre_log_sources'][23]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=5145, 4663\"}, \"root['x_mitre_log_sources'][53]\": {\"name\": \"auditd:PATH\", \"channel\": \"path\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1To events where a file is opened or accessed, making its cont1To events where a file is opened or accessed, making its con
>tents available to the requester. This includes reading, exe>tents available to the requester. This includes reading, exe
>cuting, or interacting with files by authorized or unauthori>cuting, or interacting with files by authorized or unauthori
>zed entities. Examples include logging file access events (e>zed entities. Examples include logging file access events (e
>.g., Windows Event ID 4663), monitoring file reads, and dete>.g., Windows Event ID 4663), monitoring file reads, and dete
>cting unusual file access patterns. Examples:   - File Read >cting unusual file access patterns. Examples:   - File Read 
>Operations: A user opens a sensitive document (e.g., financi>Operations: A user opens a sensitive document (e.g., financi
>al_report.xlsx) on a shared drive. - File Execution: A scrip>al_report.xlsx) on a shared drive. - File Execution: A scrip
>t or executable file is accessed and executed (e.g., malware>t or executable file is accessed and executed (e.g., malware
>.exe is run from a temporary directory). - Unauthorized File>.exe is run from a temporary directory). - Unauthorized File
> Access: An unauthorized user attempts to access a protected> Access: An unauthorized user attempts to access a protected
> configuration file (e.g., `/etc/passwd` on Linux or `System> configuration file (e.g., `/etc/passwd` on Linux or `System
>32` files on Windows). - File Access Patterns: Bulk access t>32` files on Windows). - File Access Patterns: Bulk access t
>o multiple files in a short time (e.g., mass access to docum>o multiple files in a short time (e.g., mass access to docum
>ents on a file server). - File Access via Network: Files on >ents on a file server). - File Access via Network: Files on 
>a network share are accessed remotely (e.g., logs of SMB fil>a network share are accessed remotely (e.g., logs of SMB fil
>e access).  This data component can be collected through the>e access).
> following measures:  Windows  - Windows Event Logs: Event I 
>D 4663: Captures file system auditing details, including who 
> accessed the file, access type, and file name. - Sysmon:    
>  - Event ID 11: Logs file creation time changes.     - Even 
>t ID 1 (process creation): Can provide insight into files ex 
>ecuted. - PowerShell: Commands to monitor file access in rea 
>l-time: `Get-WinEvent -FilterHashtable @{LogName='Security'; 
> ID=4663}`  Linux  - Auditd: Monitor file access events usin 
>g audit rules: `auditctl -w /path/to/file -p rwxa -k file_ac 
>cess` - View logs: `ausearch -k file_access` - Inotify: Use  
>inotify to track file access on Linux: `inotifywait -m /path 
>/to/watch -e access`  macOS  - Unified Logs: Monitor file ac 
>cess using the macOS Unified Logging System. - FSEvents: Fil 
>e System Events can track file accesses: `fs_usage | grep op 
>en`  Network Devices  - SMB/CIFS Logs: Monitor file access o 
>ver network shares using logs from SMB or CIFS protocol. - N 
>AS Logs: Collect logs from network-attached storage systems  
>for file access events.  SIEM Integration  - Collect file ac 
>cess logs from all platforms (Windows, Linux, macOS) and cen 
>tralize in a SIEM for correlation and analysis. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--2b3bfe19-d59a-460d-93bb-2f546adc2d2c", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.273000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0039", + "external_id": "DC0039" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "File Creation", + "description": "A new file is created on a system or network storage. This action often signifies an operation such as saving a document, writing data, or deploying a file. Logging these events helps identify legitimate or potentially malicious file creation activities. Examples include logging file creation events (e.g., Sysmon Event ID 11 or Linux auditd logs). ", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "File", + "channel": "None" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "EventCode=11" + }, + { + "name": "auditd:SYSCALL", + "channel": "creat" + }, + { + "name": "macos:unifiedlog", + "channel": "file write" + }, + { + "name": "macos:osquery", + "channel": "CREATE/MODIFY: Modification of app.asar inside .app bundle" + }, + { + "name": "auditd:FILE", + "channel": "File creation with name starting with '.'" + }, + { + "name": "macos:unifiedlog", + "channel": "Creation or modification of browser extension .plist files" + }, + { + "name": "auditd:SYSCALL", + "channel": "open or creat syscalls targeting excluded paths" + }, + { + "name": "macos:unifiedlog", + "channel": "file creation in AV exclusion directories" + }, + { + "name": "auditd:SYSCALL", + "channel": "file creation/modification" + }, + { + "name": "macos:unifiedlog", + "channel": "file write/create" + }, + { + "name": "esxi:vmkernel", + "channel": "file write" + }, + { + "name": "snmp:syslog", + "channel": "firmware write/log event" + }, + { + "name": "auditd:SYSCALL", + "channel": "open,creat,rename: Writes in $HOME/Downloads, /tmp, ~/.cache with exe/script/archive/office extensions" + }, + { + "name": "fs:fsevents", + "channel": "Create in /Users/*/Downloads or /private/var/folders/* with quarantine attribute" + }, + { + "name": "macos:unifiedlog", + "channel": "file events" + }, + { + "name": "esxi:vmkernel", + "channel": "VMFS file creation" + }, + { + "name": "auditd:SYSCALL", + "channel": "write/open, FIM audit" + }, + { + "name": "fs:fsusage", + "channel": "open/write/exec calls" + }, + { + "name": "macos:unifiedlog", + "channel": "Creation of .plist under /Library/Managed Preferences/" + }, + { + "name": "fs:fileevents", + "channel": "creat" + }, + { + "name": "fs:fsusage", + "channel": "disk activity on /Library/LaunchAgents or LaunchDaemons" + }, + { + "name": "macos:osquery", + "channel": "file_events" + }, + { + "name": "auditd:SYSCALL", + "channel": "open: Write to ~/.vscode-cli/code_tunnel.json" + }, + { + "name": "macos:unifiedlog", + "channel": "creation of ~/.vscode-cli/code_tunnel.json" + }, + { + "name": "macos:unifiedlog", + "channel": "create/modify dylib files in monitored directories" + }, + { + "name": "auditd:SYSCALL", + "channel": "write" + }, + { + "name": "linux:Sysmon", + "channel": "New files in /tmp, /var/tmp, $HOME/.cache, executed within TimeWindow after browser HTTP fetch" + }, + { + "name": "macos:unifiedlog", + "channel": "New files written to /var/folders, /tmp, ~/Library/Caches, or ~/Downloads by browser context or its children" + }, + { + "name": "auditd:FILE", + "channel": "create: New file created in system binaries or temp directories" + }, + { + "name": "macos:unifiedlog", + "channel": "File created in ~/Library/LaunchAgents or executable directories" + }, + { + "name": "auditd:SYSCALL", + "channel": "open, unlink, rename: File creation or deletion involving critical stored data" + }, + { + "name": "macos:unifiedlog", + "channel": "Process wrote large .mov/.mp4 in user temp/hidden dirs" + }, + { + "name": "macos:unifiedlog", + "channel": "logd:file write" + }, + { + "name": "fs:fsusage", + "channel": "File IO" + }, + { + "name": "auditd:SYSCALL", + "channel": "creat, open, write on /etc/systemd/system and /usr/lib/systemd/system" + }, + { + "name": "macos:unifiedlog", + "channel": "File creation" + }, + { + "name": "macos:unifiedlog", + "channel": "Attachment files written to ~/Downloads or temporary folders" + }, + { + "name": "fs:fsusage", + "channel": "file activity" + }, + { + "name": "CloudTrail:PutObject", + "channel": "PutObject" + }, + { + "name": "auditd:PATH", + "channel": "Creation of files with extensions .sql, .csv, .sqlite, especially in user directories" + }, + { + "name": "macos:unifiedlog", + "channel": "Writes of .sql/.csv/.xlsx files to user documents/downloads" + }, + { + "name": "auditd:PATH", + "channel": "New .py/.js/.sh files written to ~/.local/, ~/.cache/, or /tmp/ within 5 min of package install" + }, + { + "name": "auditd:SYSCALL", + "channel": "write, open, or rename to /etc/systemd/system/*.service" + }, + { + "name": "auditd:FILE", + "channel": "create: Creation of .zip, .gz, .bz2 files in /tmp, /var/tmp, or /home directories" + }, + { + "name": "macos:unifiedlog", + "channel": "Creation of .zip, .gz, .dmg archives in /Users, /tmp, or application directories" + }, + { + "name": "fs:fsusage", + "channel": "file open/write" + }, + { + "name": "macos:endpointsecurity", + "channel": "ES_EVENT_TYPE_NOTIFY_CREATE: path under /Users/*/(Downloads|Desktop|Library/*/Containers|Library/Group Containers) AND extension in SuspiciousExtensions" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/create/rename: name in (/home/*/Downloads/*|/tmp/*|/run/user/*|/media/*) AND ext in SuspiciousExtensions" + }, + { + "name": "auditd:FILE", + "channel": "create: Creation of archive files in /tmp, /var/tmp, or user home directories" + }, + { + "name": "macos:unifiedlog", + "channel": "Creation of .zip, .dmg, .tar.gz files in /Users, /tmp, or application directories" + }, + { + "name": "linux:osquery", + "channel": "file_events" + }, + { + "name": "macos:unifiedlog", + "channel": "File Events" + }, + { + "name": "auditd:SYSCALL", + "channel": "File creations of *.qcow2, *.vdi, *.vmdk outside standard VM directories" + }, + { + "name": "macos:unifiedlog", + "channel": "Creation or modification of postinstall scripts within .pkg or .mpkg contents" + }, + { + "name": "auditd:SYSCALL", + "channel": "open: File creation under /tmp, /var/tmp, ~/.cache with executable bit or shell shebang" + }, + { + "name": "macos:unifiedlog", + "channel": "create: New files in /tmp or ~/Library/Application Support/* with executable or script extensions" + }, + { + "name": "auditd:SYSCALL", + "channel": "open, write, unlink" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "File creation of suspicious scripts/binaries in temporary directories" + }, + { + "name": "macos:unifiedlog", + "channel": "File creation of unsigned binaries/scripts in user cache or download directories" + }, + { + "name": "auditd:SYSCALL", + "channel": "File creation events in /var/mail or /var/spool/mail exceeding baseline thresholds" + }, + { + "name": "fs:fsusage", + "channel": "create: Attachment file creation in ~/Library/Mail directories" + }, + { + "name": "WinEventLog:Microsoft-Windows-Shell-Core", + "channel": "New startup folder shortcut or binary placed in Startup directory" + }, + { + "name": "auditd:SYSCALL", + "channel": "write or create file after .bash_history access" + }, + { + "name": "auditd:SYSCALL", + "channel": "new file created in /var/www/html, /srv/http, or similar web root" + }, + { + "name": "fs:launchdaemons", + "channel": "file_create" + }, + { + "name": "auditd:PATH", + "channel": "mount target path within /proc/*" + }, + { + "name": "macos:fsevents", + "channel": "/Library/StartupItems/, ~/Library/LaunchAgents/" + }, + { + "name": "fs:fsusage", + "channel": "write or chmod to ~/Library/LaunchAgents/*.plist" + }, + { + "name": "auditd:PATH", + "channel": "creation of .so files in non-standard directories (e.g., /tmp, /home/*)" + }, + { + "name": "auditd:FILE", + "channel": "create: Creation of files with anomalous headers and entropy levels in /tmp or user directories" + }, + { + "name": "macos:unifiedlog", + "channel": "Creation of files with anomalous headers and entropy values" + }, + { + "name": "auditd:SYSCALL", + "channel": "Access or modification to /lib/modules or creation of .ko files" + }, + { + "name": "fs:fsevents", + "channel": "Directory events (kFSEventStreamEventFlagItemCreated)" + }, + { + "name": "gcp:workspaceaudit", + "channel": "drive.activity logs" + }, + { + "name": "fs:fileevents", + "channel": "create/write/rename in user-writable paths" + }, + { + "name": "auditd:PATH", + "channel": "WRITE: Drop of binaries/scripts in ~/.local, /tmp, or /opt tool dirs" + }, + { + "name": "macos:osquery", + "channel": "CREATE/MODIFY: Creation of LaunchAgents/Daemons plists in user/system locations" + }, + { + "name": "auditd:SYSCALL", + "channel": "open,create" + }, + { + "name": "auditd:FILE", + "channel": "Creation of hidden files (.*) in sensitive directories (/etc, /var, /usr/bin)" + }, + { + "name": "macos:unifiedlog", + "channel": "Creation of LaunchAgents/LaunchDaemons in hidden or non-standard directories" + }, + { + "name": "auditd:FILE", + "channel": "create: Creation of files ending in .tar, .gz, .bz2, .zip in /tmp or /var/tmp" + }, + { + "name": "macos:unifiedlog", + "channel": "Creation of .zip or .dmg files in user-accessible or temporary directories" + }, + { + "name": "fs:fsusage", + "channel": "file write" + }, + { + "name": "macos:endpointsecurity", + "channel": "es_event_open" + }, + { + "name": "macos:unifiedlog", + "channel": "file create or modify in /etc/emond.d/rules or /private/var/db/emondClients" + }, + { + "name": "auditd:SYSCALL", + "channel": "open,creat,rename,write" + }, + { + "name": "macos:unifiedlog", + "channel": "Writes under ~/Library/Application Support/Code*/extensions or JetBrains plugins" + }, + { + "name": "AWS:CloudTrail", + "channel": "PutObject" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_data_source_ref": "", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 19:32:14.744000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/datacomponents/DC0039\", \"old_value\": \"https://attack.mitre.org/data-components/DC0039\"}, \"root['description']\": {\"new_value\": \"A new file is created on a system or network storage. This action often signifies an operation such as saving a document, writing data, or deploying a file. Logging these events helps identify legitimate or potentially malicious file creation activities. Examples include logging file creation events (e.g., Sysmon Event ID 11 or Linux auditd logs). \", \"old_value\": \"A new file is created on a system or network storage. This action often signifies an operation such as saving a document, writing data, or deploying a file. Logging these events helps identify legitimate or potentially malicious file creation activities. Examples include logging file creation events (e.g., Sysmon Event ID 11 or Linux auditd logs). \\n\\nThis data component can be collected through the following measures:\\n\\nWindows\\n\\n- Sysmon: Event ID 11: Logs file creation events, capturing details like the file path, hash, and creation time.\\n- Windows Event Log: Enable \\\"Object Access\\\" auditing in Group Policy to track file creation under Event ID 4663.\\n- PowerShell: Real-time monitoring of file creation:`Get-WinEvent -FilterHashtable @{LogName='Security'; ID=4663}`\\n\\nLinux\\n\\n- Auditd: Use audit rules to monitor file creation: `auditctl -w /path/to/directory -p w -k file_creation`\\n- View logs: `ausearch -k file_creation`\\n- Inotify: Monitor file creation with inotifywait: `inotifywait -m /path/to/watch -e create`\\n\\nmacOS\\n\\n- Unified Logs: Use the macOS Unified Logging System to capture file creation events.\\n- FSEvents: Use File System Events to monitor file creation: `fs_usage | grep create`\\n\\nNetwork Devices\\n\\n- NAS Logs: Monitor file creation events on network-attached storage devices.\\n- SMB Logs: Collect logs of file creation activities over SMB/CIFS protocols.\\n\\nSIEM Integration\\n\\n- Forward logs from all platforms (Windows, Linux, macOS) to a SIEM for central analysis and alerting.\", \"diff\": \"--- \\n+++ \\n@@ -1,29 +1 @@\\n A new file is created on a system or network storage. This action often signifies an operation such as saving a document, writing data, or deploying a file. Logging these events helps identify legitimate or potentially malicious file creation activities. Examples include logging file creation events (e.g., Sysmon Event ID 11 or Linux auditd logs). \\n-\\n-This data component can be collected through the following measures:\\n-\\n-Windows\\n-\\n-- Sysmon: Event ID 11: Logs file creation events, capturing details like the file path, hash, and creation time.\\n-- Windows Event Log: Enable \\\"Object Access\\\" auditing in Group Policy to track file creation under Event ID 4663.\\n-- PowerShell: Real-time monitoring of file creation:`Get-WinEvent -FilterHashtable @{LogName='Security'; ID=4663}`\\n-\\n-Linux\\n-\\n-- Auditd: Use audit rules to monitor file creation: `auditctl -w /path/to/directory -p w -k file_creation`\\n-- View logs: `ausearch -k file_creation`\\n-- Inotify: Monitor file creation with inotifywait: `inotifywait -m /path/to/watch -e create`\\n-\\n-macOS\\n-\\n-- Unified Logs: Use the macOS Unified Logging System to capture file creation events.\\n-- FSEvents: Use File System Events to monitor file creation: `fs_usage | grep create`\\n-\\n-Network Devices\\n-\\n-- NAS Logs: Monitor file creation events on network-attached storage devices.\\n-- SMB Logs: Collect logs of file creation activities over SMB/CIFS protocols.\\n-\\n-SIEM Integration\\n-\\n-- Forward logs from all platforms (Windows, Linux, macOS) to a SIEM for central analysis and alerting.\"}, \"root['x_mitre_log_sources'][37]['name']\": {\"new_value\": \"macos:unifiedlog\", \"old_value\": \"macos:unified\", \"new_path\": \"root['x_mitre_log_sources'][36]['name']\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][4]\": {\"name\": \"WinEventLog:Sysmon\", \"channel\": \"Modification of .asar in /opt or ~/.config directories\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1A new file is created on a system or network storage. This at1A new file is created on a system or network storage. This a
>ction often signifies an operation such as saving a document>ction often signifies an operation such as saving a document
>, writing data, or deploying a file. Logging these events he>, writing data, or deploying a file. Logging these events he
>lps identify legitimate or potentially malicious file creati>lps identify legitimate or potentially malicious file creati
>on activities. Examples include logging file creation events>on activities. Examples include logging file creation events
> (e.g., Sysmon Event ID 11 or Linux auditd logs).   This dat> (e.g., Sysmon Event ID 11 or Linux auditd logs). 
>a component can be collected through the following measures: 
>  Windows  - Sysmon: Event ID 11: Logs file creation events, 
> capturing details like the file path, hash, and creation ti 
>me. - Windows Event Log: Enable \"Object Access\" auditing in  
>Group Policy to track file creation under Event ID 4663. - P 
>owerShell: Real-time monitoring of file creation:`Get-WinEve 
>nt -FilterHashtable @{LogName='Security'; ID=4663}`  Linux   
>- Auditd: Use audit rules to monitor file creation: `auditct 
>l -w /path/to/directory -p w -k file_creation` - View logs:  
>`ausearch -k file_creation` - Inotify: Monitor file creation 
> with inotifywait: `inotifywait -m /path/to/watch -e create` 
>  macOS  - Unified Logs: Use the macOS Unified Logging Syste 
>m to capture file creation events. - FSEvents: Use File Syst 
>em Events to monitor file creation: `fs_usage | grep create` 
>  Network Devices  - NAS Logs: Monitor file creation events  
>on network-attached storage devices. - SMB Logs: Collect log 
>s of file creation activities over SMB/CIFS protocols.  SIEM 
> Integration  - Forward logs from all platforms (Windows, Li 
>nux, macOS) to a SIEM for central analysis and alerting. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--e905dad2-00d6-477c-97e8-800427abd0e8", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.273000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0040", + "external_id": "DC0040" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "File Deletion", + "description": "Refers to events where files are removed from a system or storage device. These events can indicate legitimate housekeeping activities or malicious actions such as attackers attempting to cover their tracks. Monitoring file deletions helps organizations identify unauthorized or suspicious activities.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "File", + "channel": "None" + }, + { + "name": "auditd:SYSCALL", + "channel": "unlink/unlinkat on service binaries or data targets" + }, + { + "name": "auditd:SYSCALL", + "channel": "file deletion" + }, + { + "name": "macos:osquery", + "channel": "file_events" + }, + { + "name": "esxi:shell", + "channel": "shell history" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "EventCode=23" + }, + { + "name": "auditd:SYSCALL", + "channel": "PATH" + }, + { + "name": "esxi:shell", + "channel": "/var/log/shell.log" + }, + { + "name": "esxi:hostd", + "channel": "delete action" + }, + { + "name": "auditd:SYSCALL", + "channel": "unlink, unlinkat, openat, write" + }, + { + "name": "macos:unifiedlog", + "channel": "exec rm -rf|dd if=/dev|srm|file unlink" + }, + { + "name": "auditd:SYSCALL", + "channel": "unlink, unlinkat, rmdir" + }, + { + "name": "auditd:SYSCALL", + "channel": "unlink, rename, open" + }, + { + "name": "linux:Sysmon", + "channel": "EventCode=23" + }, + { + "name": "fs:fsusage", + "channel": "unlink, fs_delete" + }, + { + "name": "docker:daemon", + "channel": "container file operations" + }, + { + "name": "esxi:hostd", + "channel": "rm, clearlogs, logrotate" + }, + { + "name": "esxi:hostd", + "channel": "Datastore file operations" + }, + { + "name": "macos:osquery", + "channel": "CREATE, DELETE, WRITE: Stored data manipulation attempts by unauthorized processes" + }, + { + "name": "auditd:SYSCALL", + "channel": "unlink/unlinkat" + }, + { + "name": "WinEventLog:Microsoft-Windows-Backup", + "channel": "Windows Backup Catalog deletion or catalog corruption" + }, + { + "name": "auditd:CONFIG_CHANGE", + "channel": "/etc/fstab, /etc/systemd/*" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:36.450000+00:00\"}, \"root['description']\": {\"new_value\": \"Refers to events where files are removed from a system or storage device. These events can indicate legitimate housekeeping activities or malicious actions such as attackers attempting to cover their tracks. Monitoring file deletions helps organizations identify unauthorized or suspicious activities.\", \"old_value\": \"Refers to events where files are removed from a system or storage device. These events can indicate legitimate housekeeping activities or malicious actions such as attackers attempting to cover their tracks. Monitoring file deletions helps organizations identify unauthorized or suspicious activities.\\n\\nThis data component can be collected through the following measures:\\n\\nWindows\\n\\n- Sysmon: Event ID 23: Logs file deletion events, including details such as file paths and responsible processes.\\n- Windows Event Log: Enable \\\"Object Access\\\" auditing to monitor file deletions.\\n- PowerShell: `Get-WinEvent -FilterHashtable @{LogName='Security'; ID=4663} | Where-Object {$_.Message -like '*DELETE*'}`\\n\\nLinux\\n\\n- Auditd: Use audit rules to capture file deletion events: `auditctl -a always,exit -F arch=b64 -S unlink -S rename -S rmdir -k file_deletion`\\n- Query logs: `ausearch -k file_deletion`\\n- Inotify: Use inotifywait to monitor file deletions: `inotifywait -m /path/to/watch -e delete`\\n\\nmacOS\\n\\n- Endpoint Security Framework (ESF): Monitor events like ES_EVENT_TYPE_AUTH_UNLINK to capture file deletion activities.\\n- FSEvents: Track file deletion activities in real-time: `fs_usage | grep unlink`\\n\\nSIEM Integration\\n\\n- Forward file deletion logs to a SIEM for centralized monitoring and correlation with other events.\\n\", \"diff\": \"--- \\n+++ \\n@@ -1,24 +1 @@\\n Refers to events where files are removed from a system or storage device. These events can indicate legitimate housekeeping activities or malicious actions such as attackers attempting to cover their tracks. Monitoring file deletions helps organizations identify unauthorized or suspicious activities.\\n-\\n-This data component can be collected through the following measures:\\n-\\n-Windows\\n-\\n-- Sysmon: Event ID 23: Logs file deletion events, including details such as file paths and responsible processes.\\n-- Windows Event Log: Enable \\\"Object Access\\\" auditing to monitor file deletions.\\n-- PowerShell: `Get-WinEvent -FilterHashtable @{LogName='Security'; ID=4663} | Where-Object {$_.Message -like '*DELETE*'}`\\n-\\n-Linux\\n-\\n-- Auditd: Use audit rules to capture file deletion events: `auditctl -a always,exit -F arch=b64 -S unlink -S rename -S rmdir -k file_deletion`\\n-- Query logs: `ausearch -k file_deletion`\\n-- Inotify: Use inotifywait to monitor file deletions: `inotifywait -m /path/to/watch -e delete`\\n-\\n-macOS\\n-\\n-- Endpoint Security Framework (ESF): Monitor events like ES_EVENT_TYPE_AUTH_UNLINK to capture file deletion activities.\\n-- FSEvents: Track file deletion activities in real-time: `fs_usage | grep unlink`\\n-\\n-SIEM Integration\\n-\\n-- Forward file deletion logs to a SIEM for centralized monitoring and correlation with other events.\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Refers to events where files are removed from a system or stt1Refers to events where files are removed from a system or st
>orage device. These events can indicate legitimate housekeep>orage device. These events can indicate legitimate housekeep
>ing activities or malicious actions such as attackers attemp>ing activities or malicious actions such as attackers attemp
>ting to cover their tracks. Monitoring file deletions helps >ting to cover their tracks. Monitoring file deletions helps 
>organizations identify unauthorized or suspicious activities>organizations identify unauthorized or suspicious activities
>.  This data component can be collected through the followin>.
>g measures:  Windows  - Sysmon: Event ID 23: Logs file delet 
>ion events, including details such as file paths and respons 
>ible processes. - Windows Event Log: Enable \"Object Access\"  
>auditing to monitor file deletions. - PowerShell: `Get-WinEv 
>ent -FilterHashtable @{LogName='Security'; ID=4663} | Where- 
>Object {$_.Message -like '*DELETE*'}`  Linux  - Auditd: Use  
>audit rules to capture file deletion events: `auditctl -a al 
>ways,exit -F arch=b64 -S unlink -S rename -S rmdir -k file_d 
>eletion` - Query logs: `ausearch -k file_deletion` - Inotify 
>: Use inotifywait to monitor file deletions: `inotifywait -m 
> /path/to/watch -e delete`  macOS  - Endpoint Security Frame 
>work (ESF): Monitor events like ES_EVENT_TYPE_AUTH_UNLINK to 
> capture file deletion activities. - FSEvents: Track file de 
>letion activities in real-time: `fs_usage | grep unlink`  SI 
>EM Integration  - Forward file deletion logs to a SIEM for c 
>entralized monitoring and correlation with other events.  
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--639e87f3-acb6-448a-9645-258f20da4bc5", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.273000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0059", + "external_id": "DC0059" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "File Metadata", + "description": "contextual information about a file, including attributes such as the file's name, size, type, content (e.g., signatures, headers, media), user/owner, permissions, timestamps, and other related properties. File metadata provides insights into a file's characteristics and can be used to detect malicious activity, unauthorized modifications, or other anomalies. Examples: \n\n- File Ownership and Permissions: Checking the owner and permissions of a critical configuration file like /etc/passwd on Linux or C:\\Windows\\System32\\config\\SAM on Windows.\n- Timestamps: Analyzing the creation, modification, and access timestamps of a file.\n- File Content and Signatures: Extracting the headers of an executable file to verify its signature or detect packing/obfuscation.\n- File Attributes: Analyzing attributes like hidden, system, or read-only flags in Windows.\n- File Hashes: Generating MD5, SHA-1, or SHA-256 hashes of files to compare against threat intelligence feeds.\n- File Location: Monitoring files located in unusual directories or paths, such as temporary or user folders.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "File", + "channel": "None" + }, + { + "name": "linux:osquery", + "channel": "event-based" + }, + { + "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational", + "channel": "Invalid/Unsigned image when developer tool launches newly installed binaries" + }, + { + "name": "journald:package", + "channel": "dpkg/apt or yum/dnf transaction logs (install/update of build tools)" + }, + { + "name": "linux:osquery", + "channel": "file_events, hash" + }, + { + "name": "macos:unifiedlog", + "channel": "softwareupdated/homebrew/install logs, pkginstalld events" + }, + { + "name": "macos:unifiedlog", + "channel": "AMFI or Gatekeeper signature/notarization failures for newly installed dev components" + }, + { + "name": "auditd:SYSCALL", + "channel": "Inotify watch creation or auditctl changes on /etc/cron* or /lib/systemd/system/" + }, + { + "name": "linux:syslog", + "channel": "Discrepancies in _VBA_PROJECT p-code vs source code extracted with oletools/pcodedmp" + }, + { + "name": "macos:unifiedlog", + "channel": "Detection of altered _VBA_PROJECT or PerformanceCache streams" + }, + { + "name": "EDR:file", + "channel": "File Metadata Inspection (Low String Entropy, Missing PDB)" + }, + { + "name": "linux:osquery", + "channel": "hash, elf_info, file_metadata" + }, + { + "name": "macos:osquery", + "channel": "code_signing, file_metadata" + }, + { + "name": "WinEventLog:Windows Defender", + "channel": "Operational log" + }, + { + "name": "macos:unifiedlog", + "channel": "subsystem:syspolicyd" + }, + { + "name": "macos:unifiedlog", + "channel": "File metadata updated with UF_HIDDEN flag" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "EventCode=15" + }, + { + "name": "auditd:PATH", + "channel": "file path matches exclusion directories" + }, + { + "name": "auditd:SYSCALL", + "channel": "PATH" + }, + { + "name": "auditd:PATH", + "channel": "PATH" + }, + { + "name": "macos:endpointsecurity", + "channel": "es_event_file_rename_t or es_event_file_write_t" + }, + { + "name": "linux:osquery", + "channel": "file_events" + }, + { + "name": "fs:fileevents", + "channel": "/var/log/install.log" + }, + { + "name": "auditd:SYSCALL", + "channel": "file write after sleep delay" + }, + { + "name": "esxi:vmkernel", + "channel": "Upload of file to datastore" + }, + { + "name": "ebpf:syscalls", + "channel": "Unexpected container volume unmount + file deletion" + }, + { + "name": "macos:osquery", + "channel": "file_events" + }, + { + "name": "EDR:file", + "channel": "File Metadata Analysis (PE overlays, entropy)" + }, + { + "name": "linux:osquery", + "channel": "elf_info, hash, yara_matches" + }, + { + "name": "macos:osquery", + "channel": "mach_o_info, file_metadata" + }, + { + "name": "macos:unifiedlog", + "channel": "Code signature validation fails or is absent post-binary modification" + }, + { + "name": "fs:filesystem", + "channel": "Binary file hash changes outside of update/patch cycles" + }, + { + "name": "linux:osquery", + "channel": "Read headers and detect MIME type mismatch" + }, + { + "name": "macos:unifiedlog", + "channel": "Code signing verification failures or bypassed trust decisions" + }, + { + "name": "NSM:Flow", + "channel": "Observed File Transfers" + }, + { + "name": "esxi:vmkernel", + "channel": "Storage access and file ops" + }, + { + "name": "macos:unifiedlog", + "channel": "Creation of new LaunchAgent or LoginItem plist files in ~/Library/LaunchAgents/" + }, + { + "name": "auditd:CONFIG_CHANGE", + "channel": "chmod or chown of hook files indicating privilege escalation or execution permission change" + }, + { + "name": "macos:unifiedlog", + "channel": "filesystem events" + }, + { + "name": "macos:unifiedlog", + "channel": "xattr -d com.apple.quarantine or similar attribute removal commands" + }, + { + "name": "macos:unifiedlog", + "channel": "Gatekeeper quarantine policy decision anomalies recorded in com.apple.LaunchServices.QuarantineEventsV2" + }, + { + "name": "linux:syslog", + "channel": "application or system execution logs" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "name": "auditd:SYSCALL", + "channel": "syscall in (chmod, fchmod, fchmodat, chown, fchown, fchownat, setxattr, lsetxattr, fsetxattr)" + }, + { + "name": "linux:syslog", + "channel": "file permission modification events in kernel messages" + }, + { + "name": "fs:fsevents", + "channel": "file system events indicating permission or attribute changes" + }, + { + "name": "OpenBSM:AuditTrail", + "channel": "BSM audit events for file permission modifications" + }, + { + "name": "esxi:hostd", + "channel": "host daemon events related to file or VM permission changes" + }, + { + "name": "esxi:vmkernel", + "channel": "VMware kernel events for file system permission modifications" + }, + { + "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational", + "channel": "Unsigned or invalid image for newly installed/updated binaries" + }, + { + "name": "journald:package", + "channel": "dpkg/apt/yum/dnf transaction logs; vendor updaters in systemd journals" + }, + { + "name": "macos:unifiedlog", + "channel": "pkginstalld/softwareupdated/Homebrew install transactions" + }, + { + "name": "macos:unifiedlog", + "channel": "AMFI/Gatekeeper code signature or notarization failures" + }, + { + "name": "EDR:detection", + "channel": "App reputation telemetry" + }, + { + "name": "gatekeeper/quarantine database", + "channel": "LaunchServices quarantine" + }, + { + "name": "linux:osquery", + "channel": "file_events.path" + }, + { + "name": "auditd:SYSCALL", + "channel": "setuid or setgid bit changes" + }, + { + "name": "linux:osquery", + "channel": "Filesystem modifications to trusted paths" + }, + { + "name": "fs:fsusage", + "channel": "filesystem monitoring of exec/open" + }, + { + "name": "auditd:SYSCALL", + "channel": "syscall in (chmod, fchmod, fchmodat, chown, fchown, fchownat, lchown, setxattr, lsetxattr, fsetxattr, removexattr, lremovexattr, fremovexattr)" + }, + { + "name": "auditd:PATH", + "channel": "file path modifications on critical system directories (/etc, /usr/bin, /usr/sbin, /var, /opt)" + }, + { + "name": "linux:syslog", + "channel": "kernel messages related to file system permission changes and security violations" + }, + { + "name": "OpenBSM:AuditTrail", + "channel": "BSM audit events for file permission, ownership, and attribute modifications with user context" + }, + { + "name": "macos:unifiedlog", + "channel": "kernel extension and system extension logs related to file system security violations or SIP bypass attempts" + }, + { + "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational", + "channel": "Code integrity violations in boot-start drivers or firmware" + }, + { + "name": "fwupd:logs", + "channel": "Firmware updates applied or failed" + }, + { + "name": "macos:endpointsecurity", + "channel": "es_event_authentication" + }, + { + "name": "esxi:vmkernel", + "channel": "Datastore modification events" + }, + { + "name": "linux:osquery", + "channel": "Write or modify .desktop file in XDG autostart path" + }, + { + "name": "macos:unifiedlog", + "channel": "Unexpected application binary modifications or altered signing status" + }, + { + "name": "auditd:SYSCALL", + "channel": "setxattr or getxattr system call" + }, + { + "name": "macos:unifiedlog", + "channel": "extended attribute write or modification" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4656, 4658" + }, + { + "name": "auditd:SYSCALL", + "channel": "chmod, chown, setxattr, or file writes to /etc/ssl/* or /usr/local/share/ca-certificates/*" + }, + { + "name": "macos:unifiedlog", + "channel": "New certificate trust settings added by unexpected process" + }, + { + "name": "esxi:syslog", + "channel": "Datastore file hidden or renamed unexpectedly" + }, + { + "name": "WinEventLog:Windows Defender", + "channel": "Operational" + }, + { + "name": "macos:unifiedlog", + "channel": "subsystem=com.apple.lsd" + }, + { + "name": "saas:RepoEvents", + "channel": "New file added or modified in PR targeting CI/CD or build config (e.g., `gitlab-ci.yml`, `build.gradle`, `pom.xml`, `.github/workflows/*.yml`)" + }, + { + "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational", + "channel": "CodeIntegrity reports 'Invalid image hash' or 'Unsigned image' for new/updated binaries" + }, + { + "name": "WinEventLog:Microsoft-Windows-Windows Defender/Operational", + "channel": "SmartScreen or ASR blocks on newly downloaded installer/updater" + }, + { + "name": "WinEventLog:Setup", + "channel": "MSI/Product install, repair or update events" + }, + { + "name": "journald:package", + "channel": "dpkg/apt install, remove, upgrade events" + }, + { + "name": "journald:package", + "channel": "yum/dnf install or update transactions" + }, + { + "name": "linux:osquery", + "channel": "hash, rpm_packages, deb_packages, file_events" + }, + { + "name": "macos:unifiedlog", + "channel": "installer or system_installd 'PackageKit: install succeeded/failed' with non-notarized or unknown signer" + }, + { + "name": "macos:unifiedlog", + "channel": "Gatekeeper/AMFI 'code signature invalid' / 'not notarized' messages" + }, + { + "name": "networkdevice:syslog", + "channel": "OS version query results inconsistent with expected or approved version list" + }, + { + "name": "macos:unifiedlog", + "channel": "File creation or modification with com.apple.ResourceFork extended attribute" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:35.397000+00:00\"}, \"root['description']\": {\"new_value\": \"contextual information about a file, including attributes such as the file's name, size, type, content (e.g., signatures, headers, media), user/owner, permissions, timestamps, and other related properties. File metadata provides insights into a file's characteristics and can be used to detect malicious activity, unauthorized modifications, or other anomalies. Examples: \\n\\n- File Ownership and Permissions: Checking the owner and permissions of a critical configuration file like /etc/passwd on Linux or C:\\\\Windows\\\\System32\\\\config\\\\SAM on Windows.\\n- Timestamps: Analyzing the creation, modification, and access timestamps of a file.\\n- File Content and Signatures: Extracting the headers of an executable file to verify its signature or detect packing/obfuscation.\\n- File Attributes: Analyzing attributes like hidden, system, or read-only flags in Windows.\\n- File Hashes: Generating MD5, SHA-1, or SHA-256 hashes of files to compare against threat intelligence feeds.\\n- File Location: Monitoring files located in unusual directories or paths, such as temporary or user folders.\", \"old_value\": \"contextual information about a file, including attributes such as the file's name, size, type, content (e.g., signatures, headers, media), user/owner, permissions, timestamps, and other related properties. File metadata provides insights into a file's characteristics and can be used to detect malicious activity, unauthorized modifications, or other anomalies. Examples: \\n\\n- File Ownership and Permissions: Checking the owner and permissions of a critical configuration file like /etc/passwd on Linux or C:\\\\Windows\\\\System32\\\\config\\\\SAM on Windows.\\n- Timestamps: Analyzing the creation, modification, and access timestamps of a file.\\n- File Content and Signatures: Extracting the headers of an executable file to verify its signature or detect packing/obfuscation.\\n- File Attributes: Analyzing attributes like hidden, system, or read-only flags in Windows.\\n- File Hashes: Generating MD5, SHA-1, or SHA-256 hashes of files to compare against threat intelligence feeds.\\n- File Location: Monitoring files located in unusual directories or paths, such as temporary or user folders.\\n\\nThis data component can be collected through the following measures:\\n\\nWindows\\n\\n- Sysinternals Tools: Use `AccessEnum` or `PSFile` to retrieve metadata about file access and permissions.\\n- Windows Event Logs: Enable object access auditing and monitor events like 4663 (Object Access) and 5140 (A network share object was accessed).\\n- PowerShell: Use Get-Item or Get-ChildItem cmdlets: `Get-ChildItem -Path \\\"C:\\\\Path\\\\To\\\\Directory\\\" -Recurse | Select-Object Name, Length, LastWriteTime, Attributes`\\n\\nLinux\\n\\n- File System Commands: Use `ls -l` or stat to retrieve file metadata: `stat /path/to/file`\\n- Auditd: Configure audit rules to log metadata access: `auditctl -w /path/to/file -p wa -k file_metadata`\\n- Filesystem Integrity Tools: Tools like tripwire or AIDE (Advanced Intrusion Detection Environment) can monitor file metadata changes.\\n\\nmacOS\\n\\n- FSEvents: Use FSEvents to track file metadata changes.\\n- Endpoint Security Framework (ESF): Capture metadata-related events via ESF APIs.\\n- Command-Line Tools: Use ls -l or xattr for file attributes: `ls -l@ /path/to/file`\\n\\nSIEM Integration\\n\\n- Forward file metadata logs from endpoint or network devices to a SIEM for centralized analysis.\", \"diff\": \"--- \\n+++ \\n@@ -6,27 +6,3 @@\\n - File Attributes: Analyzing attributes like hidden, system, or read-only flags in Windows.\\n - File Hashes: Generating MD5, SHA-1, or SHA-256 hashes of files to compare against threat intelligence feeds.\\n - File Location: Monitoring files located in unusual directories or paths, such as temporary or user folders.\\n-\\n-This data component can be collected through the following measures:\\n-\\n-Windows\\n-\\n-- Sysinternals Tools: Use `AccessEnum` or `PSFile` to retrieve metadata about file access and permissions.\\n-- Windows Event Logs: Enable object access auditing and monitor events like 4663 (Object Access) and 5140 (A network share object was accessed).\\n-- PowerShell: Use Get-Item or Get-ChildItem cmdlets: `Get-ChildItem -Path \\\"C:\\\\Path\\\\To\\\\Directory\\\" -Recurse | Select-Object Name, Length, LastWriteTime, Attributes`\\n-\\n-Linux\\n-\\n-- File System Commands: Use `ls -l` or stat to retrieve file metadata: `stat /path/to/file`\\n-- Auditd: Configure audit rules to log metadata access: `auditctl -w /path/to/file -p wa -k file_metadata`\\n-- Filesystem Integrity Tools: Tools like tripwire or AIDE (Advanced Intrusion Detection Environment) can monitor file metadata changes.\\n-\\n-macOS\\n-\\n-- FSEvents: Use FSEvents to track file metadata changes.\\n-- Endpoint Security Framework (ESF): Capture metadata-related events via ESF APIs.\\n-- Command-Line Tools: Use ls -l or xattr for file attributes: `ls -l@ /path/to/file`\\n-\\n-SIEM Integration\\n-\\n-- Forward file metadata logs from endpoint or network devices to a SIEM for centralized analysis.\"}, \"root['x_mitre_log_sources'][18]['channel']\": {\"new_value\": \"PATH\", \"old_value\": \"path\"}, \"root['x_mitre_log_sources'][42]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4670\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][73]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4663\"}, \"root['x_mitre_log_sources'][90]\": {\"name\": \"WinEventLog:Sysmon\", \"channel\": \"EventCode=15 \"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1contextual information about a file, including attributes sut1contextual information about a file, including attributes su
>ch as the file's name, size, type, content (e.g., signatures>ch as the file's name, size, type, content (e.g., signatures
>, headers, media), user/owner, permissions, timestamps, and >, headers, media), user/owner, permissions, timestamps, and 
>other related properties. File metadata provides insights in>other related properties. File metadata provides insights in
>to a file's characteristics and can be used to detect malici>to a file's characteristics and can be used to detect malici
>ous activity, unauthorized modifications, or other anomalies>ous activity, unauthorized modifications, or other anomalies
>. Examples:   - File Ownership and Permissions: Checking the>. Examples:   - File Ownership and Permissions: Checking the
> owner and permissions of a critical configuration file like> owner and permissions of a critical configuration file like
> /etc/passwd on Linux or C:\\Windows\\System32\\config\\SAM on W> /etc/passwd on Linux or C:\\Windows\\System32\\config\\SAM on W
>indows. - Timestamps: Analyzing the creation, modification, >indows. - Timestamps: Analyzing the creation, modification, 
>and access timestamps of a file. - File Content and Signatur>and access timestamps of a file. - File Content and Signatur
>es: Extracting the headers of an executable file to verify i>es: Extracting the headers of an executable file to verify i
>ts signature or detect packing/obfuscation. - File Attribute>ts signature or detect packing/obfuscation. - File Attribute
>s: Analyzing attributes like hidden, system, or read-only fl>s: Analyzing attributes like hidden, system, or read-only fl
>ags in Windows. - File Hashes: Generating MD5, SHA-1, or SHA>ags in Windows. - File Hashes: Generating MD5, SHA-1, or SHA
>-256 hashes of files to compare against threat intelligence >-256 hashes of files to compare against threat intelligence 
>feeds. - File Location: Monitoring files located in unusual >feeds. - File Location: Monitoring files located in unusual 
>directories or paths, such as temporary or user folders.  Th>directories or paths, such as temporary or user folders.
>is data component can be collected through the following mea 
>sures:  Windows  - Sysinternals Tools: Use `AccessEnum` or ` 
>PSFile` to retrieve metadata about file access and permissio 
>ns. - Windows Event Logs: Enable object access auditing and  
>monitor events like 4663 (Object Access) and 5140 (A network 
> share object was accessed). - PowerShell: Use Get-Item or G 
>et-ChildItem cmdlets: `Get-ChildItem -Path \"C:\\Path\\To\\Direc 
>tory\" -Recurse | Select-Object Name, Length, LastWriteTime,  
>Attributes`  Linux  - File System Commands: Use `ls -l` or s 
>tat to retrieve file metadata: `stat /path/to/file` - Auditd 
>: Configure audit rules to log metadata access: `auditctl -w 
> /path/to/file -p wa -k file_metadata` - Filesystem Integrit 
>y Tools: Tools like tripwire or AIDE (Advanced Intrusion Det 
>ection Environment) can monitor file metadata changes.  macO 
>S  - FSEvents: Use FSEvents to track file metadata changes.  
>- Endpoint Security Framework (ESF): Capture metadata-relate 
>d events via ESF APIs. - Command-Line Tools: Use ls -l or xa 
>ttr for file attributes: `ls -l@ /path/to/file`  SIEM Integr 
>ation  - Forward file metadata logs from endpoint or network 
> devices to a SIEM for centralized analysis. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--84572de3-9583-4c73-aabd-06ea88123dd8", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.273000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0061", + "external_id": "DC0061" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "File Modification", + "description": "Changes made to a file, including updates to its contents, metadata, access permissions, or attributes. These modifications may indicate legitimate activity (e.g., software updates) or unauthorized changes (e.g., tampering, ransomware, or adversarial modifications). Examples: \n\n- Content Modifications: Changes to the content of a configuration file, such as modifying `/etc/ssh/sshd_config` on Linux or `C:\\Windows\\System32\\drivers\\etc\\hosts` on Windows.\n- Permission Changes: Altering file permissions to allow broader access, such as changing a file from `644` to `777` on Linux or modifying NTFS permissions on Windows.\n- Attribute Modifications: Changing a file's attributes to hidden, read-only, or system on Windows.\n- Timestamp Manipulation: Adjusting a file's creation or modification timestamp using tools like `touch` in Linux or timestomping tools on Windows.\n- Software or System File Changes: Modifying system files such as `boot.ini`, kernel modules, or application binaries.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "File", + "channel": "None" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/write calls modifying ~/.bashrc, ~/.profile, or /etc/paths.d" + }, + { + "name": "macos:unifiedlog", + "channel": "File modification in /etc/paths.d or user shell rc files" + }, + { + "name": "fs:fileevents", + "channel": "/var/log/quarantine.log" + }, + { + "name": "macos:unifiedlog", + "channel": "Modification of ~/Library/LaunchAgents or /Library/LaunchDaemons plist" + }, + { + "name": "auditd:SYSCALL", + "channel": "open, write" + }, + { + "name": "auditd:SYSCALL", + "channel": "AUDIT_SYSCALL (open, write, rename, unlink)" + }, + { + "name": "macos:endpointsecurity", + "channel": "ES_EVENT_TYPE_NOTIFY_WRITE, targeting .zshrc, .zlogin, .zprofile" + }, + { + "name": "fs:fileevents", + "channel": "/var/log/install.log" + }, + { + "name": "auditd:SYSCALL", + "channel": "PATH" + }, + { + "name": "macos:osquery", + "channel": "file_events" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "EventCode=2" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve call for modification of /etc/sudoers or writing to /var/db/sudo" + }, + { + "name": "auditd:SYSCALL", + "channel": "open, write: File modifications under /etc/ssl/certs, /usr/local/share/ca-certificates, or /etc/pki/ca-trust/source/anchors" + }, + { + "name": "macos:osquery", + "channel": "query: Enumeration of root certificates showing unexpected additions" + }, + { + "name": "auditd:SYSCALL", + "channel": "open, unlink, rename: Suspicious file access, deletion, or modification of sensitive paths" + }, + { + "name": "macos:unifiedlog", + "channel": "Anomalous plist modifications or sensitive file overwrites by non-standard processes" + }, + { + "name": "auditd:FILE", + "channel": "Modification or deletion of /etc/audit/audit.rules or /etc/audit/audit.conf" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/write of .service unit files" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/write/unlink" + }, + { + "name": "macos:unifiedlog", + "channel": "loginwindow or desktopservices modified settings or files" + }, + { + "name": "ESXiLogs:messages", + "channel": "changes to /etc/motd or /etc/vmware/welcome" + }, + { + "name": "auditd:SYSCALL", + "channel": "write, rename" + }, + { + "name": "containerd:runtime", + "channel": "file change monitoring within /etc/cron.*, /tmp, or mounted volumes" + }, + { + "name": "esxi:cron", + "channel": "manual edits to /etc/rc.local.d/local.sh or cron.d" + }, + { + "name": "auditd:PATH", + "channel": "/etc/passwd or /etc/group file write" + }, + { + "name": "auditd:SYSCALL", + "channel": "write" + }, + { + "name": "macos:unifiedlog", + "channel": "SecurityAgentPlugins modification" + }, + { + "name": "macos:unifiedlog", + "channel": "write: File modifications to *.plist within LaunchAgents, LaunchDaemons, Application Support, or Preferences directories" + }, + { + "name": "linux:osquery", + "channel": "file_events" + }, + { + "name": "esxi:hostd", + "channel": "boot" + }, + { + "name": "networkdevice:syslog", + "channel": "config" + }, + { + "name": "macos:unifiedlog", + "channel": "Modification of backgrounditems.btm or creation of LoginItems subdirectory in .app bundle" + }, + { + "name": "fs:filesystem", + "channel": "Modification or creation of files matching 'com.apple.loginwindow.*.plist' in ~/Library/Preferences/ByHost" + }, + { + "name": "auditd:SYSCALL", + "channel": "write | PATH=/home/*/.ssh/authorized_keys" + }, + { + "name": "macos:auth", + "channel": "~/.ssh/authorized_keys" + }, + { + "name": "gcp:audit", + "channel": "compute.instances.setMetadata" + }, + { + "name": "azure:resource", + "channel": "PATCH vm/authorized_keys" + }, + { + "name": "esxi:shell", + "channel": "file write or edit" + }, + { + "name": "linux:syslog", + "channel": "rename" + }, + { + "name": "ebpf:syscalls", + "channel": "file_write" + }, + { + "name": "macos:unifiedlog", + "channel": "Modification of plist with apple.awt.UIElement set to TRUE" + }, + { + "name": "fs:fsusage", + "channel": "unlink, write" + }, + { + "name": "auditd:SYSCALL", + "channel": "open, write: Write operations targeting /dev/sda, /dev/nvme0n1, or EFI partition mounts" + }, + { + "name": "auditd:PATH", + "channel": "write: Modification of /boot/grub/*, /boot/efi/EFI/*, or initramfs images" + }, + { + "name": "networkdevice:config", + "channel": "config-change: timezone or ntp server configuration change after a time query command" + }, + { + "name": "macos:unifiedlog", + "channel": "replace existing dylibs" + }, + { + "name": "networkdevice:config", + "channel": "Configuration changes to boot variables, startup image paths, or checksum verification failures" + }, + { + "name": "firmware:update", + "channel": "Unexpected or unscheduled firmware updates, image overwrites, or failed signature validation" + }, + { + "name": "IntegrityCheck:ImageValidation", + "channel": "Checksum or hash mismatch between running image and known-good vendor-provided image" + }, + { + "name": "macos:osquery", + "channel": "File modifications in ~/Library/Preferences/" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/write to /etc/pam.d/*" + }, + { + "name": "macos:unifiedlog", + "channel": "Modification of /Library/Security/SecurityAgentPlugins" + }, + { + "name": "macos:unifiedlog", + "channel": "Modifications to Mail.app plist files controlling message rules" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "name": "auditd:SYSCALL", + "channel": "write: Modification of structured stored data by suspicious processes" + }, + { + "name": "linux:syslog", + "channel": "Unexpected log entries or malformed SQL operations in databases" + }, + { + "name": "macos:unifiedlog", + "channel": "Unexpected creation or modification of stored data files in protected directories" + }, + { + "name": "auditd:SYSCALL", + "channel": "openat, write, rename, unlink" + }, + { + "name": "macos:unifiedlog", + "channel": "file encrypted|new file with .encrypted extension|disk write burst" + }, + { + "name": "esxi:vmkernel", + "channel": "rename .vmdk to .*.locked|datastore write spike" + }, + { + "name": "macos:unifiedlog", + "channel": "Mach-O binary modified or LC_LOAD_DYLIB segment inserted" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/write syscalls targeting /etc/ld.so.preload or binaries in /usr/bin" + }, + { + "name": "macos:unifiedlog", + "channel": "Modified application plist or binary replacement in /Applications" + }, + { + "name": "esxi:shell", + "channel": "admin command usage" + }, + { + "name": "networkdevice:syslog", + "channel": "startup-config" + }, + { + "name": "macos:unifiedlog", + "channel": "File creation or overwrite in common web-hosting folders" + }, + { + "name": "esxi:vmkernel", + "channel": "Unauthorized file modifications within datastore volumes via shell access or vCLI" + }, + { + "name": "networkdevice:config", + "channel": "Configuration changes referencing 'crypto', 'key length', 'cipher', or downgrade of encryption settings" + }, + { + "name": "FirmwareLogs:Update", + "channel": "Unexpected firmware or image updates modifying cryptographic modules" + }, + { + "name": "fs:plist", + "channel": "/var/root/Library/Preferences/com.apple.loginwindow.plist" + }, + { + "name": "auditd:SYSCALL", + "channel": "modification of existing .service file" + }, + { + "name": "auditd:PATH", + "channel": "write or create events on *.pth, sitecustomize.py, usercustomize.py in site-packages or dist-packages" + }, + { + "name": "macos:unifiedlog", + "channel": "write of plist files in /Library/LaunchAgents or /Library/LaunchDaemons" + }, + { + "name": "WinEventLog:System", + "channel": "Unexpected modification to lsass.exe or cryptdll.dll" + }, + { + "name": "networkconfig", + "channel": "unexpected OS image file upload or modification events" + }, + { + "name": "network:runtime", + "channel": "checksum or runtime memory verification failures" + }, + { + "name": "macos:unifiedlog", + "channel": "write" + }, + { + "name": "auditd:SYSCALL", + "channel": "open, write: Modification of /boot/grub/* or /boot/efi/*" + }, + { + "name": "macos:unifiedlog", + "channel": "Modification of /System/Library/CoreServices/boot.efi" + }, + { + "name": "macos:unifiedlog", + "channel": "Modification of LaunchAgents or LaunchDaemons plist files" + }, + { + "name": "auditd:SYSCALL", + "channel": "chmod" + }, + { + "name": "auditd:SYSCALL", + "channel": "rename,chmod" + }, + { + "name": "fs:fsevents", + "channel": "create/write/rename under user-writable paths" + }, + { + "name": "macos:osquery", + "channel": "Changes to LSFileQuarantineEnabled field in Info.plist" + }, + { + "name": "fs:fsusage", + "channel": "file access to /usr/lib/cron/tabs/ and cron output files" + }, + { + "name": "esxi:hostd", + "channel": "modification of crontab or local.sh entries" + }, + { + "name": "networkdevice:config", + "channel": "Configuration file modified or replaced on network device" + }, + { + "name": "macos:unifiedlog", + "channel": "Plist modifications containing virtualization run configurations" + }, + { + "name": "fs:fsusage", + "channel": "file access to /usr/lib/cron/at and job execution path" + }, + { + "name": "macos:unifiedlog", + "channel": "binary modified or replaced" + }, + { + "name": "esxi:hostd", + "channel": "binary or module replacement event" + }, + { + "name": "networkdevice:config", + "channel": "Configuration change events referencing encryption, TLS/SSL, or IPSec settings" + }, + { + "name": "networkdevice:firmware", + "channel": "Unexpected firmware update or image modification affecting crypto modules" + }, + { + "name": "fs:fsevents", + "channel": "file system events indicating permission, ownership, or extended attribute changes on critical paths. File system modification events with kFSEventStreamEventFlagItemChangeOwner, kFSEventStreamEventFlagItemXattrMod flags" + }, + { + "name": "auditd:FILE", + "channel": "Modification of Display Manager configuration files (/etc/gdm3/*, /etc/lightdm/*)" + }, + { + "name": "macos:unifiedlog", + "channel": "Modification of /Library/Preferences/com.apple.loginwindow plist" + }, + { + "name": "auditd:SYSCALL", + "channel": "Modification of user shell profile or trap registration via echo/redirection (e.g., echo \"trap 'malicious_cmd' INT\" >> ~/.bashrc)" + }, + { + "name": "macos:unifiedlog", + "channel": "File write or append to .zshrc, .bash_profile, .zprofile, etc." + }, + { + "name": "auditd:SYSCALL", + "channel": "chmod, write, create, open" + }, + { + "name": "fs:fsevents", + "channel": "Extensions" + }, + { + "name": "auditd:SYSCALL", + "channel": "open, write: File writes to application binaries or libraries at runtime" + }, + { + "name": "macos:osquery", + "channel": "CALCULATE: Mismatch in file integrity of critical macOS applications" + }, + { + "name": "auditd:SYSCALL", + "channel": "file write operations in /Library/WebServer/Documents" + }, + { + "name": "fs:launchdaemons", + "channel": "file_modify" + }, + { + "name": "auditd:PATH", + "channel": "write: File modifications to /etc/systemd/sleep.conf or related power configuration files" + }, + { + "name": "macos:unifiedlog", + "channel": "write: File modification to com.apple.PowerManagement.plist or related system preference files" + }, + { + "name": "fs:fsusage", + "channel": "modification of existing LaunchAgents plist" + }, + { + "name": "macos:unifiedlog", + "channel": "create/modify dylib in monitored directories" + }, + { + "name": "WinEventLog:CodeIntegrity", + "channel": "EventCode=3033" + }, + { + "name": "auditd:SYSCALL", + "channel": "write operation on /etc/passwd or /etc/shadow" + }, + { + "name": "macos:unifiedlog", + "channel": "modification to /var/db/dslocal/nodes/Default/users/" + }, + { + "name": "linux:osquery", + "channel": "New or modified kernel object files (.ko) within /lib/modules directory" + }, + { + "name": "macos:osquery", + "channel": "Modifications to /var/db/SystemPolicyConfiguration/KextPolicy or kext_policy table" + }, + { + "name": "networkdevice:audit", + "channel": "SNMP configuration changes, such as enabling read/write access or modifying community strings" + }, + { + "name": "macos:osquery", + "channel": "write" + }, + { + "name": "auditd:SYSCALL", + "channel": "mount or losetup commands creating hidden or encrypted FS" + }, + { + "name": "macos:unifiedlog", + "channel": "Hidden volume attachment or modification events" + }, + { + "name": "macos:unifiedlog", + "channel": "Suspicious plist edits for volume mounting behavior" + }, + { + "name": "networkdevice:config", + "channel": "Configuration changes to startup image paths, boot loader parameters, or debug flags" + }, + { + "name": "networkdevice:syslog", + "channel": "Checksum/hash mismatch between device OS image and baseline known-good version" + }, + { + "name": "macos:unifiedlog", + "channel": "file writes" + }, + { + "name": "m365:defender", + "channel": "OfficeTelemetry or DLP" + }, + { + "name": "fs:fsusage", + "channel": "Filesystem Access Logging" + }, + { + "name": "networkdevice:config", + "channel": "Configuration changes referencing cryptographic hardware modules or disabling hardware acceleration" + }, + { + "name": "FirmwareLogs:Update", + "channel": "Unexpected firmware updates that alter encryption libraries or disable hardware crypto modules" + }, + { + "name": "m365:office", + "channel": "Anomalous editing of invoice or payment document templates" + }, + { + "name": "fs:fsusage", + "channel": "truncate, unlink, write" + }, + { + "name": "macos:unifiedlog", + "channel": "Modification or replacement of /Library/Application Support/com.apple.TCC/TCC.db or ~/Library/Application Support/com.apple.TCC/TCC.db" + }, + { + "name": "linux:fim", + "channel": "Changes to /etc/rc.local.d/local.sh or creation of unexpected startup files in persistent partitions (/etc/init.d, /store, /locker)" + }, + { + "name": "macos:endpointsecurity", + "channel": "write, rename" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/write to /proc/*/mem or /proc/*/maps" + }, + { + "name": "sysdig:file", + "channel": "evt.type=write" + }, + { + "name": "macos:unifiedlog", + "channel": "rule definitions written to emond rule plists" + }, + { + "name": "networkdevice:config", + "channel": "Configuration changes referencing older image versions or unexpected boot parameters" + }, + { + "name": "FileIntegrity:ImageValidation", + "channel": "Hash/checksum mismatch against baseline vendor-provided OS image versions" + }, + { + "name": "auditd:SYSCALL", + "channel": "write or rename to /etc/systemd/system or /etc/init.d" + }, + { + "name": "fs:fsusage", + "channel": "file write to launchd plist paths" + }, + { + "name": "auditd:SYSCALL", + "channel": "modification of entrypoint scripts or init containers" + }, + { + "name": "fs:plist_monitoring", + "channel": "/Users/*/Library/Mail/V*/MailData/RulesActiveState.plist" + }, + { + "name": "auditd:SYSCALL", + "channel": "chmod/chown to /etc/passwd or /etc/shadow" + }, + { + "name": "auditd:SYSCALL", + "channel": "open/write syscalls targeting web directory files" + }, + { + "name": "macos:unifiedlog", + "channel": "Terminal/Editor processes modifying web folder" + }, + { + "name": "esxi:vmkernel", + "channel": "/var/log/vmkernel.log" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:35.239000+00:00\"}, \"root['description']\": {\"new_value\": \"Changes made to a file, including updates to its contents, metadata, access permissions, or attributes. These modifications may indicate legitimate activity (e.g., software updates) or unauthorized changes (e.g., tampering, ransomware, or adversarial modifications). Examples: \\n\\n- Content Modifications: Changes to the content of a configuration file, such as modifying `/etc/ssh/sshd_config` on Linux or `C:\\\\Windows\\\\System32\\\\drivers\\\\etc\\\\hosts` on Windows.\\n- Permission Changes: Altering file permissions to allow broader access, such as changing a file from `644` to `777` on Linux or modifying NTFS permissions on Windows.\\n- Attribute Modifications: Changing a file's attributes to hidden, read-only, or system on Windows.\\n- Timestamp Manipulation: Adjusting a file's creation or modification timestamp using tools like `touch` in Linux or timestomping tools on Windows.\\n- Software or System File Changes: Modifying system files such as `boot.ini`, kernel modules, or application binaries.\", \"old_value\": \"Changes made to a file, including updates to its contents, metadata, access permissions, or attributes. These modifications may indicate legitimate activity (e.g., software updates) or unauthorized changes (e.g., tampering, ransomware, or adversarial modifications). Examples: \\n\\n- Content Modifications: Changes to the content of a configuration file, such as modifying `/etc/ssh/sshd_config` on Linux or `C:\\\\Windows\\\\System32\\\\drivers\\\\etc\\\\hosts` on Windows.\\n- Permission Changes: Altering file permissions to allow broader access, such as changing a file from `644` to `777` on Linux or modifying NTFS permissions on Windows.\\n- Attribute Modifications: Changing a file's attributes to hidden, read-only, or system on Windows.\\n- Timestamp Manipulation: Adjusting a file's creation or modification timestamp using tools like `touch` in Linux or timestomping tools on Windows.\\n- Software or System File Changes: Modifying system files such as `boot.ini`, kernel modules, or application binaries.\\n\\nThis data component can be collected through the following measures:\\n\\nWindows\\n\\n- Event Logs: Enable file system auditing to monitor file modifications using Security Event ID 4670 (File System Audit) or Sysmon Event ID 2 (File creation time changed).\\n- PowerShell: Use Get-ItemProperty or Get-Acl cmdlets to monitor file properties: `Get-Item -Path \\\"C:\\\\path\\\\to\\\\file\\\" | Select-Object Name, Attributes, LastWriteTime`\\n\\nLinux\\n\\n- File System Monitoring: Use tools like auditd with rules to monitor file modifications: `auditctl -w /path/to/file -p wa -k file_modification`\\n- Inotify: Use inotifywait to watch for real-time changes to files or directories: `inotifywait -m /path/to/file`\\n\\nmacOS\\n\\n- Endpoint Security Framework (ESF): Monitor file modification events using ESF APIs.\\n- Audit Framework: Configure audit rules to track file changes.\\n- Command-Line Tools: Use fs_usage to monitor file activities: `fs_usage -w /path/to/file`\\n\\nSIEM Tools\\n\\n- Collect logs from endpoint agents (e.g., Sysmon, Auditd) and file servers to centralize file modification event data.\", \"diff\": \"--- \\n+++ \\n@@ -5,25 +5,3 @@\\n - Attribute Modifications: Changing a file's attributes to hidden, read-only, or system on Windows.\\n - Timestamp Manipulation: Adjusting a file's creation or modification timestamp using tools like `touch` in Linux or timestomping tools on Windows.\\n - Software or System File Changes: Modifying system files such as `boot.ini`, kernel modules, or application binaries.\\n-\\n-This data component can be collected through the following measures:\\n-\\n-Windows\\n-\\n-- Event Logs: Enable file system auditing to monitor file modifications using Security Event ID 4670 (File System Audit) or Sysmon Event ID 2 (File creation time changed).\\n-- PowerShell: Use Get-ItemProperty or Get-Acl cmdlets to monitor file properties: `Get-Item -Path \\\"C:\\\\path\\\\to\\\\file\\\" | Select-Object Name, Attributes, LastWriteTime`\\n-\\n-Linux\\n-\\n-- File System Monitoring: Use tools like auditd with rules to monitor file modifications: `auditctl -w /path/to/file -p wa -k file_modification`\\n-- Inotify: Use inotifywait to watch for real-time changes to files or directories: `inotifywait -m /path/to/file`\\n-\\n-macOS\\n-\\n-- Endpoint Security Framework (ESF): Monitor file modification events using ESF APIs.\\n-- Audit Framework: Configure audit rules to track file changes.\\n-- Command-Line Tools: Use fs_usage to monitor file activities: `fs_usage -w /path/to/file`\\n-\\n-SIEM Tools\\n-\\n-- Collect logs from endpoint agents (e.g., Sysmon, Auditd) and file servers to centralize file modification event data.\"}, \"root['x_mitre_log_sources'][8]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\", \"new_path\": \"root['x_mitre_log_sources'][54]['channel']\"}, \"root['x_mitre_log_sources'][59]['name']\": {\"new_value\": \"WinEventLog:CodeIntegrity\", \"old_value\": \"WinEventLog:Sysmon\", \"new_path\": \"root['x_mitre_log_sources'][109]['name']\"}, \"root['x_mitre_log_sources'][59]['channel']\": {\"new_value\": \"EventCode=3033\", \"old_value\": \"EvenCode=2\", \"new_path\": \"root['x_mitre_log_sources'][109]['channel']\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][55]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4656,4663\"}, \"root['x_mitre_log_sources'][76]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4670\"}, \"root['x_mitre_log_sources'][112]\": {\"name\": \"WinEventLog:Application\", \"channel\": \"81,3033\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Changes made to a file, including updates to its contents, mt1Changes made to a file, including updates to its contents, m
>etadata, access permissions, or attributes. These modificati>etadata, access permissions, or attributes. These modificati
>ons may indicate legitimate activity (e.g., software updates>ons may indicate legitimate activity (e.g., software updates
>) or unauthorized changes (e.g., tampering, ransomware, or a>) or unauthorized changes (e.g., tampering, ransomware, or a
>dversarial modifications). Examples:   - Content Modificatio>dversarial modifications). Examples:   - Content Modificatio
>ns: Changes to the content of a configuration file, such as >ns: Changes to the content of a configuration file, such as 
>modifying `/etc/ssh/sshd_config` on Linux or `C:\\Windows\\Sys>modifying `/etc/ssh/sshd_config` on Linux or `C:\\Windows\\Sys
>tem32\\drivers\\etc\\hosts` on Windows. - Permission Changes: A>tem32\\drivers\\etc\\hosts` on Windows. - Permission Changes: A
>ltering file permissions to allow broader access, such as ch>ltering file permissions to allow broader access, such as ch
>anging a file from `644` to `777` on Linux or modifying NTFS>anging a file from `644` to `777` on Linux or modifying NTFS
> permissions on Windows. - Attribute Modifications: Changing> permissions on Windows. - Attribute Modifications: Changing
> a file's attributes to hidden, read-only, or system on Wind> a file's attributes to hidden, read-only, or system on Wind
>ows. - Timestamp Manipulation: Adjusting a file's creation o>ows. - Timestamp Manipulation: Adjusting a file's creation o
>r modification timestamp using tools like `touch` in Linux o>r modification timestamp using tools like `touch` in Linux o
>r timestomping tools on Windows. - Software or System File C>r timestomping tools on Windows. - Software or System File C
>hanges: Modifying system files such as `boot.ini`, kernel mo>hanges: Modifying system files such as `boot.ini`, kernel mo
>dules, or application binaries.  This data component can be >dules, or application binaries.
>collected through the following measures:  Windows  - Event  
>Logs: Enable file system auditing to monitor file modificati 
>ons using Security Event ID 4670 (File System Audit) or Sysm 
>on Event ID 2 (File creation time changed). - PowerShell: Us 
>e Get-ItemProperty or Get-Acl cmdlets to monitor file proper 
>ties: `Get-Item -Path \"C:\\path\\to\\file\" | Select-Object Name 
>, Attributes, LastWriteTime`  Linux  - File System Monitorin 
>g: Use tools like auditd with rules to monitor file modifica 
>tions: `auditctl -w /path/to/file -p wa -k file_modification 
>` - Inotify: Use inotifywait to watch for real-time changes  
>to files or directories: `inotifywait -m /path/to/file`  mac 
>OS  - Endpoint Security Framework (ESF): Monitor file modifi 
>cation events using ESF APIs. - Audit Framework: Configure a 
>udit rules to track file changes. - Command-Line Tools: Use  
>fs_usage to monitor file activities: `fs_usage -w /path/to/f 
>ile`  SIEM Tools  - Collect logs from endpoint agents (e.g., 
> Sysmon, Auditd) and file servers to centralize file modific 
>ation event data. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--9ce98c86-8d30-4043-ba54-0784d478d0b5", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.274000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0067", + "external_id": "DC0067" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Logon Session Creation", + "description": "The successful establishment of a new user session following a successful authentication attempt. This typically signifies that a user has provided valid credentials or authentication tokens, and the system has initiated a session associated with that user account. This data is crucial for tracking authentication events and identifying potential unauthorized access. Examples: \n\n- Windows Systems\n - Event ID: 4624\n - Logon Type: 2 (Interactive) or 10 (Remote Interactive via RDP).\n - Account Name: JohnDoe\n - Source Network Address: 192.168.1.100\n - Authentication Package: NTLM\n- Linux Systems\n - /var/log/utmp or /var/log/wtmp:\n - Log format: login user [tty] from [source_ip]\n - User: jane\n - IP: 10.0.0.5\n - Timestamp: 2024-12-28 08:30:00\n- macOS Systems\n - /var/log/asl.log or unified logging framework:\n - Log: com.apple.securityd: Authentication succeeded for user 'admin'\n- Cloud Environments\n - Azure Sign-In Logs:\n - Activity: Sign-in successful\n - Client App: Browser\n - Location: Unknown (Country: X)\n- Google Workspace\n - Activity: Login\n - Event Type: successful_login\n - Source IP: 203.0.113.55", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Logon Session", + "channel": "None" + }, + { + "name": "macos:unifiedlog", + "channel": "UserLoggedIn" + }, + { + "name": "AWS:CloudTrail", + "channel": "ConsoleLogin, AssumeRole, ListResources" + }, + { + "name": "azure:signin", + "channel": "UserLoginSuccess, TokenIssued" + }, + { + "name": "Okta:SystemLog", + "channel": "user.authentication.sso, app.oauth.grant" + }, + { + "name": "m365:signinlogs", + "channel": "SignInSuccess, RoleAssignmentRead" + }, + { + "name": "m365:unified", + "channel": "UserLoggedIn" + }, + { + "name": "gcp:audit", + "channel": "LoginAudit, DriveAudit" + }, + { + "name": "saas:auth", + "channel": "LoginSuccess, APIKeyUse, AdminAction" + }, + { + "name": "azure:signinlogs", + "channel": "Abnormal sign-in from scripting tools (PowerShell, AADInternals)" + }, + { + "name": "azure:signinlogs", + "channel": "Suspicious login to cloud mailbox system" + }, + { + "name": "azure:signinlogs", + "channel": "Failed MFA attempts, unusual conditional access triggers, login attempts from unexpected IP ranges" + }, + { + "name": "AWS:CloudTrail", + "channel": "ConsoleLogin" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4648" + }, + { + "name": "NSM:Connections", + "channel": "Mismatch between recorded user logon and active sessions (e.g., wtmp/utmp entries without corresponding authentication in auth.log)" + }, + { + "name": "macos:unifiedlog", + "channel": "Authentication inconsistencies where commands are executed without corresponding login events" + }, + { + "name": "CloudTrail:Signin", + "channel": "SAML login without corresponding IdP authentication log" + }, + { + "name": "m365:sharepoint", + "channel": "File access with forged or anomalous SAML claims" + }, + { + "name": "AWS:CloudTrail", + "channel": "Web console logins using session cookies without corresponding MFA event" + }, + { + "name": "saas:access", + "channel": "Multiple concurrent logins using same cookie from different locations" + }, + { + "name": "AWS:CloudTrail", + "channel": "ConsoleLogin: If IdP backed by cloud provider, Console login from new IP/agent after correlated endpoint compromise" + }, + { + "name": "macos:unifiedlog", + "channel": "authentication" + }, + { + "name": "AWS:CloudTrail", + "channel": "SendSSHPublicKey, StartSession (SSM), EC2InstanceConnect" + }, + { + "name": "azure:signin", + "channel": "Microsoft.Compute/virtualMachines/serialConsole/connect/action" + }, + { + "name": "gcp:audit", + "channel": "cloud.ssh.publicKey.inserted, compute.instances.osLogin" + }, + { + "name": "NSM:Connections", + "channel": "Missing new login event but session activity continues" + }, + { + "name": "macos:unifiedlog", + "channel": "Session reuse without new auth event" + }, + { + "name": "AWS:CloudTrail", + "channel": "Temporary security credentials used to authenticate into management console or APIs" + }, + { + "name": "macos:unifiedlog", + "channel": "Access to Keychain items or browser credential stores" + }, + { + "name": "m365:signinlogs", + "channel": "Token usage events with device/user mismatch" + }, + { + "name": "saas:github", + "channel": "Login from unusual IP, device fingerprint, or location; access token creation from new client" + }, + { + "name": "linux:syslog", + "channel": "sshd: Accepted password/publickey" + }, + { + "name": "macos:unifiedlog", + "channel": "eventMessage CONTAINS 'screensharingd' or 'AuthorizationRefCreate'" + }, + { + "name": "AWS:CloudTrail", + "channel": "AWS ConsoleLogin, StartSession" + }, + { + "name": "esxi:vmkernel", + "channel": "vim.fault.*, DCUI login, SSH shell" + }, + { + "name": "AWS:CloudTrail", + "channel": "GetConsoleOutput" + }, + { + "name": "saas:okta", + "channel": "user.session.start" + }, + { + "name": "m365:unified", + "channel": "ViewAdminReport" + }, + { + "name": "saas:zoom", + "channel": "Zoom Admin Dashboard accessed from unfamiliar IP/device" + }, + { + "name": "WinEventLog:Security", + "channel": "Anomalous logon without MFA enforcement" + }, + { + "name": "networkdevice:Firewall", + "channel": "Login from untrusted IP, or new admin account accessing firewall console/API" + }, + { + "name": "linux:syslog", + "channel": "authentication success after file access" + }, + { + "name": "macos:unifiedlog", + "channel": "Keychain or user login post-access" + }, + { + "name": "AWS:CloudTrail", + "channel": "sudden role assumption after credential file access" + }, + { + "name": "NSM:Connections", + "channel": "Accepted publickey for user from unusual IP or without tty" + }, + { + "name": "saas:confluence", + "channel": "logon" + }, + { + "name": "linux:syslog", + "channel": "auth.log / secure.log" + }, + { + "name": "esxi:auth", + "channel": "Shell login or escalation" + }, + { + "name": "linux:auth", + "channel": "User login event followed by unexpected process tree" + }, + { + "name": "azure:signinlogs", + "channel": "InteractiveUserLogin: Discovery behavior linked to privileged logins from atypical IP ranges" + }, + { + "name": "m365:signinlogs", + "channel": "UserLogin: Discovery operations shortly after account logins from new geolocations" + }, + { + "name": "saas:auth", + "channel": "Login, TokenGranted: Discovery actions tied to anomalous login sessions or tokens" + }, + { + "name": "NSM:Connections", + "channel": "simultaneous or anomalous logon sessions across multiple systems" + }, + { + "name": "macos:unifiedlog", + "channel": "authentication plugin load or modification events" + }, + { + "name": "azure:ad", + "channel": "SignInEvents" + }, + { + "name": "linux:syslog", + "channel": "Accepted publickey/password for * from * port * ssh2" + }, + { + "name": "macos:unifiedlog", + "channel": "loginwindow or sshd successful login events" + }, + { + "name": "azure:signinlogs", + "channel": "InteractiveUser, ServicePrincipalSignIn" + }, + { + "name": "AWS:CloudTrail", + "channel": "AssumeRole,AssumeRoleWithSAML,AssumeRoleWithWebIdentity" + }, + { + "name": "azure:signinlogs", + "channel": "InteractiveUser, NonInteractiveUser" + }, + { + "name": "azure:signinlogs", + "channel": "UserLogin, ConditionalAccessPolicyEvaluated" + }, + { + "name": "saas:okta", + "channel": "session.token.reuse" + }, + { + "name": "auditd:SYSCALL", + "channel": "capset or setns" + }, + { + "name": "gcp:audit", + "channel": "admin.googleapis.com" + }, + { + "name": "m365:signinlogs", + "channel": "UserLoggedIn" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4624" + }, + { + "name": "linux:syslog", + "channel": "None" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:35.022000+00:00\"}, \"root['description']\": {\"new_value\": \"The successful establishment of a new user session following a successful authentication attempt. This typically signifies that a user has provided valid credentials or authentication tokens, and the system has initiated a session associated with that user account. This data is crucial for tracking authentication events and identifying potential unauthorized access. Examples: \\n\\n- Windows Systems\\n - Event ID: 4624\\n - Logon Type: 2 (Interactive) or 10 (Remote Interactive via RDP).\\n - Account Name: JohnDoe\\n - Source Network Address: 192.168.1.100\\n - Authentication Package: NTLM\\n- Linux Systems\\n - /var/log/utmp or /var/log/wtmp:\\n - Log format: login user [tty] from [source_ip]\\n - User: jane\\n - IP: 10.0.0.5\\n - Timestamp: 2024-12-28 08:30:00\\n- macOS Systems\\n - /var/log/asl.log or unified logging framework:\\n - Log: com.apple.securityd: Authentication succeeded for user 'admin'\\n- Cloud Environments\\n - Azure Sign-In Logs:\\n - Activity: Sign-in successful\\n - Client App: Browser\\n - Location: Unknown (Country: X)\\n- Google Workspace\\n - Activity: Login\\n - Event Type: successful_login\\n - Source IP: 203.0.113.55\", \"old_value\": \"The successful establishment of a new user session following a successful authentication attempt. This typically signifies that a user has provided valid credentials or authentication tokens, and the system has initiated a session associated with that user account. This data is crucial for tracking authentication events and identifying potential unauthorized access. Examples: \\n\\n- Windows Systems\\n - Event ID: 4624\\n - Logon Type: 2 (Interactive) or 10 (Remote Interactive via RDP).\\n - Account Name: JohnDoe\\n - Source Network Address: 192.168.1.100\\n - Authentication Package: NTLM\\n- Linux Systems\\n - /var/log/utmp or /var/log/wtmp:\\n - Log format: login user [tty] from [source_ip]\\n - User: jane\\n - IP: 10.0.0.5\\n - Timestamp: 2024-12-28 08:30:00\\n- macOS Systems\\n - /var/log/asl.log or unified logging framework:\\n - Log: com.apple.securityd: Authentication succeeded for user 'admin'\\n- Cloud Environments\\n - Azure Sign-In Logs:\\n - Activity: Sign-in successful\\n - Client App: Browser\\n - Location: Unknown (Country: X)\\n- Google Workspace\\n - Activity: Login\\n - Event Type: successful_login\\n - Source IP: 203.0.113.55\\n\\nThis data component can be collected through the following measures:\\n\\n- Windows Systems\\n - Event Logs: Monitor Security Event Logs using Event ID 4624 for successful logons.\\n - PowerShell Example: `Get-EventLog -LogName Security -InstanceId 4624`\\n- Linux Systems\\n - Log Files: Monitor `/var/log/utmp`, `/var/log/wtmp`, or `/var/log/auth.log` for logon events.\\n - Tools: Use `last` or `who` commands to parse login records.\\n- macOS Systems\\n - Log Sources: Monitor `/var/log/asl.log` or Apple Unified Logs using the `log show` command.\\n - Command Example: `log show --predicate 'eventMessage contains \\\"Authentication succeeded\\\"' --info`\\n- Cloud Environments\\n - Azure AD: Use Azure Monitor to analyze sign-in logs. Example CLI Query: `az monitor log-analytics query -w --analytics-query \\\"AzureActivity | where ActivityStatus == 'Success' and OperationName == 'Sign-in'\\\"`\\n - Google Workspace: Enable and monitor Login Audit logs from the Admin Console.\\n - Office 365: Use Audit Log Search in Microsoft 365 Security & Compliance Center for login-related events.\\n- Network Logs\\n - Sources: Network authentication mechanisms (e.g., RADIUS or TACACS logs).\\n- Enable EDR Monitoring: \\n - EDR tools monitor logon session activity, including the creation of new sessions.\\n - Configure alerts for: Suspicious logon types (e.g., Logon Type 10 for RDP or Type 5 for Service). Logons from unusual locations, accounts, or devices.\\n - Leverage EDR telemetry for session attributes like source IP, session duration, and originating process.\", \"diff\": \"--- \\n+++ \\n@@ -24,25 +24,3 @@\\n - Activity: Login\\n - Event Type: successful_login\\n - Source IP: 203.0.113.55\\n-\\n-This data component can be collected through the following measures:\\n-\\n-- Windows Systems\\n- - Event Logs: Monitor Security Event Logs using Event ID 4624 for successful logons.\\n- - PowerShell Example: `Get-EventLog -LogName Security -InstanceId 4624`\\n-- Linux Systems\\n- - Log Files: Monitor `/var/log/utmp`, `/var/log/wtmp`, or `/var/log/auth.log` for logon events.\\n- - Tools: Use `last` or `who` commands to parse login records.\\n-- macOS Systems\\n- - Log Sources: Monitor `/var/log/asl.log` or Apple Unified Logs using the `log show` command.\\n- - Command Example: `log show --predicate 'eventMessage contains \\\"Authentication succeeded\\\"' --info`\\n-- Cloud Environments\\n- - Azure AD: Use Azure Monitor to analyze sign-in logs. Example CLI Query: `az monitor log-analytics query -w --analytics-query \\\"AzureActivity | where ActivityStatus == 'Success' and OperationName == 'Sign-in'\\\"`\\n- - Google Workspace: Enable and monitor Login Audit logs from the Admin Console.\\n- - Office 365: Use Audit Log Search in Microsoft 365 Security & Compliance Center for login-related events.\\n-- Network Logs\\n- - Sources: Network authentication mechanisms (e.g., RADIUS or TACACS logs).\\n-- Enable EDR Monitoring: \\n- - EDR tools monitor logon session activity, including the creation of new sessions.\\n- - Configure alerts for: Suspicious logon types (e.g., Logon Type 10 for RDP or Type 5 for Service). Logons from unusual locations, accounts, or devices.\\n- - Leverage EDR telemetry for session attributes like source IP, session duration, and originating process.\"}, \"root['x_mitre_log_sources'][5]['name']\": {\"new_value\": \"m365:signinlogs\", \"old_value\": \"m365:signin\"}, \"root['x_mitre_log_sources'][31]['name']\": {\"new_value\": \"m365:signinlogs\", \"old_value\": \"m365:signin\", \"new_path\": \"root['x_mitre_log_sources'][29]['name']\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][26]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4624 with LogonType=9 or smartcard logon\"}, \"root['x_mitre_log_sources'][33]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4624 (LogonType=10 or 3), EventCode=4648\"}, \"root['x_mitre_log_sources'][38]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4624 (LogonType=3)\"}, \"root['x_mitre_log_sources'][48]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4624 (LogonType=10), EventCode=4648\"}, \"root['x_mitre_log_sources'][49]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4624, 4672, 4648\"}, \"root['x_mitre_log_sources'][58]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"4624\"}, \"root['x_mitre_log_sources'][61]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4624,4648, 4672\"}, \"root['x_mitre_log_sources'][63]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4624,4648,4672,4769\"}, \"root['x_mitre_log_sources'][74]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventID=4624\"}, \"root['x_mitre_log_sources'][75]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4624, 4634\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1The successful establishment of a new user session followingt1The successful establishment of a new user session following
> a successful authentication attempt. This typically signifi> a successful authentication attempt. This typically signifi
>es that a user has provided valid credentials or authenticat>es that a user has provided valid credentials or authenticat
>ion tokens, and the system has initiated a session associate>ion tokens, and the system has initiated a session associate
>d with that user account. This data is crucial for tracking >d with that user account. This data is crucial for tracking 
>authentication events and identifying potential unauthorized>authentication events and identifying potential unauthorized
> access. Examples:   - Windows Systems     - Event ID: 4624 > access. Examples:   - Windows Systems     - Event ID: 4624 
>        - Logon Type: 2 (Interactive) or 10 (Remote Interact>        - Logon Type: 2 (Interactive) or 10 (Remote Interact
>ive via RDP).         - Account Name: JohnDoe         - Sour>ive via RDP).         - Account Name: JohnDoe         - Sour
>ce Network Address: 192.168.1.100         - Authentication P>ce Network Address: 192.168.1.100         - Authentication P
>ackage: NTLM - Linux Systems     - /var/log/utmp or /var/log>ackage: NTLM - Linux Systems     - /var/log/utmp or /var/log
>/wtmp:         - Log format: login user [tty] from [source_i>/wtmp:         - Log format: login user [tty] from [source_i
>p]         - User: jane         - IP: 10.0.0.5         - Tim>p]         - User: jane         - IP: 10.0.0.5         - Tim
>estamp: 2024-12-28 08:30:00 - macOS Systems     - /var/log/a>estamp: 2024-12-28 08:30:00 - macOS Systems     - /var/log/a
>sl.log or unified logging framework:         - Log: com.appl>sl.log or unified logging framework:         - Log: com.appl
>e.securityd: Authentication succeeded for user 'admin' - Clo>e.securityd: Authentication succeeded for user 'admin' - Clo
>ud Environments     - Azure Sign-In Logs:         - Activity>ud Environments     - Azure Sign-In Logs:         - Activity
>: Sign-in successful         - Client App: Browser         ->: Sign-in successful         - Client App: Browser         -
> Location: Unknown (Country: X) - Google Workspace     - Act> Location: Unknown (Country: X) - Google Workspace     - Act
>ivity: Login         - Event Type: successful_login         >ivity: Login         - Event Type: successful_login         
>- Source IP: 203.0.113.55  This data component can be collec>- Source IP: 203.0.113.55
>ted through the following measures:  - Windows Systems     - 
> Event Logs: Monitor Security Event Logs using Event ID 4624 
> for successful logons.     - PowerShell Example: `Get-Event 
>Log -LogName Security -InstanceId 4624` - Linux Systems      
>- Log Files: Monitor `/var/log/utmp`, `/var/log/wtmp`, or `/ 
>var/log/auth.log` for logon events.     - Tools: Use `last`  
>or `who` commands to parse login records. - macOS Systems    
>  - Log Sources: Monitor `/var/log/asl.log` or Apple Unified 
> Logs using the `log show` command.     - Command Example: ` 
>log show --predicate 'eventMessage contains \"Authentication  
>succeeded\"' --info` - Cloud Environments     - Azure AD: Use 
> Azure Monitor to analyze sign-in logs. Example CLI Query: ` 
>az monitor log-analytics query -w <workspace_id> --analytics 
>-query \"AzureActivity | where ActivityStatus == 'Success' an 
>d OperationName == 'Sign-in'\"`     - Google Workspace: Enabl 
>e and monitor Login Audit logs from the Admin Console.     - 
> Office 365: Use Audit Log Search in Microsoft 365 Security  
>& Compliance Center for login-related events. - Network Logs 
>     - Sources: Network authentication mechanisms (e.g., RAD 
>IUS or TACACS logs). - Enable EDR Monitoring:      - EDR too 
>ls monitor logon session activity, including the creation of 
> new sessions.     - Configure alerts for: Suspicious logon  
>types (e.g., Logon Type 10 for RDP or Type 5 for Service). L 
>ogons from unusual locations, accounts, or devices.     - Le 
>verage EDR telemetry for session attributes like source IP,  
>session duration, and originating process. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--39b9db72-8b48-4595-a18d-db5bbba3091b", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.274000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0088", + "external_id": "DC0088" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Logon Session Metadata", + "description": "Contextual data about a logon session, such as username, logon type, access tokens (security context, user SIDs, logon identifiers, and logon SID), and any activity associated within it", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Logon Session", + "channel": "None" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4672" + }, + { + "name": "macos:unifiedlog", + "channel": "LoginWindow context with associated PID linked to reopened plist paths" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4672, 4634" + }, + { + "name": "azure:signinlogs", + "channel": "SAML-based login with anomalous issuer or NotOnOrAfter lifetime" + }, + { + "name": "m365:unified", + "channel": "Abnormal user claims or unexpected elevated role assignment in SAML assertion" + }, + { + "name": "macos:unifiedlog", + "channel": "authd generating multiple MFA token requests" + }, + { + "name": "linux:syslog", + "channel": "None" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4624, 4625, 4768, 4769" + }, + { + "name": "linux:syslog", + "channel": "sssd / sudo logs" + }, + { + "name": "esxi:hostd", + "channel": "/var/log/hostd.log" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4778, EventCode=4779" + }, + { + "name": "auditd:SYSCALL", + "channel": "ssh logins or execve of remote commands" + }, + { + "name": "macos:unifiedlog", + "channel": "Remote login (ssh) or screen sharing authentication attempts" + }, + { + "name": "kubernetes:audit", + "channel": "Unauthorized container creation or kubelet exec logs" + }, + { + "name": "auditd:USER_LOGIN", + "channel": "USER_LOGIN" + }, + { + "name": "macos:unifiedlog", + "channel": "loginwindow or sshd" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4800, 4801" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4776, 4771, 4770" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve,socket,connect,openat" + }, + { + "name": "macos:unifiedlog", + "channel": "Group membership change for admin or wheel" + }, + { + "name": "azure:audit", + "channel": "Add delegated admin / Assign admin roles / Update application consent" + }, + { + "name": "saas:okta", + "channel": "user.session.start, app.oauth2.as.authorize, policy.mfa.bypass" + }, + { + "name": "gcp:audit", + "channel": "google.iam.credentials.generateAccessToken / serviceAccountTokenCreator" + }, + { + "name": "saas:salesforce", + "channel": "ConnectedApp OAuth policy change / Login as user" + }, + { + "name": "macos:unifiedlog", + "channel": "Unusual Kerberos TGS-REQ without TGT or anomalous ticket lifetime" + }, + { + "name": "saas:okta", + "channel": "user.authentication.sso" + }, + { + "name": "m365:unified", + "channel": "FileAccessed, SharingSet" + }, + { + "name": "m365:signinlogs", + "channel": "UserLogin" + }, + { + "name": "macos:unifiedlog", + "channel": "loginwindow, sshd" + }, + { + "name": "NSM:Connections", + "channel": "Successful sudo or ssh from unknown IPs" + }, + { + "name": "macos:unifiedlog", + "channel": "loginwindow or sshd events with external IP" + }, + { + "name": "macos:unifiedlog", + "channel": "process = 'sshd'" + }, + { + "name": "esxi:auth", + "channel": "None" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:36.246000+00:00\"}, \"root['x_mitre_log_sources'][4]['name']\": {\"new_value\": \"azure:signinlogs\", \"old_value\": \"azure:signinLogs\"}, \"root['x_mitre_log_sources'][3]['channel']\": {\"new_value\": \"EventCode=4776, 4771, 4770\", \"old_value\": \"EventCode=4624, 4634, 4672, 4768, 4769\", \"new_path\": \"root['x_mitre_log_sources'][18]['channel']\"}, \"root['x_mitre_log_sources'][32]['name']\": {\"new_value\": \"m365:signinlogs\", \"old_value\": \"m365:signin\", \"new_path\": \"root['x_mitre_log_sources'][28]['name']\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][3]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4672, 4634\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][11]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4624, 4634, 4672, 4769\"}, \"root['x_mitre_log_sources'][12]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4624, 4672\"}, \"root['x_mitre_log_sources'][20]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4776,4771,4770\"}, \"root['x_mitre_log_sources'][27]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4624,4672\"}, \"root['x_mitre_log_sources'][28]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4624, 4672, 4634, 4768, 4769\"}}}", + "previous_version": "2.0" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--c0a4a086-cc20-4e1e-b7cb-29d99dfa3fb1", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.272000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0016", + "external_id": "DC0016" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Module Load", + "description": "When a process or program dynamically attaches a shared library, module, or plugin into its memory space. This action is typically performed to extend the functionality of an application, access shared system resources, or interact with kernel-mode components.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Module", + "channel": "None" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "EventCode=7" + }, + { + "name": "ETW:LoadImage", + "channel": "provider: ETW LoadImage events for images from user-writable/UNC paths" + }, + { + "name": "auditd:SYSCALL", + "channel": "openat/read/mmap: Open/mmap .so files from non-standard paths" + }, + { + "name": "linux:osquery", + "channel": "select: Open files path LIKE '/tmp/%.so' OR '/dev/shm/%.so'" + }, + { + "name": "macos:unifiedlog", + "channel": "dyld/unified log entries indicating image load from non-system paths" + }, + { + "name": "macos:osquery", + "channel": "select: path LIKE '%/Library/%/*.dylib' OR '/tmp/*.dylib'" + }, + { + "name": "macos:unifiedlog", + "channel": "dynamic loading of sleep-related functions or sandbox detection libraries" + }, + { + "name": "auditd:SYSCALL", + "channel": "LD_PRELOAD Logging" + }, + { + "name": "linux:osquery", + "channel": "Dynamic Linking State" + }, + { + "name": "macos:unifiedlog", + "channel": "DYLD event subsystem" + }, + { + "name": "linux:osquery", + "channel": "Process linked with libcrypto.so making external connections" + }, + { + "name": "macos:unifiedlog", + "channel": "process execution events with dylib load activity" + }, + { + "name": "linux:Sysmon", + "channel": "EventCode=7" + }, + { + "name": "WinEventLog:Application", + "channel": "CLR Assembly creation, loading, or modification logs via MSSQL CLR integration" + }, + { + "name": "macos:unifiedlog", + "channel": "Process memory maps new dylib (dylib_load event)" + }, + { + "name": "macos:unifiedlog", + "channel": "Dylib loaded from abnormal location" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=3033" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=3063" + }, + { + "name": "auditd:MMAP", + "channel": "load: Loading of libzip.so, libz.so, or libbz2.so by processes not normally associated with archiving" + }, + { + "name": "macos:unifiedlog", + "channel": "Loading of libz.dylib, libarchive.dylib by non-standard applications" + }, + { + "name": "macos:unifiedlog", + "channel": "suspicious dlopen/dlsym usage in non-development processes" + }, + { + "name": "m365:unified", + "channel": "Non-standard Office startup component detected (e.g., unexpected DLL path)" + }, + { + "name": "auditd:SYSCALL", + "channel": "mmap" + }, + { + "name": "esxi:vmkernel", + "channel": "unexpected module load" + }, + { + "name": "snmp:status", + "channel": "Status change in cryptographic hardware modules (enabled -> disabled)" + }, + { + "name": "esxi:vmkernel", + "channel": "module load" + }, + { + "name": "macos:unifiedlog", + "channel": "delay/sleep library usage in user context" + }, + { + "name": "linux:syslog", + "channel": "kmod" + }, + { + "name": "macos:unifiedlog", + "channel": "subsystem=com.apple.kextd" + }, + { + "name": "macos:unifiedlog", + "channel": "loading of unexpected dylibs compared to historical baselines" + }, + { + "name": "auditd:file-events", + "channel": "open of suspicious .so from non-standard paths" + }, + { + "name": "macos:syslog", + "channel": "DYLD_INSERT_LIBRARIES anomalies" + }, + { + "name": "auditd:SYSCALL", + "channel": "dmesg" + }, + { + "name": "macos:endpointsecurity", + "channel": "ES_EVENT_TYPE_NOTIFY_KEXTLOAD" + }, + { + "name": "auditd:SYSCALL", + "channel": "module load or memory map path" + }, + { + "name": "macos:unifiedlog", + "channel": "launch and dylib load" + }, + { + "name": "linux:osquery", + "channel": "Processes linked with libssl/libcrypto performing network activity" + }, + { + "name": "etw:Microsoft-Windows-Kernel-ImageLoad", + "channel": "provider: Unsigned/user-writable image loads into msbuild.exe" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:35.471000+00:00\"}, \"root['description']\": {\"new_value\": \"When a process or program dynamically attaches a shared library, module, or plugin into its memory space. This action is typically performed to extend the functionality of an application, access shared system resources, or interact with kernel-mode components.\", \"old_value\": \"When a process or program dynamically attaches a shared library, module, or plugin into its memory space. This action is typically performed to extend the functionality of an application, access shared system resources, or interact with kernel-mode components.\\n\\n*Data Collection Measures:*\\n\\n- Event Logging (Windows):\\n - Sysmon Event ID 7: Logs when a DLL is loaded into a process.\\n - Windows Security Event ID 4688: Captures process creation events, often useful for correlating module loads.\\n - Windows Defender ATP: Can provide visibility into suspicious module loads.\\n- Event Logging (Linux/macOS):\\n - AuditD (`execve` and `open` syscalls): Captures when shared libraries (`.so` files) are loaded.\\n - Ltrace/Strace: Monitors process behavior, including library calls (`dlopen`, `execve`).\\n - MacOS Endpoint Security Framework (ESF): Monitors library loads (`ES_EVENT_TYPE_NOTIFY_DYLD_INSERT_LIBRARIES`).\\n- Endpoint Detection & Response (EDR): \\n - Provide real-time telemetry on module loads and process injections.\\n - Sysinternals Process Monitor (`procmon`): Captures loaded modules and their execution context.\\n- Memory Forensics:\\n - Volatility Framework (`malfind`, `ldrmodules`): Detects injected DLLs and anomalous module loads.\\n - Rekall Framework: Useful for kernel-mode module detection.\\n- SIEM and Log Analysis:\\n - Centralized log aggregation to correlate suspicious module loads across the environment.\\n - Detection rules using correlation searches and behavioral analytics.\", \"diff\": \"--- \\n+++ \\n@@ -1,21 +1 @@\\n When a process or program dynamically attaches a shared library, module, or plugin into its memory space. This action is typically performed to extend the functionality of an application, access shared system resources, or interact with kernel-mode components.\\n-\\n-*Data Collection Measures:*\\n-\\n-- Event Logging (Windows):\\n- - Sysmon Event ID 7: Logs when a DLL is loaded into a process.\\n- - Windows Security Event ID 4688: Captures process creation events, often useful for correlating module loads.\\n- - Windows Defender ATP: Can provide visibility into suspicious module loads.\\n-- Event Logging (Linux/macOS):\\n- - AuditD (`execve` and `open` syscalls): Captures when shared libraries (`.so` files) are loaded.\\n- - Ltrace/Strace: Monitors process behavior, including library calls (`dlopen`, `execve`).\\n- - MacOS Endpoint Security Framework (ESF): Monitors library loads (`ES_EVENT_TYPE_NOTIFY_DYLD_INSERT_LIBRARIES`).\\n-- Endpoint Detection & Response (EDR): \\n- - Provide real-time telemetry on module loads and process injections.\\n- - Sysinternals Process Monitor (`procmon`): Captures loaded modules and their execution context.\\n-- Memory Forensics:\\n- - Volatility Framework (`malfind`, `ldrmodules`): Detects injected DLLs and anomalous module loads.\\n- - Rekall Framework: Useful for kernel-mode module detection.\\n-- SIEM and Log Analysis:\\n- - Centralized log aggregation to correlate suspicious module loads across the environment.\\n- - Detection rules using correlation searches and behavioral analytics.\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1When a process or program dynamically attaches a shared librt1When a process or program dynamically attaches a shared libr
>ary, module, or plugin into its memory space. This action is>ary, module, or plugin into its memory space. This action is
> typically performed to extend the functionality of an appli> typically performed to extend the functionality of an appli
>cation, access shared system resources, or interact with ker>cation, access shared system resources, or interact with ker
>nel-mode components.  *Data Collection Measures:*  - Event L>nel-mode components.
>ogging (Windows):     - Sysmon Event ID 7: Logs when a DLL i 
>s loaded into a process.     - Windows Security Event ID 468 
>8: Captures process creation events, often useful for correl 
>ating module loads.     - Windows Defender ATP: Can provide  
>visibility into suspicious module loads. - Event Logging (Li 
>nux/macOS):     - AuditD (`execve` and `open` syscalls): Cap 
>tures when shared libraries (`.so` files) are loaded.     -  
>Ltrace/Strace: Monitors process behavior, including library  
>calls (`dlopen`, `execve`).     - MacOS Endpoint Security Fr 
>amework (ESF): Monitors library loads (`ES_EVENT_TYPE_NOTIFY 
>_DYLD_INSERT_LIBRARIES`). - Endpoint Detection & Response (E 
>DR):      - Provide real-time telemetry on module loads and  
>process injections.     - Sysinternals Process Monitor (`pro 
>cmon`): Captures loaded modules and their execution context. 
> - Memory Forensics:     - Volatility Framework (`malfind`,  
>`ldrmodules`): Detects injected DLLs and anomalous module lo 
>ads.     - Rekall Framework: Useful for kernel-mode module d 
>etection. - SIEM and Log Analysis:     - Centralized log agg 
>regation to correlate suspicious module loads across the env 
>ironment.     - Detection rules using correlation searches a 
>nd behavioral analytics. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--181a9f8c-c780-4f1f-91a8-edb770e904ba", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.274000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0082", + "external_id": "DC0082" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Network Connection Creation", + "description": "The initial establishment of a network session, where a system or process initiates a connection to a local or remote endpoint. This typically involves capturing socket information (source/destination IP, ports, protocol) and tracking session metadata. Monitoring these events helps detect lateral movement, exfiltration, and command-and-control (C2) activities.\n\n*Data Collection Measures:*\n\n- Windows:\n - Event ID 5156 \u2013 Filtering Platform Connection - Logs network connections permitted by Windows Filtering Platform (WFP).\n - Sysmon Event ID 3 \u2013 Network Connection Initiated - Captures process, source/destination IP, ports, and parent process.\n- Linux/macOS:\n - Netfilter (iptables), nftables logs - Tracks incoming and outgoing network connections.\n - AuditD (`connect` syscall) - Logs TCP, UDP, and ICMP connections.\n - Zeek (`conn.log`) - Captures protocol, duration, and bytes transferred.\n- Cloud & Network Infrastructure:\n - AWS VPC Flow Logs / Azure NSG Flow Logs - Logs IP traffic at the network level in cloud environments.\n - Zeek (conn.log) or Suricata (network events) - Captures packet metadata for detection and correlation.\n- Endpoint Detection & Response (EDR):\n - Detect anomalous network activity such as new C2 connections or data exfiltration attempts.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Network Traffic", + "channel": "None" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "Outbound connection to 169.254.169.254 from EC2 workload" + }, + { + "name": "macos:unifiedlog", + "channel": "connection attempts" + }, + { + "name": "esxi:hostd", + "channel": "System service interactions" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "name": "NSM:Connections", + "channel": "web domain alerts" + }, + { + "name": "auditd:SYSCALL", + "channel": "connect" + }, + { + "name": "macos:osquery", + "channel": "process_events/socket_events" + }, + { + "name": "NSM:Firewall", + "channel": "Outbound Connections" + }, + { + "name": "macos:unifiedlog", + "channel": "connection open" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execs of chromium, google-chrome, firefox, libreoffice with http(s) in cmdline" + }, + { + "name": "NSM:Flow", + "channel": "New TCP/443 or TCP/80 to domain not previously seen for the user/host" + }, + { + "name": "NSM:Connections", + "channel": "New outbound connection from Safari/Chrome/Firefox/Word" + }, + { + "name": "NSM:Flow", + "channel": "conn.log" + }, + { + "name": "macos:osquery", + "channel": "execution of trusted tools interacting with external endpoints" + }, + { + "name": "linux:Sysmon", + "channel": "EventCode=3, 22" + }, + { + "name": "WinEventLog:Microsoft-Windows-Bits-Client/Operational", + "channel": "BITS job lifecycle events such as job create/modify/transfer/complete and URL/remote name fields" + }, + { + "name": "NSM:Firewall", + "channel": "proxy or TLS inspection logs" + }, + { + "name": "macos:unifiedlog", + "channel": "network connection events" + }, + { + "name": "esxi:vmkernel", + "channel": "protocol egress" + }, + { + "name": "NSM:Flow", + "channel": "Outbound connection to *.tunnels.api.visualstudio.com or *.devtunnels.ms" + }, + { + "name": "NSM:Flow", + "channel": "Connections to *.devtunnels.ms or tunnels.api.visualstudio.com" + }, + { + "name": "NSM:Flow", + "channel": "HTTPs connection to tunnels.api.visualstudio.com" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=5156, 5157" + }, + { + "name": "linux:osquery", + "channel": "family=AF_PACKET or protocol raw; process name not in allowlist." + }, + { + "name": "macos:unifiedlog", + "channel": "First outbound connection from the same PID/user shortly after an inbound trigger." + }, + { + "name": "NSM:Flow", + "channel": "Outbound or inbound TFTP file transfers of ROMMON or firmware binaries" + }, + { + "name": "NSM:Connections", + "channel": "Outbound connections from newly spawned child processes or from the browser to uncommon endpoints or on anomalous ports" + }, + { + "name": "NSM:Flow", + "channel": "connection: TCP connections to ports 139/445 to multiple hosts" + }, + { + "name": "NSM:Flow", + "channel": "connection: SMB connections to multiple internal hosts" + }, + { + "name": "auditd:SYSCALL", + "channel": "connect/sendto" + }, + { + "name": "macos:endpointsecurity", + "channel": "ES_EVENT_TYPE_NOTIFY_CONNECT" + }, + { + "name": "snmp:access", + "channel": "GETBULK/GETNEXT requests for OIDs associated with configuration parameters" + }, + { + "name": "esxi:hostd", + "channel": "Service initiated connections" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "Large transfer volume (>20MB) from RDS IP range to external public IPs" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "High outbound traffic from new region resource" + }, + { + "name": "NSM:Flow", + "channel": "Outbound HTTP/S initiated by newly installed interpreter process" + }, + { + "name": "auditd:SYSCALL", + "channel": "open or connect syscalls on /tmp/ssh-* or $SSH_AUTH_SOCK" + }, + { + "name": "NSM:Flow", + "channel": "outbound connections to RMM services or to unusual destination ports" + }, + { + "name": "macos:unifiedlog", + "channel": "network sessions initiated by remote desktop apps" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "Outbound connections to port 22, 3389" + }, + { + "name": "auditd:SYSCALL", + "channel": "socket/connect with TLS context by unexpected process" + }, + { + "name": "NSM:Flow", + "channel": "Multiple failed connections (conn_state=REJ/S0 or history has 'R') across distinct ports from the same src_ip followed by success to a specific port." + }, + { + "name": "auditd:SYSCALL", + "channel": "socket/bind: New bind() to a previously closed port shortly after the sequence." + }, + { + "name": "NSM:Flow", + "channel": "Sequence of REJ/S0 then SF success from same src_ip within TimeWindow." + }, + { + "name": "NSM:Flow", + "channel": "Series of denied/closed flows to distinct ports then success to mgmt port from same src_ip within TimeWindow." + }, + { + "name": "NSM:Flow", + "channel": "Outbound traffic spike through formerly blocked ports/subnets following config change" + }, + { + "name": "cni:netflow", + "channel": "outbound connection to internal or external APIs" + }, + { + "name": "macos:osquery", + "channel": "launchd or network_events" + }, + { + "name": "networkdevice:syslog", + "channel": "Dynamic route changes" + }, + { + "name": "NSM:Flow", + "channel": "New egress to Internet by the same UID/host shortly after terminal exec" + }, + { + "name": "NSM:Flow", + "channel": "connection: Inbound connections to SSH or VPN ports" + }, + { + "name": "macos:unifiedlog", + "channel": "Inbound connections to VNC/SSH ports" + }, + { + "name": "NSM:Flow", + "channel": "External access to container ports (2375, 6443)" + }, + { + "name": "linux:syslog", + "channel": "network" + }, + { + "name": "macos:osquery", + "channel": "process_events + launchd" + }, + { + "name": "esxi:esxupdate", + "channel": "/var/log/esxupdate.log or /var/log/vmksummary.log" + }, + { + "name": "ebpf:syscalls", + "channel": "socket connect" + }, + { + "name": "NSM:Flow", + "channel": "remote access" + }, + { + "name": "NSM:Flow", + "channel": "Outbound Connections" + }, + { + "name": "macos:unifiedlog", + "channel": "network" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "Traffic observed on mirror destination instance" + }, + { + "name": "networkdevice:Flow", + "channel": "Traffic from mirrored interface to mirror target IP" + }, + { + "name": "macos:osquery", + "channel": "process_events, socket_events" + }, + { + "name": "esxi:vmkernel", + "channel": "network activity" + }, + { + "name": "NSM:Flow", + "channel": "connection attempts" + }, + { + "name": "NSM:Flow", + "channel": "High-volume or repeated SNMP GETBULK/GETNEXT queries from untrusted or external IPs" + }, + { + "name": "auditd:SYSCALL", + "channel": "sendto/connect" + }, + { + "name": "NSM:Flow", + "channel": "outbound connections from host during or immediately after image build" + }, + { + "name": "macos:unifiedlog", + "channel": "Outbound Traffic" + }, + { + "name": "esxi:hostd", + "channel": "Service-Based Network Connection" + }, + { + "name": "linux:syslog", + "channel": "postfix/smtpd" + }, + { + "name": "NSM:Flow", + "channel": "new outbound connection from browser/office lineage" + }, + { + "name": "NSM:Flow", + "channel": "new outbound connection from exploited lineage" + }, + { + "name": "macos:osquery", + "channel": "CONNECT: Long-lived connections from remote-control parents to external IPs/domains" + }, + { + "name": "auditd:SYSCALL", + "channel": "outbound connections" + }, + { + "name": "macos:unifiedlog", + "channel": "None" + }, + { + "name": "esxi:vmkernel", + "channel": "None" + }, + { + "name": "macos:unifiedlog", + "channel": "networkd or socket" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream network activity" + }, + { + "name": "NSM:Flow", + "channel": "Multiple failed connections to closed ports (history contains 'R' or conn_state in {REJ, S0}) followed by a successful handshake to a new port from same src within TimeWindowKnock" + }, + { + "name": "auditd:SYSCALL", + "channel": "socket/bind: Process binds to a new local port shortly after knock" + }, + { + "name": "NSM:Flow", + "channel": "Closed-port hits followed by success from same src_ip" + }, + { + "name": "NSM:Flow", + "channel": "Port-knock pattern from one src to device unicast,broadcast,network addresses on same port within TimeWindowKnock" + }, + { + "name": "WinEventLog:Microsoft-Windows-WLAN-AutoConfig", + "channel": "EventCode=8001, 8002, 8003" + }, + { + "name": "linux:syslog", + "channel": "New Wi-Fi connection established or repeated association failures" + }, + { + "name": "macos:unifiedlog", + "channel": "Association and authentication events including failures and new SSIDs" + }, + { + "name": "auditd:SYSCALL", + "channel": "socket/connect calls showing SSH processes forwarding arbitrary ports" + }, + { + "name": "esxi:vmkernel", + "channel": "network session initiation with external HTTPS services" + }, + { + "name": "WinEventLog:System", + "channel": "EventCode=8001" + }, + { + "name": "linux:syslog", + "channel": "None" + }, + { + "name": "macos:osquery", + "channel": "None" + }, + { + "name": "auditd:SYSCALL", + "channel": "openat,connect -k discovery" + }, + { + "name": "NSM:Flow", + "channel": "Unexpected inbound/outbound TFTP traffic for device image files" + }, + { + "name": "NSM:Flow", + "channel": "Unexpected or unauthorized inbound connections to SNMP, NETCONF, or RESTCONF services" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "mobile-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:34.190000+00:00\"}, \"root['x_mitre_log_sources'][19]['channel']\": {\"new_value\": \"EventCode=3, 22\", \"old_value\": \"EventCode=22\", \"new_path\": \"root['x_mitre_log_sources'][15]['channel']\"}, \"root['x_mitre_log_sources'][27]['channel']\": {\"new_value\": \"EventCode=5156, 5157\", \"old_value\": \"EventCode=5156\", \"new_path\": \"root['x_mitre_log_sources'][23]['channel']\"}, \"root['x_mitre_log_sources'][90]['channel']\": {\"new_value\": \"EventCode=8001, 8002, 8003\", \"old_value\": \"8001, 8002, 8003\", \"new_path\": \"root['x_mitre_log_sources'][84]['channel']\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][2]\": {\"name\": \"WinEventLog:Sysmon\", \"channel\": \"EventCode=3\"}, \"root['x_mitre_log_sources'][7]\": {\"name\": \"WinEventLog:Sysmon\", \"channel\": \"EventCode=22\"}, \"root['x_mitre_log_sources'][9]\": {\"name\": \"auditd:SYSCALL\", \"channel\": \"netconnect\"}, \"root['x_mitre_log_sources'][17]\": {\"name\": \"auditd:SYSCALL\", \"channel\": \"open or connect\"}, \"root['x_mitre_log_sources'][28]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=5156,5157\"}, \"root['x_mitre_log_sources'][68]\": {\"name\": \"linux:Sysmon\", \"channel\": \"EventCode=3\"}}}", + "previous_version": "2.0" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--f5468e67-51c7-4756-9b4f-65707708e7fa", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.275000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0102", + "external_id": "DC0102" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Network Share Access", + "description": "Opening a network share, which makes the contents available to the requestor (ex: Windows EID 5140 or 5145)", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Network Share", + "channel": "None" + }, + { + "name": "WinEventLog:Microsoft-Windows-SMBClient/Security", + "channel": "EventCode=31001" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=5140" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=5145" + }, + { + "name": "WinEventLog:Microsoft-Windows-SMBServer", + "channel": "Access to SYSVOL share from non-admin user or unusual endpoints" + }, + { + "name": "NSM:Flow", + "channel": "smb_files.log" + }, + { + "name": "m365:unified", + "channel": "FileUploaded, FileAccessed" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:37.412000+00:00\"}, \"root['description']\": {\"new_value\": \"Opening a network share, which makes the contents available to the requestor (ex: Windows EID 5140 or 5145)\", \"old_value\": \"Opening a network share, which makes the contents available to the requestor (ex: Windows EID 5140 or 5145)\\n\\n*Data Collection Measures:*\\n\\n- Windows:\\n - Event ID 5140 \\u2013 Network Share Object Access Logs every access attempt to a network share.\\n - Event ID 5145 \\u2013 Detailed Network Share Object Access Captures granular access control information, including the requesting user, source IP, and access permissions.\\n - Sysmon Event ID 3 \\u2013 Network Connection Initiated Helps track SMB connections to suspicious or unauthorized network shares.\\n - Enable Audit Policy for Network Share Access: `auditpol /set /subcategory:\\\"File Share\\\" /success:enable /failure:enable`\\n - Enable PowerShell Logging to Detect Unauthorized SMB Access: `Set-ExecutionPolicy RemoteSigned`\\n - Restrict Network Share Access with Group Policy (GPO): `Computer Configuration \\u2192 Windows Settings \\u2192 Security Settings \\u2192 Local Policies \\u2192 User Rights Assignment` Set \\\"Access this computer from the network\\\" to restrict unauthorized accounts.\\n- Linux/macOS:\\n - AuditD (`open`, `read`, `write`, `connect` syscalls) Detects access to NFS, CIFS, and SMB network shares.\\n - Lsof (`lsof | grep nfs` or `lsof | grep smb`) Identifies active network share connections.\\n - Mount (`mount | grep nfs` or `mount | grep cifs`) Lists currently mounted network shares.\\n - Enable AuditD for SMB/NFS Access: `auditctl -a always,exit -F arch=b64 -S open -F path=/mnt/share -k network_share_access`\\n - Monitor Active Network Shares Using Netstat: `netstat -an | grep :445`\\n- Endpoint Detection & Response (EDR):\\n - Detects abnormal network share access behavior, such as unusual account usage, large file transfers, or encrypted file activity.\", \"diff\": \"--- \\n+++ \\n@@ -1,19 +1 @@\\n Opening a network share, which makes the contents available to the requestor (ex: Windows EID 5140 or 5145)\\n-\\n-*Data Collection Measures:*\\n-\\n-- Windows:\\n- - Event ID 5140 \\u2013 Network Share Object Access Logs every access attempt to a network share.\\n- - Event ID 5145 \\u2013 Detailed Network Share Object Access Captures granular access control information, including the requesting user, source IP, and access permissions.\\n- - Sysmon Event ID 3 \\u2013 Network Connection Initiated Helps track SMB connections to suspicious or unauthorized network shares.\\n- - Enable Audit Policy for Network Share Access: `auditpol /set /subcategory:\\\"File Share\\\" /success:enable /failure:enable`\\n- - Enable PowerShell Logging to Detect Unauthorized SMB Access: `Set-ExecutionPolicy RemoteSigned`\\n- - Restrict Network Share Access with Group Policy (GPO): `Computer Configuration \\u2192 Windows Settings \\u2192 Security Settings \\u2192 Local Policies \\u2192 User Rights Assignment` Set \\\"Access this computer from the network\\\" to restrict unauthorized accounts.\\n-- Linux/macOS:\\n- - AuditD (`open`, `read`, `write`, `connect` syscalls) Detects access to NFS, CIFS, and SMB network shares.\\n- - Lsof (`lsof | grep nfs` or `lsof | grep smb`) Identifies active network share connections.\\n- - Mount (`mount | grep nfs` or `mount | grep cifs`) Lists currently mounted network shares.\\n- - Enable AuditD for SMB/NFS Access: `auditctl -a always,exit -F arch=b64 -S open -F path=/mnt/share -k network_share_access`\\n- - Monitor Active Network Shares Using Netstat: `netstat -an | grep :445`\\n-- Endpoint Detection & Response (EDR):\\n- - Detects abnormal network share access behavior, such as unusual account usage, large file transfers, or encrypted file activity.\"}, \"root['x_mitre_log_sources'][1]['channel']\": {\"new_value\": \"EventCode=31001\", \"old_value\": \"EventID=31001\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Opening a network share, which makes the contents available t1Opening a network share, which makes the contents available 
>to the requestor (ex: Windows EID 5140 or 5145)  *Data Colle>to the requestor (ex: Windows EID 5140 or 5145)
>ction Measures:*  - Windows:     - Event ID 5140 \u2013 Network S 
>hare Object Access Logs every access attempt to a network sh 
>are.     - Event ID 5145 \u2013 Detailed Network Share Object Acc 
>ess Captures granular access control information, including  
>the requesting user, source IP, and access permissions.      
>- Sysmon Event ID 3 \u2013 Network Connection Initiated Helps tra 
>ck SMB connections to suspicious or unauthorized network sha 
>res.     - Enable Audit Policy for Network Share Access: `au 
>ditpol /set /subcategory:\"File Share\" /success:enable /failu 
>re:enable`     - Enable PowerShell Logging to Detect Unautho 
>rized SMB Access: `Set-ExecutionPolicy RemoteSigned`     - R 
>estrict Network Share Access with Group Policy (GPO): `Compu 
>ter Configuration \u2192 Windows Settings \u2192 Security Settings \u2192 L 
>ocal Policies \u2192 User Rights Assignment` Set \"Access this com 
>puter from the network\" to restrict unauthorized accounts. - 
> Linux/macOS:     - AuditD (`open`, `read`, `write`, `connec 
>t` syscalls) Detects access to NFS, CIFS, and SMB network sh 
>ares.     - Lsof (`lsof | grep nfs` or `lsof | grep smb`) Id 
>entifies active network share connections.     - Mount (`mou 
>nt | grep nfs` or `mount | grep cifs`) Lists currently mount 
>ed network shares.     - Enable AuditD for SMB/NFS Access: ` 
>auditctl -a always,exit -F arch=b64 -S open -F path=/mnt/sha 
>re -k network_share_access`     - Monitor Active Network Sha 
>res Using Netstat: `netstat -an | grep :445` - Endpoint Dete 
>ction & Response (EDR):     - Detects abnormal network share 
> access behavior, such as unusual account usage, large file  
>transfers, or encrypted file activity. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--a7f22107-02e5-4982-9067-6625d4a1765a", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.274000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0078", + "external_id": "DC0078" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Network Traffic Flow", + "description": "Summarized network packet data that captures session-level details such as source/destination IPs, ports, protocol types, timestamps, and data volume, without storing full packet payloads. This is commonly used for traffic analysis, anomaly detection, and network performance monitoring.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Network Traffic", + "channel": "None" + }, + { + "name": "macos:osquery", + "channel": "socket_events" + }, + { + "name": "NSM:Flow", + "channel": "Unexpected flows between segmented networks or prohibited ports" + }, + { + "name": "snmp:config", + "channel": "Configuration change traps or policy enforcement failures" + }, + { + "name": "NSM:Flow", + "channel": "First-time outbound connections to package registries or unknown hosts immediately after restore/build" + }, + { + "name": "NSM:Flow", + "channel": "First-time egress to new registries/CDNs post-install/build" + }, + { + "name": "NSM:Flow", + "channel": "First-time egress to non-approved registries after dependency install" + }, + { + "name": "NSM:Flow", + "channel": "Outbound connections to TCP 139,445 and HTTP/HTTPS to WebDAV endpoints from workstation subnets" + }, + { + "name": "NSM:Flow", + "channel": "large outbound data flows or long-duration connections" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "egress > 90th percentile or frequent connection reuse" + }, + { + "name": "NSM:Flow", + "channel": "conn.log" + }, + { + "name": "auditd:SYSCALL", + "channel": "socket/connect" + }, + { + "name": "esxi:syslog", + "channel": "esxcli network vswitch or DNS resolver configuration updates" + }, + { + "name": "esxi:vobd", + "channel": "Network Events" + }, + { + "name": "iptables:LOG", + "channel": "TCP connections" + }, + { + "name": "NSM:Flow", + "channel": "connection metadata" + }, + { + "name": "wineventlog:dhcp", + "channel": "DHCP Lease Granted" + }, + { + "name": "NSM:Flow", + "channel": "LEASE_GRANTED" + }, + { + "name": "NSM:Flow", + "channel": "MAC not in allow-list acquiring IP (DHCP)" + }, + { + "name": "Windows Firewall Log", + "channel": "SMB over high port" + }, + { + "name": "NSM:Connections", + "channel": "Internal connection logging" + }, + { + "name": "NSM:Flow", + "channel": "pf firewall logs" + }, + { + "name": "esxi:vmkernel", + "channel": "/var/log/vmkernel.log" + }, + { + "name": "NSM:Flow", + "channel": "Inter-segment traffic" + }, + { + "name": "NSM:Flow", + "channel": "None" + }, + { + "name": "NSM:Flow", + "channel": "Long-lived or hijacked SSH sessions maintained with no active user activity" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "VPC/NSG flow logs for pod/instance egress to Internet or metadata" + }, + { + "name": "macos:unifiedlog", + "channel": "Suspicious outbound traffic from browser binary to non-standard domains" + }, + { + "name": "NSM:Flow", + "channel": "Abnormal browser traffic volume or destination" + }, + { + "name": "NSM:Flow", + "channel": "Outbound requests to domains not previously resolved or associated with phishing campaigns" + }, + { + "name": "NSM:Flow", + "channel": "Outbound traffic to domains/IPs not previously resolved, occurring shortly after attachment download or link click" + }, + { + "name": "M365Defender:DeviceNetworkEvents", + "channel": "NetworkConnection: bytes_sent >> bytes_received anomaly" + }, + { + "name": "PF:Logs", + "channel": "outbound flows with bytes_out >> bytes_in" + }, + { + "name": "NSX:FlowLogs", + "channel": "network_flow: bytes_out >> bytes_in to external" + }, + { + "name": "NSM:Flow", + "channel": "NetFlow/Zeek conn.log" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "Outbound data flows" + }, + { + "name": "NSM:Flow", + "channel": "Flow records with entropy signatures resembling symmetric encryption" + }, + { + "name": "NSM:Flow", + "channel": "flow records" + }, + { + "name": "networkdevice:syslog", + "channel": "flow records" + }, + { + "name": "macos:unifiedlog", + "channel": "HTTPS POST to known webhook URLs" + }, + { + "name": "saas:api", + "channel": "Webhook registrations or repeated POST activity" + }, + { + "name": "NSM:Flow", + "channel": "Source/destination IP translation inconsistent with intended policy" + }, + { + "name": "SNMP:DeviceLogs", + "channel": "Unexpected NAT translation statistics or rule insertion events" + }, + { + "name": "NSM:Flow", + "channel": "Sudden spike in incoming flows to web service ports from single/multiple IPs" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "Unusual volume of inbound packets from single source across short time interval" + }, + { + "name": "NSM:Flow", + "channel": "port 5900 inbound" + }, + { + "name": "NSM:Flow", + "channel": "TCP port 5900 open" + }, + { + "name": "NSM:firewall", + "channel": "inbound connection to port 5900" + }, + { + "name": "NSM:Firewall", + "channel": "Outbound connections to 139/445 to multiple destinations" + }, + { + "name": "VPCFlowLogs:All", + "channel": "High volume internal traffic with low entropy indicating looped or malicious DoS script" + }, + { + "name": "NSM:Flow", + "channel": "NetFlow/sFlow/PCAP" + }, + { + "name": "NSM:Flow", + "channel": "Outbound Network Flow" + }, + { + "name": "macos:unifiedlog", + "channel": "com.apple.network" + }, + { + "name": "NSM:Flow", + "channel": "Device-to-Device Deployment Flows" + }, + { + "name": "auditd:SYSCALL", + "channel": "socket/connect syscalls" + }, + { + "name": "macos:unifiedlog", + "channel": "outbound TCP/UDP traffic over unexpected port" + }, + { + "name": "esxi:vpxd", + "channel": "ESXi service connections on unexpected ports" + }, + { + "name": "iptables:LOG", + "channel": "OUTBOUND" + }, + { + "name": "macos:unifiedlog", + "channel": "tcp/udp" + }, + { + "name": "esxi:hostd", + "channel": "CLI network calls" + }, + { + "name": "NSM:Flow", + "channel": "Outbound traffic from suspicious new processes post-attachment execution" + }, + { + "name": "macos:unifiedlog", + "channel": "Suspicious anomalies in transmitted data integrity during application network operations" + }, + { + "name": "esxi:syslog", + "channel": "DNS resolution events leading to outbound traffic on unexpected ports" + }, + { + "name": "NSM:Flow", + "channel": "Outbound traffic to mining pools or proxies" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "Outbound flow logs to known mining pools" + }, + { + "name": "container:cni", + "channel": "Outbound network traffic to mining proxies" + }, + { + "name": "esxi:vpxd", + "channel": "TLS session established by ESXi service to unapproved endpoint" + }, + { + "name": "NSM:Flow", + "channel": "Session records with TLS-like byte patterns" + }, + { + "name": "macos:unifiedlog", + "channel": "HTTPS POST requests to pastebin.com or similar" + }, + { + "name": "NetFlow:Flow", + "channel": "new outbound connections from exploited process tree" + }, + { + "name": "NSM:Connections", + "channel": "new connections from exploited lineage" + }, + { + "name": "NSM:Flow", + "channel": "Unexpected route changes or duplicate gateway advertisements" + }, + { + "name": "WinEventLog:Microsoft-Windows-Windows Firewall With Advanced Security/Firewall", + "channel": "EventCode=2004, 2005, 2006" + }, + { + "name": "NSM:Flow", + "channel": "Knock pattern: repeated REJ/S0 across \u2265MinSequenceLen ports from same src_ip then SF success." + }, + { + "name": "macos:unifiedlog", + "channel": "Firewall/PF anchor load or rule change events." + }, + { + "name": "networkdevice:syslog", + "channel": "Config/ACL changes, line vty transport input changes, telnet/ssh/http(s) enable, image/feature module changes." + }, + { + "name": "NSM:Flow", + "channel": "First-time egress to non-approved update hosts right after install/update" + }, + { + "name": "NSM:Flow", + "channel": "New outbound flows to non-approved vendor hosts post install" + }, + { + "name": "NSM:Flow", + "channel": "New/rare egress to non-approved update hosts after install" + }, + { + "name": "NSM:Flow", + "channel": "large outbound HTTPS uploads to repo domains" + }, + { + "name": "esxi:vmkernel", + "channel": "HTTPS traffic to repository domains" + }, + { + "name": "NSM:Flow", + "channel": "alert log" + }, + { + "name": "esxi:vmkernel", + "channel": "None" + }, + { + "name": "NSM:Flow", + "channel": "Outbound flow records" + }, + { + "name": "m365:defender", + "channel": "NetworkConnection: high out:in ratio, periodic beacons, protocol mismatch" + }, + { + "name": "PF:Logs", + "channel": "high out:in ratio or fixed-size periodic flows" + }, + { + "name": "NSM:Flow", + "channel": "network_flow: bytes_out >> bytes_in, fixed packet sizes/intervals to non-approved CIDRs" + }, + { + "name": "auditd:SYSCALL", + "channel": "connect or sendto system call with burst pattern" + }, + { + "name": "macos:unifiedlog", + "channel": "sudden burst in outgoing packets from same PID" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "source instance sends large volume of traffic in short window" + }, + { + "name": "NSM:Flow", + "channel": "session stats with bytes_out > bytes_in" + }, + { + "name": "NIDS:Flow", + "channel": "session stats with bytes_out > bytes_in" + }, + { + "name": "esxi:vpxa", + "channel": "connection attempts and data transmission logs" + }, + { + "name": "PF:Logs", + "channel": "External traffic to remote access services" + }, + { + "name": "NSM:Flow", + "channel": "High volumes of SYN/ACK packets with unacknowledged TCP handshakes" + }, + { + "name": "dns:query", + "channel": "Outbound resolution to hidden service domains (e.g., `.onion`)" + }, + { + "name": "NSM:Flow", + "channel": "conn.log + ssl.log with Tor fingerprinting" + }, + { + "name": "macos:unifiedlog", + "channel": "forwarded encrypted traffic" + }, + { + "name": "NSM:Flow", + "channel": "Relayed session pathing (multi-hop)" + }, + { + "name": "NSM:Flow", + "channel": "Outbound TCP SYN or UDP to multiple ports/hosts" + }, + { + "name": "containerd:runtime", + "channel": "container-level outbound traffic events" + }, + { + "name": "WLANLogs:Association", + "channel": "Multiple APs advertising the same SSID but with different BSSID/MAC or encryption type" + }, + { + "name": "linux:osquery", + "channel": "socket_events" + }, + { + "name": "WinEventLog:Security", + "channel": "ARP cache modification attempts observed through event tracing or security baselines" + }, + { + "name": "NSM:Flow", + "channel": "Gratuitous ARP replies with mismatched IP-MAC binding" + }, + { + "name": "macos:unifiedlog", + "channel": "ARP table updates inconsistent with expected gateway or DHCP lease assignments" + }, + { + "name": "macos:unifiedlog", + "channel": "networkd or com.apple.network" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream 'eventMessage contains \"dns_request\"'" + }, + { + "name": "esxi:syslog", + "channel": "/var/log/syslog.log" + }, + { + "name": "AWS:CloudTrail", + "channel": "CreateTrafficMirrorSession or ModifyTrafficMirrorTarget" + }, + { + "name": "networkdevice:syslog", + "channel": "Config change: CLI/NETCONF/SNMP \u2013 'monitor session', 'mirror port'" + }, + { + "name": "NSM:Flow", + "channel": "Outbound UDP floods targeting common reflection services with spoofed IP headers" + }, + { + "name": "macos:unifiedlog", + "channel": "Outbound UDP spikes to external reflector IPs" + }, + { + "name": "AWS:VPCFlowLogs", + "channel": "Large outbound UDP traffic to multiple public reflector IPs" + }, + { + "name": "macos:unifiedlog", + "channel": "High entropy domain queries with multiple NXDOMAINs" + }, + { + "name": "esxi:syslog", + "channel": "Frequent DNS queries with high entropy names or NXDOMAIN results" + }, + { + "name": "vpxd.log", + "channel": "API communication" + }, + { + "name": "NSM:Connections", + "channel": "Outbound Connection" + }, + { + "name": "NSM:Flow", + "channel": "Connection Tracking" + }, + { + "name": "NSM:Firewall", + "channel": "pf firewall logs" + }, + { + "name": "NSM:Flow", + "channel": "Flow Creation (NetFlow/sFlow)" + }, + { + "name": "NSM:Flow", + "channel": "conn.log, icmp.log" + }, + { + "name": "NSM:Flow", + "channel": "Abnormal SMB authentication attempts correlated with poisoned LLMNR/NBT-NS sessions" + }, + { + "name": "NSM:Flow", + "channel": "Gratuitous or duplicate DHCP OFFER packets from non-legitimate servers" + }, + { + "name": "NSM:Connections", + "channel": "Inbound on ports 5985/5986" + }, + { + "name": "linux:syslog", + "channel": "Multiple IP addresses assigned to the same domain in rapid sequence" + }, + { + "name": "macos:unifiedlog", + "channel": "Rapid domain-to-IP resolution changes for same domain" + }, + { + "name": "esxi:syslog", + "channel": "Frequent DNS resolution of same domain with rotating IPs" + }, + { + "name": "NSM:Flow", + "channel": "uncommon ports" + }, + { + "name": "NSM:Flow", + "channel": "alternate ports" + }, + { + "name": "esxi:vpxd", + "channel": "None" + }, + { + "name": "NSM:Flow", + "channel": "conn.log or flow data" + }, + { + "name": "esxi:vmkernel", + "channel": "egress log analysis" + }, + { + "name": "esxi:vmkernel", + "channel": "egress logs" + }, + { + "name": "NSM:Flow", + "channel": "High volume flows with incomplete TCP sessions or single-packet bursts" + }, + { + "name": "NSM:Flow", + "channel": "Knock pattern: multiple REJ/S0 to distinct closed ports then successful connection to service_port" + }, + { + "name": "macos:unifiedlog", + "channel": "Firewall rule enable/disable or listen socket changes" + }, + { + "name": "networkdevice:syslog", + "channel": "Config/ACL/line vty changes, service enable (telnet/ssh/http(s)), module reloads" + }, + { + "name": "auditd:SYSCALL", + "channel": "ioctl: Changes to wireless network interfaces (up, down, reassociate)" + }, + { + "name": "macos:osquery", + "channel": "query: Historical list of associated SSIDs compared against baseline" + }, + { + "name": "NSM:Flow", + "channel": "First-time egress from host after new install to unknown update endpoints" + }, + { + "name": "NSM:Flow", + "channel": "First-time egress to unknown registries/mirrors immediately after install" + }, + { + "name": "NSM:Flow", + "channel": "New egress from app just installed to unknown update endpoints" + }, + { + "name": "esxi:vpxd", + "channel": "ESXi processes relaying traffic via SSH or unexpected ports" + }, + { + "name": "NSM:Flow", + "channel": "Outbound connection to mining pool port (3333, 4444, 5555)" + }, + { + "name": "NSM:Flow", + "channel": "Outbound traffic to mining pool upon container launch" + }, + { + "name": "NSM:Flow", + "channel": "Flow records with RSA key exchange on unexpected port" + }, + { + "name": "NSM:Flow", + "channel": "Outbound connections from web server binaries (apache2, nginx, php-fpm) to unknown external IPs" + }, + { + "name": "NSM:Flow", + "channel": "sustained outbound HTTPS sessions with high data volume" + }, + { + "name": "NSM:Flow", + "channel": "Connections from IDE hosts to marketplace/tunnel domains" + }, + { + "name": "macos:unifiedlog", + "channel": "Outbound connections from IDE processes to marketplace/tunnel domains" + }, + { + "name": "NSM:Flow", + "channel": "large HTTPS outbound uploads" + }, + { + "name": "esxi:vmkernel", + "channel": "network flows to external cloud services" + }, + { + "name": "NSM:Flow", + "channel": "TCP port 22 traffic" + }, + { + "name": "esxi:vmkernel", + "channel": "port 22 access" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "mobile-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:34.703000+00:00\"}, \"root['description']\": {\"new_value\": \"Summarized network packet data that captures session-level details such as source/destination IPs, ports, protocol types, timestamps, and data volume, without storing full packet payloads. This is commonly used for traffic analysis, anomaly detection, and network performance monitoring.\", \"old_value\": \"Summarized network packet data that captures session-level details such as source/destination IPs, ports, protocol types, timestamps, and data volume, without storing full packet payloads. This is commonly used for traffic analysis, anomaly detection, and network performance monitoring.\\n\\n*Data Collection Measures:*\\n\\n- Network Flow Logs (Metadata Collection)\\n - NetFlow \\n - Summarized metadata for network conversations (no packet payloads).\\n - sFlow (Sampled Flow Logging)\\n - Captures sampled packets from switches and routers.\\n - Used for real-time traffic monitoring and anomaly detection.\\n - Zeek (Bro) Flow Logs\\n - Zeek logs session-level details in logs like conn.log, http.log, dns.log, etc.\\n- Host-Based Collection\\n - Sysmon Event ID 3 \\u2013 Network Connection Initiated\\n - Logs process-level network activity, useful for detecting malicious outbound connections.\\n - AuditD (Linux) \\u2013 syscall=connect\\n - Monitors system calls for network connections. `auditctl -a always,exit -F arch=b64 -S connect -k network_activity`\\n- Cloud & SaaS Flow Monitoring\\n - AWS VPC Flow Logs\\n - Captures metadata for traffic between EC2 instances, security groups, and internet gateways.\\n - Azure NSG Flow Logs / Google VPC Flow Logs\\n - Logs ingress/egress traffic for cloud-based resources.\", \"diff\": \"--- \\n+++ \\n@@ -1,22 +1 @@\\n Summarized network packet data that captures session-level details such as source/destination IPs, ports, protocol types, timestamps, and data volume, without storing full packet payloads. This is commonly used for traffic analysis, anomaly detection, and network performance monitoring.\\n-\\n-*Data Collection Measures:*\\n-\\n-- Network Flow Logs (Metadata Collection)\\n- - NetFlow \\n- - Summarized metadata for network conversations (no packet payloads).\\n- - sFlow (Sampled Flow Logging)\\n- - Captures sampled packets from switches and routers.\\n- - Used for real-time traffic monitoring and anomaly detection.\\n- - Zeek (Bro) Flow Logs\\n- - Zeek logs session-level details in logs like conn.log, http.log, dns.log, etc.\\n-- Host-Based Collection\\n- - Sysmon Event ID 3 \\u2013 Network Connection Initiated\\n- - Logs process-level network activity, useful for detecting malicious outbound connections.\\n- - AuditD (Linux) \\u2013 syscall=connect\\n- - Monitors system calls for network connections. `auditctl -a always,exit -F arch=b64 -S connect -k network_activity`\\n-- Cloud & SaaS Flow Monitoring\\n- - AWS VPC Flow Logs\\n- - Captures metadata for traffic between EC2 instances, security groups, and internet gateways.\\n- - Azure NSG Flow Logs / Google VPC Flow Logs\\n- - Logs ingress/egress traffic for cloud-based resources.\"}, \"root['x_mitre_log_sources'][72]['channel']\": {\"new_value\": \"EventCode=2004, 2005, 2006\", \"old_value\": \"EventCode=2004,2005,2006\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Summarized network packet data that captures session-level dt1Summarized network packet data that captures session-level d
>etails such as source/destination IPs, ports, protocol types>etails such as source/destination IPs, ports, protocol types
>, timestamps, and data volume, without storing full packet p>, timestamps, and data volume, without storing full packet p
>ayloads. This is commonly used for traffic analysis, anomaly>ayloads. This is commonly used for traffic analysis, anomaly
> detection, and network performance monitoring.  *Data Colle> detection, and network performance monitoring.
>ction Measures:*  - Network Flow Logs (Metadata Collection)  
>    - NetFlow          - Summarized metadata for network con 
>versations (no packet payloads).     - sFlow (Sampled Flow L 
>ogging)         - Captures sampled packets from switches and 
> routers.         - Used for real-time traffic monitoring an 
>d anomaly detection.     - Zeek (Bro) Flow Logs         - Ze 
>ek logs session-level details in logs like conn.log, http.lo 
>g, dns.log, etc. - Host-Based Collection     - Sysmon Event  
>ID 3 \u2013 Network Connection Initiated         - Logs process-l 
>evel network activity, useful for detecting malicious outbou 
>nd connections.     - AuditD (Linux) \u2013 syscall=connect       
>   - Monitors system calls for network connections. `auditct 
>l -a always,exit -F arch=b64 -S connect -k network_activity` 
> - Cloud & SaaS Flow Monitoring     - AWS VPC Flow Logs      
>    - Captures metadata for traffic between EC2 instances, s 
>ecurity groups, and internet gateways.     - Azure NSG Flow  
>Logs / Google VPC Flow Logs         - Logs ingress/egress tr 
>affic for cloud-based resources. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--9bde2f9d-a695-4344-bfac-f2dce13d121e", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.272000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0021", + "external_id": "DC0021" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "OS API Execution", + "description": "Calls made by a process to operating system-provided Application Programming Interfaces (APIs). These calls are essential for interacting with system resources such as memory, files, and hardware, or for performing system-level tasks. Monitoring these calls can provide insight into a process's intent, especially if the process is malicious.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Process", + "channel": "None" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Base", + "channel": "GetLocaleInfoW, GetTimeZoneInformation API calls" + }, + { + "name": "AWS:CloudTrail", + "channel": "GetMetadata, DescribeInstanceIdentity" + }, + { + "name": "macos:osquery", + "channel": "open, execve: Unexpected processes accessing or modifying critical files" + }, + { + "name": "auditd:SYSCALL", + "channel": "ptrace, ioctl" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "API tracing / stack tracing via ETW or telemetry-based EDR" + }, + { + "name": "EDR:memory", + "channel": "Behavioral API telemetry (GetProcAddress, LoadLibrary, VirtualAlloc)" + }, + { + "name": "networkdevice:syslog", + "channel": "aaa privilege_exec" + }, + { + "name": "macos:unifiedlog", + "channel": "None" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "APCQueueOperations" + }, + { + "name": "macos:unifiedlog", + "channel": "Invocation of SMLoginItemSetEnabled by non-system or recently installed application" + }, + { + "name": "macos:unifiedlog", + "channel": "flock|NSDistributedLock|FileHandle.*lockForWriting" + }, + { + "name": "etw:Microsoft-Windows-Directory-Services-SAM", + "channel": "api_call: Calls to DsAddSidHistory or related RPC operations" + }, + { + "name": "macos:unifiedlog", + "channel": "application logs referencing NSTimer, sleep, or launchd delays" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "High-frequency or suspicious sequence of QueryPerformanceCounter/GetTickCount API calls from a non-standard process lineage" + }, + { + "name": "auditd:SYSCALL", + "channel": "Rules capturing clock_gettime, time, gettimeofday syscalls when enabled" + }, + { + "name": "networkdevice:syslog", + "channel": "Unexpected reload, crashinfo, or boot message not tied to scheduled maintenance" + }, + { + "name": "etw:Microsoft-Windows-RPC", + "channel": "rpc_call: srvsvc.NetShareEnum / NetShareEnumAll from non-admin or unusual processes" + }, + { + "name": "NSM:Flow", + "channel": "smb_command: TreeConnectAndX to \\\\*\\IPC$ / srvsvc or Trans2/NT_CREATE for listing shares" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "name": "EDR:memory", + "channel": "API usage MFCreateDeviceSource, IAMStreamConfig, ICaptureGraphBuilder2, DirectShow filter graph creation from uncommon callers" + }, + { + "name": "auditd:SYSCALL", + "channel": "openat/read/ioctl: openat/read/ioctl on /dev/video* by uncommon user/process" + }, + { + "name": "macos:unifiedlog", + "channel": "Access decisions to kTCCServiceCamera for unexpected binaries" + }, + { + "name": "EDR:memory", + "channel": "Objective\u2011C/Swift calls to AVCaptureDevice/AVCaptureSession by non-whitelisted processes" + }, + { + "name": "auditd:SYSCALL", + "channel": "mmap, ptrace, process_vm_writev or direct memory ops" + }, + { + "name": "WinEventLog:Application", + "channel": "API call to AddMonitor invoked by non-installer process" + }, + { + "name": "etw:Microsoft-Windows-Win32k", + "channel": "SetWindowLong, SetClassLong, NtUserMessageCall, SendNotifyMessage, PostMessage" + }, + { + "name": "auditd:SYSCALL", + "channel": "unshare, mount, keyctl, setns syscalls executed by containerized processes" + }, + { + "name": "macos:unifiedlog", + "channel": "audio APIs" + }, + { + "name": "WinEventLog:Microsoft-Windows-COM/Operational", + "channel": "CLSID activation events where ProcessName=mmc.exe and CLSID not in allowed baseline" + }, + { + "name": "macos:unifiedlog", + "channel": "com.apple.securityd, com.apple.tccd" + }, + { + "name": "auditd:SYSCALL", + "channel": "send, recv, write: Abnormal interception or alteration of transmitted data" + }, + { + "name": "macos:osquery", + "channel": "CALCULATE: Integrity validation of transmitted data via hash checks" + }, + { + "name": "ETW:Token", + "channel": "token_analysis: API calls such as DuplicateTokenEx or ImpersonateLoggedOnUser" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "API Calls" + }, + { + "name": "etw:Microsoft-Windows-DotNETRuntime", + "channel": "AssemblyLoad/ModuleLoad (Loader keyword) from Microsoft-Windows-DotNETRuntime" + }, + { + "name": "EDR:memory", + "channel": "VirtualAlloc/VirtualProtect/MapViewOfFile indicators via stack/heap activity and ImageLoad" + }, + { + "name": "auditd:MMAP", + "channel": "memory region with RWX permissions allocated" + }, + { + "name": "snmp:trap", + "channel": "management queries" + }, + { + "name": "AWS:CloudTrail", + "channel": "Describe* or List* API calls" + }, + { + "name": "etw:Microsoft-Windows-Win32k", + "channel": "SendMessage, PostMessage, LVM_*" + }, + { + "name": "auditd:SYSCALL", + "channel": "sudo or pkexec invocation" + }, + { + "name": "macos:unifiedlog", + "channel": "authorization execute privilege requests" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "NtQueryInformationProcess" + }, + { + "name": "macos:unifiedlog", + "channel": "ptrace: Processes invoking ptrace with PTRACE_TRACEME flag" + }, + { + "name": "esxi:hostd", + "channel": "Remote access API calls and file uploads" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "NtUnmapViewOfSection, VirtualAllocEx, WriteProcessMemory, SetThreadContext, ResumeThread" + }, + { + "name": "linux:syslog", + "channel": "Execution of modified binaries or abnormal library load sequences" + }, + { + "name": "macos:unifiedlog", + "channel": "Calls to AuthorizationExecuteWithPrivileges() observed via Apple System Logger or security_auditing tools" + }, + { + "name": "macos:unifiedlog", + "channel": "access or unlock attempt to keychain database" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of input detection APIs (e.g., CGEventSourceKeyState)" + }, + { + "name": "auditd:SYSCALL", + "channel": "mount system call with bind or remap flags" + }, + { + "name": "AWS:CloudTrail", + "channel": "Decrypt" + }, + { + "name": "etw:Microsoft-Windows-Kernel-File", + "channel": "ZwSetEaFile or ZwQueryEaFile function calls" + }, + { + "name": "auditd:SYSCALL", + "channel": "fork/clone/daemon syscall tracing" + }, + { + "name": "fs:fsusage", + "channel": "Detached process execution with no associated parent" + }, + { + "name": "auditd:SYSCALL", + "channel": "ptrace, mmap, mprotect, open, dlopen" + }, + { + "name": "ETW:ProcThread", + "channel": "api_call: CreateProcessWithTokenW, CreateProcessAsUserW" + }, + { + "name": "EDR:memory", + "channel": "MemoryWriteToExecutable" + }, + { + "name": "ETW:Token", + "channel": "api_call: DuplicateTokenEx, ImpersonateLoggedOnUser, SetThreadToken" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "api_call: UpdateProcThreadAttribute (PROC_THREAD_ATTRIBUTE_PARENT_PROCESS) and CreateProcess* with EXTENDED_STARTUPINFO_PRESENT / StartupInfoEx" + }, + { + "name": "etw:Microsoft-Windows-Security-Auditing", + "channel": "api_call: LogonUser(A|W), LsaLogonUser, SetThreadToken, ImpersonateLoggedOnUser" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "API calls" + }, + { + "name": "auditd:SYSCALL", + "channel": "ptrace, mmap, process_vm_writev" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of dd or sed targeting /proc/*/mem" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "CreateTransaction, CreateFileTransacted, RollbackTransaction, NtCreateProcessEx, NtCreateThreadEx" + }, + { + "name": "ETW", + "channel": "Calls to GetUserDefaultUILanguage, GetSystemDefaultUILanguage, GetKeyboardLayoutList" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "WriteProcessMemory: WriteProcessMemory targeting regions containing KernelCallbackTable addresses" + }, + { + "name": "EDR:file", + "channel": "SetFileTime" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "mobile-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:36.999000+00:00\"}, \"root['description']\": {\"new_value\": \"Calls made by a process to operating system-provided Application Programming Interfaces (APIs). These calls are essential for interacting with system resources such as memory, files, and hardware, or for performing system-level tasks. Monitoring these calls can provide insight into a process's intent, especially if the process is malicious.\", \"old_value\": \"Calls made by a process to operating system-provided Application Programming Interfaces (APIs). These calls are essential for interacting with system resources such as memory, files, and hardware, or for performing system-level tasks. Monitoring these calls can provide insight into a process's intent, especially if the process is malicious.\\n\\n*Data Collection Measures:*\\n\\n- Endpoint Detection and Response (EDR) Tools:\\n - Leverage tools to monitor API execution behaviors at the process level.\\n - Example: Sysmon Event ID 10 captures API call traces for process access and memory allocation.\\n- Process Monitor (ProcMon):\\n - Use ProcMon to collect detailed logs of process and API activity. ProcMon can provide granular details on API usage and identify malicious behavior during analysis.\\n- Windows Event Logs:\\n - Use Event IDs from Windows logs for specific API-related activities:\\n - Event ID 4688: A new process has been created (can indirectly infer API use).\\n - Event ID 4657: A registry value has been modified (to monitor registry-altering APIs).\\n- Dynamic Analysis Tools:\\n - Tools like Cuckoo Sandbox, Flare VM, or Hybrid Analysis monitor API execution during malware detonation.\\n- Host-Based Logs:\\n - On Linux/macOS systems, leverage audit frameworks (e.g., `auditd`, `strace`) to capture and analyze system call usage that APIs map to.\\n- Runtime Monitors:\\n - Runtime security tools like Falco can monitor system-level calls for API execution.\\n- Debugging and Tracing:\\n - Use debugging tools like gdb (Linux) or WinDbg (Windows) for deep tracing of API executions in real time.\", \"diff\": \"--- \\n+++ \\n@@ -1,21 +1 @@\\n Calls made by a process to operating system-provided Application Programming Interfaces (APIs). These calls are essential for interacting with system resources such as memory, files, and hardware, or for performing system-level tasks. Monitoring these calls can provide insight into a process's intent, especially if the process is malicious.\\n-\\n-*Data Collection Measures:*\\n-\\n-- Endpoint Detection and Response (EDR) Tools:\\n- - Leverage tools to monitor API execution behaviors at the process level.\\n- - Example: Sysmon Event ID 10 captures API call traces for process access and memory allocation.\\n-- Process Monitor (ProcMon):\\n- - Use ProcMon to collect detailed logs of process and API activity. ProcMon can provide granular details on API usage and identify malicious behavior during analysis.\\n-- Windows Event Logs:\\n- - Use Event IDs from Windows logs for specific API-related activities:\\n- - Event ID 4688: A new process has been created (can indirectly infer API use).\\n- - Event ID 4657: A registry value has been modified (to monitor registry-altering APIs).\\n-- Dynamic Analysis Tools:\\n- - Tools like Cuckoo Sandbox, Flare VM, or Hybrid Analysis monitor API execution during malware detonation.\\n-- Host-Based Logs:\\n- - On Linux/macOS systems, leverage audit frameworks (e.g., `auditd`, `strace`) to capture and analyze system call usage that APIs map to.\\n-- Runtime Monitors:\\n- - Runtime security tools like Falco can monitor system-level calls for API execution.\\n-- Debugging and Tracing:\\n- - Use debugging tools like gdb (Linux) or WinDbg (Windows) for deep tracing of API executions in real time.\"}, \"root['x_mitre_log_sources'][19]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4656\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Calls made by a process to operating system-provided Applicat1Calls made by a process to operating system-provided Applica
>tion Programming Interfaces (APIs). These calls are essentia>tion Programming Interfaces (APIs). These calls are essentia
>l for interacting with system resources such as memory, file>l for interacting with system resources such as memory, file
>s, and hardware, or for performing system-level tasks. Monit>s, and hardware, or for performing system-level tasks. Monit
>oring these calls can provide insight into a process's inten>oring these calls can provide insight into a process's inten
>t, especially if the process is malicious.  *Data Collection>t, especially if the process is malicious.
> Measures:*  - Endpoint Detection and Response (EDR) Tools:  
>    - Leverage tools to monitor API execution behaviors at t 
>he process level.     - Example: Sysmon Event ID 10 captures 
> API call traces for process access and memory allocation. - 
> Process Monitor (ProcMon):     - Use ProcMon to collect det 
>ailed logs of process and API activity. ProcMon can provide  
>granular details on API usage and identify malicious behavio 
>r during analysis. - Windows Event Logs:     - Use Event IDs 
> from Windows logs for specific API-related activities:      
>    - Event ID 4688: A new process has been created (can ind 
>irectly infer API use).         - Event ID 4657: A registry  
>value has been modified (to monitor registry-altering APIs). 
> - Dynamic Analysis Tools:     - Tools like Cuckoo Sandbox,  
>Flare VM, or Hybrid Analysis monitor API execution during ma 
>lware detonation. - Host-Based Logs:     - On Linux/macOS sy 
>stems, leverage audit frameworks (e.g., `auditd`, `strace`)  
>to capture and analyze system call usage that APIs map to. - 
> Runtime Monitors:     - Runtime security tools like Falco c 
>an monitor system-level calls for API execution. - Debugging 
> and Tracing:     - Use debugging tools like gdb (Linux) or  
>WinDbg (Windows) for deep tracing of API executions in real  
>time. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--3d20385b-24ef-40e1-9f56-f39750379077", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.272000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0032", + "external_id": "DC0032" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Process Creation", + "description": "Refers to the event in which a new process (executable) is initialized by an operating system. This can involve parent-child process relationships, process arguments, and environmental variables. Monitoring process creation is crucial for detecting malicious behaviors, such as execution of unauthorized binaries, scripting abuse, or privilege escalation attempts.. ", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Process", + "channel": "None" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream 'eventMessage contains pubsub or broker'" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "EventCode=1" + }, + { + "name": "linux:osquery", + "channel": "Execution of binary resolved from $PATH not located in /usr/bin or /bin" + }, + { + "name": "macos:unifiedlog", + "channel": "Process execution path inconsistent with baseline PATH directories" + }, + { + "name": "macos:endpointsecurity", + "channel": "ES_EVENT_TYPE_NOTIFY_EXEC" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4688" + }, + { + "name": "linux:osquery", + "channel": "process_events" + }, + { + "name": "macos:endpointsecurity", + "channel": "exec" + }, + { + "name": "macos:osquery", + "channel": "processes" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of launchctl with suspicious arguments" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve network tools" + }, + { + "name": "macos:osquery", + "channel": "process_events" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve calls to soffice.bin with suspicious macro execution flags" + }, + { + "name": "macos:unifiedlog", + "channel": "Process execution of Microsoft Word, Excel, PowerPoint with macro execution attempts" + }, + { + "name": "macos:osquery", + "channel": "process reading browser configuration paths" + }, + { + "name": "macos:unifiedlog", + "channel": "exec logs" + }, + { + "name": "auditd:EXECVE", + "channel": "execve: Processes launched with LD_PRELOAD/LD_LIBRARY_PATH pointing to non-system dirs" + }, + { + "name": "macos:endpointsecurity", + "channel": "exec: Process execution context for loaders calling dlopen/dlsym" + }, + { + "name": "auditd:EXECVE", + "channel": "EXECVE" + }, + { + "name": "auditd:EXECVE", + "channel": "execution of unexpected binaries during user shell startup" + }, + { + "name": "macos:unifiedlog", + "channel": "launch of Terminal.app or shell with non-standard environment setup" + }, + { + "name": "macos:endpointsecurity", + "channel": "ES_EVENT_TYPE_NOTIFY_EXEC with unusual parent-child process relationships from zsh" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of systemctl or service stop" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of launchctl or pkill" + }, + { + "name": "macos:unifiedlog", + "channel": "process::exec" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of klist, kinit, or tools interacting with ccache outside normal user context" + }, + { + "name": "macos:osquery", + "channel": "Execution of non-standard binaries accessing Kerberos APIs" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Electron-based binary spawning shell or script interpreter" + }, + { + "name": "macos:unifiedlog", + "channel": "Electron app spawning unexpected child process" + }, + { + "name": "esxi:shell", + "channel": "/root/.ash_history or /etc/init.d/*" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve calls with high-frequency or known bandwidth-intensive tools" + }, + { + "name": "macos:unifiedlog", + "channel": "exec or spawn calls to proxy tools or torrent clients" + }, + { + "name": "containers:osquery", + "channel": "bandwidth-intensive command execution from within a container namespace" + }, + { + "name": "macos:unifiedlog", + "channel": "process launch" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream --info --predicate 'subsystem == \"com.apple.cfprefsd\"'" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of security, sqlite3, or unauthorized binaries" + }, + { + "name": "macos:unifiedlog", + "channel": "Unexpected applications generating outbound DNS queries" + }, + { + "name": "linux:Sysmon", + "channel": "EventCode=1" + }, + { + "name": "macos:osquery", + "channel": "execve" + }, + { + "name": "macos:unifiedlog", + "channel": "Unexpected child process of Safari or Chrome" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve or syscall invoking vm artifact check commands (e.g., dmidecode, lspci, dmesg)" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of system_profiler, ioreg, kextstat with argument patterns related to VM/sandbox checks" + }, + { + "name": "macos:unifiedlog", + "channel": "process writes or modifies files in excluded paths" + }, + { + "name": "macos:unifiedlog", + "channel": "process" + }, + { + "name": "macos:unifiedlog", + "channel": "com.apple.mail.* exec.*" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of memory inspection tools (lldb, gdb, osqueryi)" + }, + { + "name": "esxi:vobd", + "channel": "/var/log/vobd.log" + }, + { + "name": "kubernetes:apiserver", + "channel": "kubectl exec or kubelet API calls targeting running pods" + }, + { + "name": "docker:audit", + "channel": "Process execution events within container namespace context" + }, + { + "name": "auditd:SYSCALL", + "channel": "process persists beyond parent shell termination" + }, + { + "name": "macos:unifiedlog", + "channel": "background process persists beyond user logout" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of scripts or binaries sourced from mail directories (/var/mail, ~/Maildir)" + }, + { + "name": "macos:unifiedlog", + "channel": "Preview.app, Safari.app, or Mail.app spawning new processes outside normal patterns" + }, + { + "name": "esxi:hostd", + "channel": "process execution across cloud VM" + }, + { + "name": "auditd:EXECVE", + "channel": "systemctl spawning managed processes" + }, + { + "name": "macos:unifiedlog", + "channel": "None" + }, + { + "name": "esxi:shell", + "channel": "/var/log/shell.log" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of processes linked to hijacked sessions (e.g., anomalous parent-child process lineage)" + }, + { + "name": "macos:unifiedlog", + "channel": "exec events where web process starts a shell/tooling" + }, + { + "name": "docker:events", + "channel": "Docker/Kubernetes audit of exec/attach (kubectl exec) or unexpected child processes inside container" + }, + { + "name": "macos:unifiedlog", + "channel": "exec of osascript, bash, curl with suspicious parameters" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of container management CLIs (docker, crictl, kubectl) or interpreted shells (sh, bash, python) within container context" + }, + { + "name": "macos:endpointsecurity", + "channel": "es_event_exec" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of discovery commands targeting backup binaries, processes, or config paths" + }, + { + "name": "macos:unifiedlog", + "channel": "Process execution logs showing discovery commands like mdfind, system_profiler, or launchctl list" + }, + { + "name": "macos:osquery", + "channel": "process_events OR launchd" + }, + { + "name": "auditd:EXECVE", + "channel": "execve" + }, + { + "name": "macos:osquery", + "channel": "launchd or process_events" + }, + { + "name": "macos:unifiedlog", + "channel": "process and file events via log stream" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of scripts or binaries spawned from browser processes" + }, + { + "name": "macos:unifiedlog", + "channel": "Browser processes launching unexpected interpreters (osascript, bash)" + }, + { + "name": "macos:unifiedlog", + "channel": "exec: Execution of defaults, plutil, or common editors (vim/nano) targeting plist files" + }, + { + "name": "auditd:SYSCALL", + "channel": "EXECVE" + }, + { + "name": "macos:unifiedlog", + "channel": "process:exec" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of bash, python, or perl processes spawned by browser/email client" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of osascript, bash, or Terminal initiated from Mail.app or Safari" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of /bin/sh,/bin/bash,/usr/bin/curl,/usr/bin/python by service accounts (e.g., apache, mysql, nobody) immediately after inbound network activity." + }, + { + "name": "macos:osquery", + "channel": "parent_name in ('sshd','httpd','screensharingd') spawning shells or scripting runtimes." + }, + { + "name": "macos:unifiedlog", + "channel": "process activity stream" + }, + { + "name": "auditd:SYSCALL", + "channel": "SYSCALL record where exe contains passwd/userdel/chage and auid != root" + }, + { + "name": "macos:unifiedlog", + "channel": "Post-login execution of unrecognized child process from launchd or loginwindow" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of base64|openssl|xxd|python|perl with arguments matching Base64 flags" + }, + { + "name": "macos:unifiedlog", + "channel": "process command line contains base64, -enc, openssl enc -base64" + }, + { + "name": "macos:endpointsecurity", + "channel": "exec: arguments contain Base64-like strings" + }, + { + "name": "esxi:shell", + "channel": "commands containing base64, openssl enc -base64, xxd -p" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of process launched via loginwindow session restore" + }, + { + "name": "macos:unifiedlog", + "channel": "process: exec + filewrite: ~/.ssh/authorized_keys" + }, + { + "name": "containerd:runtime", + "channel": "/var/log/containers/*.log" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of Java apps or other processes with hidden window attributes" + }, + { + "name": "macos:unifiedlog", + "channel": "Process Execution" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve on code or jetbrains-gateway with remote flags" + }, + { + "name": "macos:unifiedlog", + "channel": "process: code or jetbrains-gateway launching with --tunnel or --remote" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream --predicate 'processImagePath CONTAINS \"curl\" OR \"osascript\"'" + }, + { + "name": "auditd:EXECVE", + "channel": "Execution of dd, shred, wipe targeting block devices" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of sleep or ping command within script interpreted by bash/python" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve or socket/connect system calls from processes using crypto libraries" + }, + { + "name": "macos:unifiedlog", + "channel": "Process using AES/RC4 routines unexpectedly" + }, + { + "name": "linux:osquery", + "channel": "execution of known firewall binaries" + }, + { + "name": "auditd:SYSCALL", + "channel": "type=EXECVE or SYSCALL for /bin/date, /usr/bin/timedatectl, /sbin/hwclock, /bin/cat /etc/timezone, /bin/cat /proc/uptime" + }, + { + "name": "linux:osquery", + "channel": "execve: command like 'date', 'timedatectl', 'hwclock', 'cat /etc/timezone'" + }, + { + "name": "macos:unifiedlog", + "channel": "process exec events of systemsetup, date, ioreg with command_line parameters indicating time discovery" + }, + { + "name": "macos:endpointsecurity", + "channel": "exec: binary == \"/usr/sbin/systemsetup\" and args contains \"-gettimezone\"" + }, + { + "name": "macos:osquery", + "channel": "execve: command LIKE '%systemsetup -gettimezone%' OR '%date%'" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of osascript, curl, or unexpected automation" + }, + { + "name": "macos:unifiedlog", + "channel": "exec /usr/bin/pwpolicy" + }, + { + "name": "auditd:SYSCALL", + "channel": "socket(AF_PACKET|AF_INET, SOCK_RAW, *), setsockopt(\u2026 SO_ATTACH_FILTER|SO_ATTACH_BPF \u2026), bpf(cmd=BPF_PROG_LOAD), open/openat path=\"/dev/bpf*\" (BSD/macOS-like) or setcap cap_net_raw." + }, + { + "name": "linux:syslog", + "channel": "KERN messages about eBPF program load/verify or LSM denials related to bpf." + }, + { + "name": "OpenBSM:AuditTrail", + "channel": "open/openat of /dev/bpf*; ioctl BIOCSETF-like operations." + }, + { + "name": "macos:unifiedlog", + "channel": "Exec of tcpdump, rvictl, custom tools linked to libpcap.A.dylib; sysextd/systemextensionsctl events for NetworkExtension content filters." + }, + { + "name": "auditd:EXECVE", + "channel": "/usr/sbin/postfix, /usr/sbin/exim, /usr/sbin/sendmail" + }, + { + "name": "auditd:SYSCALL", + "channel": "execution of known flash tools (e.g., flashrom, fwupd)" + }, + { + "name": "macos:unifiedlog", + "channel": "com.apple.firmwareupdater activity or update-firmware binary invoked" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of system tools like dmidecode, lspci, lscpu, dmesg, systemd-detect-virt" + }, + { + "name": "macos:unifiedlog", + "channel": "exec or spawn of 'system_profiler', 'ioreg', 'kextstat', 'sysctl', or calls to sysctl API" + }, + { + "name": "macos:endpointSecurity", + "channel": "ES_EVENT_TYPE_NOTIFY_EXEC" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Suspicious binaries or scripts interacting with authentication binaries (sshd, gdm, login)" + }, + { + "name": "macos:osquery", + "channel": "execve: Processes unexpectedly invoking Keychain or authentication APIs" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: execve calls where a browser/webview process is parent and child is interpreter (python, sh, ruby) or downloader (curl, wget)" + }, + { + "name": "macos:unifiedlog", + "channel": "process_create: Process creation where parent is Safari/Google Chrome and child is script interpreter or signed-but-unusual helper binary" + }, + { + "name": "auditd:EXECVE", + "channel": "None" + }, + { + "name": "macos:unifiedlog", + "channel": "process:launch" + }, + { + "name": "auditd:EXECVE", + "channel": "Shell commands invoked by SQL process such as postgres, mysqld, or mariadbd" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of smbclient, smbmap, rpcclient, nmblookup, crackmapexec smb" + }, + { + "name": "macos:endpointsecurity", + "channel": "ES_EVENT_TYPE_NOTIFY_EXEC: Process execution of \"sharing -l\", \"smbutil view\", \"mount_smbfs\"" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of scp, rsync, curl with remote destination" + }, + { + "name": "macos:unifiedlog", + "channel": "logMessage contains pbpaste or osascript" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve call with argv matching known disk enumeration commands (lsblk, parted, fdisk)" + }, + { + "name": "macos:unifiedlog", + "channel": "process launch of diskutil or system_profiler with SPStorageDataType" + }, + { + "name": "esxi:hostd", + "channel": "execution of esxcli with args matching 'storage', 'filesystem', 'core device list'" + }, + { + "name": "macos:unifiedlog", + "channel": "Mail.app executing with parameters updating rules state" + }, + { + "name": "esxi:shell", + "channel": "/var/log/vmkernel.log, /var/log/vmkwarning.log" + }, + { + "name": "macos:endpointsecurity", + "channel": "exec: Exec of ffmpeg, avfoundation-based binaries, or custom signed apps accessing camera" + }, + { + "name": "kubernetes:apiserver", + "channel": "exec into pod followed by secret retrieval via API" + }, + { + "name": "macos:unifiedlog", + "channel": "process_name IN (\"VBoxManage\", \"prlctl\") AND command CONTAINS (\"list\", \"show\")" + }, + { + "name": "macos:unifiedlog", + "channel": "exec srm|exec openssl|exec gpg" + }, + { + "name": "linux:osquery", + "channel": "Process execution with LD_PRELOAD or modified library path" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of process with DYLD_INSERT_LIBRARIES set" + }, + { + "name": "linux:Sysmon", + "channel": "process creation events linked to container namespaces executing host-level binaries" + }, + { + "name": "macos:unifiedlog", + "channel": "process and signing chain events" + }, + { + "name": "macos:unifiedlog", + "channel": "launchservices events for misleading extensions" + }, + { + "name": "fs:fsusage", + "channel": "Execution of disguised binaries" + }, + { + "name": "linux:osquery", + "channel": "process listening or connecting on non-standard ports" + }, + { + "name": "macos:unifiedlog", + "channel": "launchd services binding to non-standard ports" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve, connect" + }, + { + "name": "esxi:cron", + "channel": "process or cron activity" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of binaries with unsigned or anomalously signed certificates" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve logging for /usr/bin/systemctl and systemd-run" + }, + { + "name": "macos:osquery", + "channel": "Invocation of osascript or dylib injection" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of files saved in mail or download directories" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of Terminal, osascript, or other interpreters originating from Mail or Preview" + }, + { + "name": "macos:unifiedlog", + "channel": "process events" + }, + { + "name": "linux:syslog", + "channel": "Unauthorized sudo or shell access, especially leading to file changes in /var/www or /srv/http" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of unexpected terminal or web scripts modifying /Library/WebServer/Documents" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of CLI tools like psql, mysql, mongo, sqlite3" + }, + { + "name": "macos:unifiedlog", + "channel": "Process start of Java or native DB client tools" + }, + { + "name": "macos:unifiedlog", + "channel": "loginwindow or tccd-related entries" + }, + { + "name": "macos:osquery", + "channel": "query: process_events, launchd, and tcc.db access" + }, + { + "name": "ebpf:syscalls", + "channel": "process execution or network connect from just-created container PID namespace" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of pip, npm, gem, or similar package managers" + }, + { + "name": "macos:unifiedlog", + "channel": "Command line invocation of pip3, brew install, npm install from interactive Terminal" + }, + { + "name": "auditd:SYSCALL", + "channel": "fork/exec of service via PID 1 (systemd)" + }, + { + "name": "auditd:EXECVE", + "channel": "Execution of ssh/scp/sftp without corresponding authentication log" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of ssh or sftp without corresponding login event" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: execve where exe=/usr/bin/python3 or similar interpreter" + }, + { + "name": "macos:unifiedlog", + "channel": "launch of remote desktop app or helper binary" + }, + { + "name": "macos:unifiedlog", + "channel": "Unexpected processes making network calls based on DNS-derived ports" + }, + { + "name": "macos:unifiedlog", + "channel": "launchctl spawning new processes" + }, + { + "name": "macos:unifiedlog", + "channel": "launchctl activity and process creation" + }, + { + "name": "containerd:events", + "channel": "New container with suspicious image name or high resource usage" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of Python, Swift, or other binaries invoking archiving libraries" + }, + { + "name": "linux:osquery", + "channel": "Processes linked with libssl or crypto libraries making outbound connections" + }, + { + "name": "macos:unifiedlog", + "channel": "Process invoking SSL routines from Security framework" + }, + { + "name": "auditd:SYSCALL", + "channel": "Execution of binaries located in /etc/init.d/ or systemd service paths" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of binary listed in newly modified LaunchAgent plist" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of bless or nvram modifying boot parameters" + }, + { + "name": "macos:unifiedlog", + "channel": "Unexpected processes registered with launchd" + }, + { + "name": "macos:unifiedlog", + "channel": "Process launch" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of curl, osascript, or unexpected Office processes" + }, + { + "name": "macos:osquery", + "channel": "exec" + }, + { + "name": "macos:unifiedlog", + "channel": "Trust validation failures or bypass attempts during notarization and code signing checks" + }, + { + "name": "esxi:vmkernel", + "channel": "spawned shell or execution environment activity" + }, + { + "name": "macos:unifiedlog", + "channel": "process_exec: image in {/bin/bash,/bin/zsh,/usr/bin/osascript,/usr/bin/python*,/usr/bin/curl,/usr/bin/ssh,/usr/bin/open} AND parent in {Preview, TextEdit, Microsoft Word, Microsoft Excel, AdobeReader, Archive Utility, Finder}" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: exe in {/bin/bash,/bin/sh,/usr/bin/python*,/usr/bin/perl,/usr/bin/php,/usr/bin/node,/usr/bin/curl,/usr/bin/wget,/usr/bin/xdg-open,/usr/bin/ssh,/usr/bin/rundll32 (wine)} AND ppid process is a document viewer/browser" + }, + { + "name": "auditd:EXECVE", + "channel": "Execution of dd/sgdisk with arguments writing to sector 0 or partition table" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of zip, ditto, hdiutil, or openssl by processes not normally associated with archiving" + }, + { + "name": "macos:unifiedlog", + "channel": "process execution events for chmod, chown, chflags with unusual parameters or targets" + }, + { + "name": "m365:defender", + "channel": "AdvancedHunting(DeviceEvents, ProcessCreate, ImageLoad, AMSI/ETW derived signals)" + }, + { + "name": "macos:unifiedlog", + "channel": "execve or dylib load from memory without backing file" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Commands that alter firewall or start listeners: iptables|nft|ufw|firewall-cmd|pfctl|systemctl start sshd/telnet/dropbear; raw-socket/libpcap tools (tcpdump, tshark, nmap --raw)." + }, + { + "name": "macos:unifiedlog", + "channel": "exec: Execution of pfctl, socketfilterfw, launchctl start ssh/telnet, libpcap consumers." + }, + { + "name": "esxi:shell", + "channel": "Shell Execution" + }, + { + "name": "macos:unifiedlog", + "channel": "Unusual child process tree indicating attempted recovery after crash" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of binaries/scripts presenting false health messages for security daemons" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of processes mimicking Apple Security & Privacy GUIs" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve, setifflags" + }, + { + "name": "macos:osquery", + "channel": "process_events where path like '%tcpdump%'" + }, + { + "name": "auditd:EXECVE", + "channel": "Execution of dd, shred, or wipe with arguments targeting block devices" + }, + { + "name": "auditd:EXECVE", + "channel": "systemctl stop auditd, kill -9 , or modifications to /etc/selinux/config" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of curl, git, or Office processes with network connections" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream - process subsystem" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve calls for qemu-system*, kvm, or VBoxHeadless" + }, + { + "name": "macos:unifiedlog", + "channel": "Process execution for VBoxHeadless, prl_vm_app, vmware-vmx" + }, + { + "name": "macos:unifiedlog", + "channel": "process logs" + }, + { + "name": "esxi:shell", + "channel": "None" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of interpreters (python, perl), custom binaries, or shell utilities with long arguments containing non-standard tokens" + }, + { + "name": "macos:endpointsecurity", + "channel": "ES_EVENT_TYPE_NOTIFY_EXEC: arguments contain long, non-standard tokens / custom alphabets" + }, + { + "name": "macos:unifiedlog", + "channel": "command line or log output shows non-standard encoding routines" + }, + { + "name": "esxi:shell", + "channel": "commands containing long non-standard tokens or custom lookup tables" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of /usr/sbin/installer spawning child process from within /private/tmp or package contents" + }, + { + "name": "auditd:SYSCALL", + "channel": "Execution of dpkg or rpm followed by fork/execve from within postinst, prerm, etc." + }, + { + "name": "macos:unifiedlog", + "channel": "execve: Helper tools invoked through XPC executing unexpected binaries" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of modified binary without valid signature" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: exe in (/usr/bin/bash,/usr/bin/sh,/usr/bin/zsh,/usr/bin/python*) AND cmdline matches '(curl|wget).*(\\||\\|\\s*sh|bash)|base64\\s*-d|python\\s*-c'" + }, + { + "name": "macos:unifiedlog", + "channel": "exec: ParentImage in (Terminal, iTerm2) AND Image in (/bin/zsh,/bin/bash,/usr/bin/python*) AND CommandLine matches '(curl|wget).*(\\||\\|\\s*sh|bash)|base64 -D|python -c'" + }, + { + "name": "macos:unifiedlog", + "channel": "process created with repeated ICMP or UDP flood behavior" + }, + { + "name": "fs:fsusage", + "channel": "binary execution of security_authtrampoline" + }, + { + "name": "macos:unifiedlog", + "channel": "process: exec" + }, + { + "name": "esxi:vmkernel", + "channel": "Exec" + }, + { + "name": "macos:unifiedlog", + "channel": "Child processes of Safari, Chrome, or Firefox executing scripting interpreters" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of older or non-standard interpreters" + }, + { + "name": "linux:osquery", + "channel": "process execution events for permission modification utilities with command-line analysis" + }, + { + "name": "macos:unifiedlog", + "channel": "process execution events for chmod, chown, chflags with parameter analysis and target path examination" + }, + { + "name": "macos:osquery", + "channel": "process execution monitoring for permission modification utilities with command-line argument analysis" + }, + { + "name": "auditd:SYSCALL", + "channel": "Invocation of packet generation tools (e.g., hping3, nping) or fork bombs" + }, + { + "name": "macos:osquery", + "channel": "Execution of flooding tools or compiled packet generators" + }, + { + "name": "esxi:hostd", + "channel": "process" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve for proxy tools" + }, + { + "name": "macos:unifiedlog", + "channel": "process, socket, and DNS logs" + }, + { + "name": "macos:osquery", + "channel": "process_events table" + }, + { + "name": "macos:unifiedlog", + "channel": "Command line containing `trap` or `echo 'trap` written to login shell files" + }, + { + "name": "macos:unifiedlog", + "channel": "log collect --predicate" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve or nanosleep with no stdout/stderr I/O" + }, + { + "name": "macos:unifiedlog", + "channel": "launchd or osascript spawns process with delay command" + }, + { + "name": "linux:syslog", + "channel": "systemd-udevd spawning user-defined action from RUN+=" + }, + { + "name": "ebpf:syscalls", + "channel": "execve" + }, + { + "name": "macos:unifiedlog", + "channel": "process:spawn" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream --predicate 'eventMessage contains \"exec\"'" + }, + { + "name": "auditd:EXECVE", + "channel": "cat|less|grep accessing .bash_history from a non-shell process" + }, + { + "name": "auditd:EXECVE", + "channel": "Process execution via .desktop Exec path from /etc/xdg/autostart or ~/.config/autostart" + }, + { + "name": "auditd:SYSCALL", + "channel": "Execution of dpkg, rpm, or other package manager with list flag" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of system_profiler or osascript invoking enumeration" + }, + { + "name": "auditd:SYSCALL", + "channel": "apache2 or nginx spawning sh, bash, or python interpreter" + }, + { + "name": "macos:unifiedlog", + "channel": "httpd spawning bash, zsh, python, or osascript" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of /usr/libexec/security_authtrampoline or child processes originating from non-trusted binaries triggering credential prompts" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of security or osascript" + }, + { + "name": "macos:unifiedlog", + "channel": "launchd spawning processes tied to new or modified LaunchDaemon .plist entries" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of ping, nping, or crafted network packets via bash or python to reflection services" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of commands modifying iptables/nftables to block selective IPs" + }, + { + "name": "macos:unifiedlog", + "channel": "System process modifications altering DNS/proxy settings" + }, + { + "name": "containerd:Events", + "channel": "unusual process spawned from container image context" + }, + { + "name": "macos:osquery", + "channel": "curl, python scripts, rsync with internal share URLs" + }, + { + "name": "macos:unifiedlog", + "channel": "process: spawn, exec" + }, + { + "name": "macos:osquery", + "channel": "Rapid spawning of resource-heavy applications (e.g., Preview, Safari, Office)" + }, + { + "name": "macos:unifiedlog", + "channel": "Process creation events where command line = pmset with arguments affecting sleep, hibernatemode, displaysleep" + }, + { + "name": "macos:unifiedlog", + "channel": "Unexpected apps performing repeated DNS lookups" + }, + { + "name": "macos:unifiedlog", + "channel": "launchservices or loginwindow events" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve with LD_PRELOAD or linker-related environment variables set" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of process with DYLD_INSERT_LIBRARIES set" + }, + { + "name": "macos:unifiedlog", + "channel": "Suspicious Swift/Objective-C or scripting processes writing archive-like outputs" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve of re-parented process" + }, + { + "name": "linux:osquery", + "channel": "Anomalous parent PID change" + }, + { + "name": "macos:unifiedlog", + "channel": "Process creation with parent PID of 1 (launchd)" + }, + { + "name": "linux:osquery", + "channel": "child process invoking dynamic linker post-ptrace" + }, + { + "name": "macos:osquery", + "channel": "Processes executing kextload, spctl, or modifying kernel extension directories" + }, + { + "name": "macos:osquery", + "channel": "Unsigned or ad-hoc signed process executions in user contexts" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of diskutil or hdiutil attaching hidden partitions" + }, + { + "name": "macos:unifiedlog", + "channel": "process execution events for discovery utilities (system_profiler, sw_vers, dscl, networksetup) with command-line parameter analysis" + }, + { + "name": "macos:osquery", + "channel": "process event monitoring with focus on discovery utilities and cryptographic framework usage correlation" + }, + { + "name": "macos:unifiedlog", + "channel": "Unexpected apps generating frequent DNS queries" + }, + { + "name": "macos:unifiedlog", + "channel": "process exec" + }, + { + "name": "auditd:SYSCALL", + "channel": "socket: Suspicious creation of AF_UNIX sockets outside expected daemons" + }, + { + "name": "macos:unifiedlog", + "channel": "Non-standard processes invoking financial applications or payment APIs" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Agent/headless flags (listen/connect/reverse/tunnel) or remote-control binaries spawning shells" + }, + { + "name": "auditd:SYSCALL", + "channel": "systemctl enable/start: Creation/enablement of custom .service units in /etc/systemd/system" + }, + { + "name": "macos:unifiedlog", + "channel": "Process exec of remote-control apps or binaries with headless/connect flags" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: systemctl stop, service stop, or kill -9 on security daemons (e.g., falcon-sensor, auditd)" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of launchctl unload, kill, or removal of security agent daemons" + }, + { + "name": "macos:unifiedlog", + "channel": "process activity, exec events" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream process subsystem" + }, + { + "name": "macos:unifiedlog", + "channel": "process:exec and kext load events" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream --info --predicate 'eventMessage CONTAINS \"exec\"'" + }, + { + "name": "WinEventLog:Microsoft-Windows-DotNETRuntime", + "channel": "Unexpected AppDomain creation events or anomalous AppDomainManager assembly load behavior" + }, + { + "name": "auditd:SYSCALL", + "channel": "Execution of network stress tools or anomalies in socket/syscall behavior" + }, + { + "name": "macos:unifiedlog", + "channel": "Unsigned binary execution following SIP change" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Commands altering firewall or enabling listeners (iptables, nft, ufw, firewall-cmd, systemctl start *ssh*/*telnet*, ip route add, tcpdump, tshark)" + }, + { + "name": "macos:unifiedlog", + "channel": "exec: Execution of /sbin/pfctl, /usr/libexec/ApplicationFirewall/socketfilterfw, ifconfig, tcpdump, npcap/libpcap consumers" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of zip, ditto, hdiutil, or openssl by non-terminal parent processes" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of binaries with TCC protected access under unexpected parent processes such as Finder.app, SystemUIServer, or nsurlsessiond" + }, + { + "name": "WinEventLog:AppLocker", + "channel": "EventCode=8003, 8004" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve, unlink" + }, + { + "name": "macos:osquery", + "channel": "launchd, processes" + }, + { + "name": "linux:osquery", + "channel": "socat, ssh, or nc processes opening unexpected ports" + }, + { + "name": "macos:unifiedlog", + "channel": "process execution of ssh with -L/-R forwarding flags" + }, + { + "name": "macos:unifiedlog", + "channel": "launchd or cron spawning mining binaries" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve or socket/connect system calls for processes using RSA handshake" + }, + { + "name": "macos:unifiedlog", + "channel": "Process invoking SecKeyCreateRandomKey or asymmetric crypto APIs" + }, + { + "name": "azure:vmguest", + "channel": "Unexpected execution of cloud agent processes (e.g., WindowsAzureGuestAgent.exe, ssm-agent) followed by arbitrary script or binary execution" + }, + { + "name": "macos:unifiedlog", + "channel": "Script interpreter invoked by nginx/apache worker process" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of Office binaries with network activity" + }, + { + "name": "macos:unifiedlog", + "channel": "launch of bash/zsh/python/osascript targeting key file locations" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of /sbin/emond with child processes launched" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "provider: ETW CreateProcess events linking msbuild.exe to suspicious children where standard logs are incomplete" + }, + { + "name": "macos:unifiedlog", + "channel": "shutdown -h now or reboot" + }, + { + "name": "macos:unifiedlog", + "channel": "Execution of Code.app, idea, JetBrainsToolbox, eclipse with install/extension flags" + }, + { + "name": "macos:unifiedlog", + "channel": "process execution events for system discovery utilities (system_profiler, sysctl, networksetup, ioreg) with parameter analysis" + }, + { + "name": "OpenBSM:AuditTrail", + "channel": "BSM audit events for process execution and system call monitoring during reconnaissance" + }, + { + "name": "esxi:hostd", + "channel": "host daemon events related to VM operations and configuration queries during reconnaissance" + }, + { + "name": "esxi:vmkernel", + "channel": "VMware kernel events for hardware and system configuration access during environmental validation" + }, + { + "name": "linux:osquery", + "channel": "processes modifying environment variables related to history logging" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: parent process is usb/hid device handler, child process bash/python invoked" + }, + { + "name": "macos:unifiedlog", + "channel": "execution of curl, rclone, or Office apps invoking network sessions" + }, + { + "name": "macos:unifiedlog", + "channel": "exec: Execution of kextstat, kextfind, or ioreg targeting driver information" + }, + { + "name": "macos:endpointsecurity", + "channel": "exec events" + }, + { + "name": "macos:unifiedlog", + "channel": "Process creation involving binaries interacting with resource fork data" + }, + { + "name": "macos:unifiedlog", + "channel": "process event" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve: Execution of suspicious exploit binaries targeting security daemons" + }, + { + "name": "macos:osquery", + "channel": "execve: Unsigned or unnotarized processes launched with high privileges" + }, + { + "name": "macos:unifiedlog", + "channel": "security OR injection attempts into 1Password OR LastPass" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_data_source_ref": "", + "x_mitre_domains": [ + "ics-attack", + "mobile-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 19:28:39.339000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/datacomponents/DC0032\", \"old_value\": \"https://attack.mitre.org/data-components/DC0032\"}, \"root['description']\": {\"new_value\": \"Refers to the event in which a new process (executable) is initialized by an operating system. This can involve parent-child process relationships, process arguments, and environmental variables. Monitoring process creation is crucial for detecting malicious behaviors, such as execution of unauthorized binaries, scripting abuse, or privilege escalation attempts.. \", \"old_value\": \"Refers to the event in which a new process (executable) is initialized by an operating system. This can involve parent-child process relationships, process arguments, and environmental variables. Monitoring process creation is crucial for detecting malicious behaviors, such as execution of unauthorized binaries, scripting abuse, or privilege escalation attempts.\\n\\n*Data Collection Measures:*\\n\\n- Endpoint Detection and Response (EDR) Tools:\\n - EDRs provide process telemetry, tracking execution flows and arguments.\\n- Windows Event Logs:\\n - Event ID 4688 (Audit Process Creation): Captures process creation with associated parent process.\\n- Sysmon (Windows):\\n - Event ID 1 (Process Creation): Provides detailed logging\\n- Linux/macOS Monitoring:\\n - AuditD (execve syscall): Logs process creation.\\n - eBPF/XDP: Used for low-level monitoring of system calls related to process execution.\\n - OSQuery: Allows SQL-like queries to track process events (process_events table).\\n - Apple Endpoint Security Framework (ESF): Monitors process creation on macOS.\\n- Network-Based Monitoring:\\n - Zeek (Bro) Logs: Captures network-based process execution related to remote shells.\\n - Syslog/OSSEC: Tracks execution of processes on distributed systems.\\n- Behavioral SIEM Rules:\\n - Monitor process creation for uncommon binaries in user directories.\\n - Detect processes with suspicious command-line arguments. \", \"diff\": \"--- \\n+++ \\n@@ -1,21 +1 @@\\n-Refers to the event in which a new process (executable) is initialized by an operating system. This can involve parent-child process relationships, process arguments, and environmental variables. Monitoring process creation is crucial for detecting malicious behaviors, such as execution of unauthorized binaries, scripting abuse, or privilege escalation attempts.\\n-\\n-*Data Collection Measures:*\\n-\\n-- Endpoint Detection and Response (EDR) Tools:\\n- - EDRs provide process telemetry, tracking execution flows and arguments.\\n-- Windows Event Logs:\\n- - Event ID 4688 (Audit Process Creation): Captures process creation with associated parent process.\\n-- Sysmon (Windows):\\n- - Event ID 1 (Process Creation): Provides detailed logging\\n-- Linux/macOS Monitoring:\\n- - AuditD (execve syscall): Logs process creation.\\n- - eBPF/XDP: Used for low-level monitoring of system calls related to process execution.\\n- - OSQuery: Allows SQL-like queries to track process events (process_events table).\\n- - Apple Endpoint Security Framework (ESF): Monitors process creation on macOS.\\n-- Network-Based Monitoring:\\n- - Zeek (Bro) Logs: Captures network-based process execution related to remote shells.\\n- - Syslog/OSSEC: Tracks execution of processes on distributed systems.\\n-- Behavioral SIEM Rules:\\n- - Monitor process creation for uncommon binaries in user directories.\\n- - Detect processes with suspicious command-line arguments. \\n+Refers to the event in which a new process (executable) is initialized by an operating system. This can involve parent-child process relationships, process arguments, and environmental variables. Monitoring process creation is crucial for detecting malicious behaviors, such as execution of unauthorized binaries, scripting abuse, or privilege escalation attempts.. \"}, \"root['x_mitre_log_sources'][293]['channel']\": {\"new_value\": \"EventCode=8003, 8004\", \"old_value\": \"EventCode=8003,8004\", \"new_path\": \"root['x_mitre_log_sources'][290]['channel']\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][140]\": {\"name\": \"WinEventlog:Security\", \"channel\": \"EventCode=4688\"}, \"root['x_mitre_log_sources'][197]\": {\"name\": \"WinEventLog:Microsoft-Windows-Security-Auditing\", \"channel\": \"EventCode=4688\"}, \"root['x_mitre_log_sources'][249]\": {\"name\": \"WinEventLog:security\", \"channel\": \"EventCode=4688\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Refers to the event in which a new process (executable) is it1Refers to the event in which a new process (executable) is i
>nitialized by an operating system. This can involve parent-c>nitialized by an operating system. This can involve parent-c
>hild process relationships, process arguments, and environme>hild process relationships, process arguments, and environme
>ntal variables. Monitoring process creation is crucial for d>ntal variables. Monitoring process creation is crucial for d
>etecting malicious behaviors, such as execution of unauthori>etecting malicious behaviors, such as execution of unauthori
>zed binaries, scripting abuse, or privilege escalation attem>zed binaries, scripting abuse, or privilege escalation attem
>pts.  *Data Collection Measures:*  - Endpoint Detection and >pts.. 
>Response (EDR) Tools:     - EDRs provide process telemetry,  
>tracking execution flows and arguments. - Windows Event Logs 
>:     - Event ID 4688 (Audit Process Creation): Captures pro 
>cess creation with associated parent process. - Sysmon (Wind 
>ows):     - Event ID 1 (Process Creation): Provides detailed 
> logging - Linux/macOS Monitoring:     - AuditD (execve sysc 
>all): Logs process creation.     - eBPF/XDP: Used for low-le 
>vel monitoring of system calls related to process execution. 
>     - OSQuery: Allows SQL-like queries to track process eve 
>nts (process_events table).     - Apple Endpoint Security Fr 
>amework (ESF): Monitors process creation on macOS. - Network 
>-Based Monitoring:     - Zeek (Bro) Logs: Captures network-b 
>ased process execution related to remote shells.     - Syslo 
>g/OSSEC: Tracks execution of processes on distributed system 
>s. - Behavioral SIEM Rules:     - Monitor process creation f 
>or uncommon binaries in user directories.     - Detect proce 
>sses with suspicious command-line arguments.  
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--ee575f4a-2d4f-48f6-b18b-89067760adc1", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.272000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0034", + "external_id": "DC0034" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Process Metadata", + "description": "Contextual data about a running process, which may include information such as environment variables, image name, user/owner, etc.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Process", + "channel": "None" + }, + { + "name": "macos:unifiedlog", + "channel": "subsystem=com.apple.process" + }, + { + "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational", + "channel": "CodeIntegrity/WDAC events indicating unsigned/invalid DLL loads" + }, + { + "name": "linux:syslog", + "channel": "sudo or service accounts invoking loaders with suspicious env vars" + }, + { + "name": "macos:osquery", + "channel": "Process Context" + }, + { + "name": "esxi:auth", + "channel": "user session" + }, + { + "name": "networkdevice:syslog", + "channel": "Admin activity" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve call for sudo where euid != uid" + }, + { + "name": "macos:unifiedlog", + "channel": "subsystem=com.apple.TCC" + }, + { + "name": "macos:unifiedlog", + "channel": "exec of binary with setuid/setgid and EUID != UID" + }, + { + "name": "macos:unifiedlog", + "channel": "process" + }, + { + "name": "auditd:SYSCALL", + "channel": "Use of fork/exec with DISPLAY unset or redirected" + }, + { + "name": "EDR:Telemetry", + "channel": "Process lineage and API usage enrichment (GetSystemTime, GetTimeZoneInformation, NtQuerySystemTime)" + }, + { + "name": "esxi:hostd", + "channel": "/var/log/hostd.log API calls reading/altering time/ntp settings" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve, prctl, or ptrace activity affecting process memory or command-line arguments" + }, + { + "name": "linux:osquery", + "channel": "Cross-reference argv[0] with actual executable path and parent process metadata" + }, + { + "name": "WinEventLog:AppLocker", + "channel": "AppLocker audit/blocks showing developer utilities executing scripts/binaries outside policy" + }, + { + "name": "EDR:hunting", + "channel": "Correlation of signer info, parent-child lineage, rare invocation context (user host role), and API surfaces (CreateProcess*, LoadLibrary*)" + }, + { + "name": "WinEventLog:Microsoft-Windows-Security-Mitigations/KernelMode", + "channel": "ETW telemetry indicating ClickOnce deployment (dfsvc.exe) launching payloads" + }, + { + "name": "etw:Microsoft-Windows-ClickOnce", + "channel": "provider: Event Tracing for Windows (ETW) events associated with ClickOnce deployment (dfsvc.exe activity)" + }, + { + "name": "WinEventLog:Microsoft-Windows-Windows Camera Frame Server/Operational", + "channel": "Process session start/stop events for camera pipeline by unexpected executables" + }, + { + "name": "linux:osquery", + "channel": "select: path LIKE '/dev/video%'" + }, + { + "name": "linux:osquery", + "channel": "state=attached/debugged" + }, + { + "name": "macos:unifiedlog", + "channel": "Code Execution & Entitlement Access" + }, + { + "name": "macos:unifiedlog", + "channel": "Process opening SSH_AUTH_SOCK or /tmp/ssh-* socket not owned by same UID" + }, + { + "name": "macos:unifiedlog", + "channel": "code signature/memory protection" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve with UID \u2260 EUID" + }, + { + "name": "auditd:SYSCALL", + "channel": "execve with escalated privileges" + }, + { + "name": "AWS:CloudTrail", + "channel": "cross-account or unexpected assume role" + }, + { + "name": "macos:unifiedlog", + "channel": "log collect from launchd and process start" + }, + { + "name": "containerd:events", + "channel": "Docker or containerd image pulls and process executions" + }, + { + "name": "linux:syslog", + "channel": "Kernel or daemon warnings of downgraded TLS or cryptographic settings" + }, + { + "name": "macos:unifiedlog", + "channel": "Modifications or writes to EFI system partition for downgraded bootloaders" + }, + { + "name": "macos:unifiedlog", + "channel": "non-shell process tree accessing bash history" + }, + { + "name": "linux:osquery", + "channel": "process metadata mismatch between /proc and runtime attributes" + }, + { + "name": "linux:osquery", + "channel": "process environment variables containing LD_PRELOAD" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "EventCode=400, 403" + }, + { + "name": "macos:osquery", + "channel": "Process Execution + Hash" + }, + { + "name": "etw:Microsoft-Windows-Kernel-Process", + "channel": "process_start: EventHeader.ProcessId true parent vs reported PPID mismatch" + }, + { + "name": "macos:endpointsecurity", + "channel": "ES_EVENT_TYPE_NOTIFY_EXEC, ES_EVENT_TYPE_NOTIFY_MMAP" + }, + { + "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational", + "channel": "Unsigned/invalid signature modules or images loaded by msbuild.exe or its children" + }, + { + "name": "WinEventLog:Microsoft-Windows-DeviceGuard/Operational", + "channel": "WDAC policy audit/block affecting msbuild.exe spawned payloads" + }, + { + "name": "WinEventLog:Microsoft-Windows-SmartAppControl/Operational", + "channel": "Smart App Control decisions (audit/block) for msbuild.exe-launched executables" + }, + { + "name": "WinEventLog:Microsoft-Windows-CodeIntegrity/Operational", + "channel": "Unsigned or untrusted modules loaded during JamPlus.exe runtime" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "mobile-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:35.331000+00:00\"}, \"root['x_mitre_log_sources'][36]['channel']\": {\"new_value\": \"EventCode=400, 403\", \"old_value\": \"EventCode=400,403\"}}}", + "previous_version": "2.0" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--61f1d40e-f3d0-4cc6-aa2d-937b6204194f", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.272000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0033", + "external_id": "DC0033" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Process Termination", + "description": "The exit or termination of a running process on a system. This can occur due to normal operations, user-initiated commands, or malicious actions such as process termination by malware to disable security controls.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Process", + "channel": "None" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "EventCode=5" + }, + { + "name": "linux:syslog", + "channel": "Unexpected termination of daemons or critical services not aligned with admin change tickets" + }, + { + "name": "macos:osquery", + "channel": "process_termination: Unexpected termination of processes tied to vulnerable or high-value services" + }, + { + "name": "esxi:hostd", + "channel": "Log entries indicating VM powered off or forcibly terminated" + }, + { + "name": "macos:unifiedlog", + "channel": "Terminal process killed (killall Terminal) immediately after sudoers modification" + }, + { + "name": "auditd:SYSCALL", + "channel": "exit_group" + }, + { + "name": "macos:unifiedlog", + "channel": "process.*exit.*code" + }, + { + "name": "linux:osquery", + "channel": "unexpected termination of syslog or rsyslog processes" + }, + { + "name": "auditd:SYSCALL", + "channel": "Process segfault or abnormal termination after invoking vulnerable syscall sequence" + }, + { + "name": "auditd:SYSCALL", + "channel": "kill syscalls targeting logging/security processes" + }, + { + "name": "macos:unifiedlog", + "channel": "Termination of syspolicyd or XProtect processes" + }, + { + "name": "docker:runtime", + "channel": "Termination of monitoring sidecar or security container" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "mobile-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:36.181000+00:00\"}, \"root['description']\": {\"new_value\": \"The exit or termination of a running process on a system. This can occur due to normal operations, user-initiated commands, or malicious actions such as process termination by malware to disable security controls.\", \"old_value\": \"The exit or termination of a running process on a system. This can occur due to normal operations, user-initiated commands, or malicious actions such as process termination by malware to disable security controls.\\n\\n*Data Collection Measures:*\\n\\n- Endpoint Detection and Response (EDR) Tools:\\n - Monitor process termination events.\\n- Windows Event Logs:\\n - Event ID 4689 (Process Termination) \\u2013 Captures when a process exits, including process ID and parent process.\\n - Event ID 7036 (Service Control Manager) \\u2013 Monitors system service stops.\\n- Sysmon (Windows):\\n - Event ID 5 (Process Termination) \\u2013 Detects when a process exits, including parent-child relationships.\\n- Linux/macOS Monitoring:\\n - AuditD (`execve`, `exit_group`, `kill` syscalls) \\u2013 Captures process termination via command-line interactions.\\n - eBPF/XDP: Monitors low-level system calls related to process termination.\\n - OSQuery: The processes table can be queried for abnormal exits.\", \"diff\": \"--- \\n+++ \\n@@ -1,15 +1 @@\\n The exit or termination of a running process on a system. This can occur due to normal operations, user-initiated commands, or malicious actions such as process termination by malware to disable security controls.\\n-\\n-*Data Collection Measures:*\\n-\\n-- Endpoint Detection and Response (EDR) Tools:\\n- - Monitor process termination events.\\n-- Windows Event Logs:\\n- - Event ID 4689 (Process Termination) \\u2013 Captures when a process exits, including process ID and parent process.\\n- - Event ID 7036 (Service Control Manager) \\u2013 Monitors system service stops.\\n-- Sysmon (Windows):\\n- - Event ID 5 (Process Termination) \\u2013 Detects when a process exits, including parent-child relationships.\\n-- Linux/macOS Monitoring:\\n- - AuditD (`execve`, `exit_group`, `kill` syscalls) \\u2013 Captures process termination via command-line interactions.\\n- - eBPF/XDP: Monitors low-level system calls related to process termination.\\n- - OSQuery: The processes table can be queried for abnormal exits.\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1The exit or termination of a running process on a system. Tht1The exit or termination of a running process on a system. Th
>is can occur due to normal operations, user-initiated comman>is can occur due to normal operations, user-initiated comman
>ds, or malicious actions such as process termination by malw>ds, or malicious actions such as process termination by malw
>are to disable security controls.  *Data Collection Measures>are to disable security controls.
>:*  - Endpoint Detection and Response (EDR) Tools:     - Mon 
>itor process termination events. - Windows Event Logs:     - 
> Event ID 4689 (Process Termination) \u2013 Captures when a proce 
>ss exits, including process ID and parent process.     - Eve 
>nt ID 7036 (Service Control Manager) \u2013 Monitors system servi 
>ce stops. - Sysmon (Windows):     - Event ID 5 (Process Term 
>ination) \u2013 Detects when a process exits, including parent-ch 
>ild relationships. - Linux/macOS Monitoring:     - AuditD (` 
>execve`, `exit_group`, `kill` syscalls) \u2013 Captures process t 
>ermination via command-line interactions.     - eBPF/XDP: Mo 
>nitors low-level system calls related to process termination 
>.     - OSQuery: The processes table can be queried for abno 
>rmal exits. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--f42df6f0-6395-4f0c-9376-525a031f00c3", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.271000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0001", + "external_id": "DC0001" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Scheduled Job Creation", + "description": "The establishment of a task or job that will execute at a predefined time or based on specific triggers.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Scheduled Job", + "channel": "None" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4698" + }, + { + "name": "linux:syslog", + "channel": "Execution of non-standard script or binary by cron" + }, + { + "name": "WinEventLog:TaskScheduler", + "channel": "EventCode=106" + }, + { + "name": "linux:osquery", + "channel": "crontab, systemd_timers" + }, + { + "name": "macos:osquery", + "channel": "launchd_jobs" + }, + { + "name": "esxi:vmkernel", + "channel": "Startup script and task execution logs" + }, + { + "name": "kubernetes:apiserver", + "channel": "verb=create, resource=cronjobs, group=batch" + }, + { + "name": "linux:osquery", + "channel": "file_events" + }, + { + "name": "macos:unifiedlog", + "channel": "process: crontab edits, launch of cron job" + }, + { + "name": "macos:osquery", + "channel": "file_events - cron, launchd" + }, + { + "name": "esxi:cron", + "channel": "execution of scheduled job" + }, + { + "name": "esxi:hostd", + "channel": "task creation events" + }, + { + "name": "macos:cron", + "channel": "cron/launchd" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4699" + }, + { + "name": "linux:cron", + "channel": "Scheduled execution of unknown or unusual script/binary" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:35.814000+00:00\"}, \"root['description']\": {\"new_value\": \"The establishment of a task or job that will execute at a predefined time or based on specific triggers.\", \"old_value\": \"The establishment of a task or job that will execute at a predefined time or based on specific triggers.\\n\\n*Data Collection Measures: *\\n\\n- Windows Event Logs:\\n - Event ID 4698 (Scheduled Task Created) \\u2013 Detects the creation of new scheduled tasks.\\n - Event ID 4702 (Scheduled Task Updated) \\u2013 Identifies modifications to existing scheduled jobs.\\n - Event ID 106 (TaskScheduler Operational Log) \\u2013 Provides details about scheduled task execution.\\n- Sysmon (Windows):\\n - Event ID 1 (Process Creation) \\u2013 Detects the execution of suspicious tasks started by `schtasks.exe`, `at.exe`, or `taskeng.exe`.\\n- Linux/macOS Monitoring:\\n - AuditD: Monitor modifications to `/etc/cron*`, `/var/spool/cron/`, and `crontab` files.\\n - Syslog: Capture cron job execution logs from `/var/log/cron`.\\n - OSQuery: Query the `crontab` and `launchd` tables for scheduled job configurations.\\n- Endpoint Detection and Response (EDR) Tools:\\n - Track scheduled task creation and modification events.\\n- SIEM & XDR Detection Rules:\\n - Monitor for scheduled jobs created by unusual users.\\n - Detect tasks executing scripts from non-standard directories.\", \"diff\": \"--- \\n+++ \\n@@ -1,19 +1 @@\\n The establishment of a task or job that will execute at a predefined time or based on specific triggers.\\n-\\n-*Data Collection Measures: *\\n-\\n-- Windows Event Logs:\\n- - Event ID 4698 (Scheduled Task Created) \\u2013 Detects the creation of new scheduled tasks.\\n- - Event ID 4702 (Scheduled Task Updated) \\u2013 Identifies modifications to existing scheduled jobs.\\n- - Event ID 106 (TaskScheduler Operational Log) \\u2013 Provides details about scheduled task execution.\\n-- Sysmon (Windows):\\n- - Event ID 1 (Process Creation) \\u2013 Detects the execution of suspicious tasks started by `schtasks.exe`, `at.exe`, or `taskeng.exe`.\\n-- Linux/macOS Monitoring:\\n- - AuditD: Monitor modifications to `/etc/cron*`, `/var/spool/cron/`, and `crontab` files.\\n- - Syslog: Capture cron job execution logs from `/var/log/cron`.\\n- - OSQuery: Query the `crontab` and `launchd` tables for scheduled job configurations.\\n-- Endpoint Detection and Response (EDR) Tools:\\n- - Track scheduled task creation and modification events.\\n-- SIEM & XDR Detection Rules:\\n- - Monitor for scheduled jobs created by unusual users.\\n- - Detect tasks executing scripts from non-standard directories.\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1The establishment of a task or job that will execute at a prt1The establishment of a task or job that will execute at a pr
>edefined time or based on specific triggers.  *Data Collecti>edefined time or based on specific triggers.
>on Measures: *  - Windows Event Logs:     - Event ID 4698 (S 
>cheduled Task Created) \u2013 Detects the creation of new schedul 
>ed tasks.     - Event ID 4702 (Scheduled Task Updated) \u2013 Ide 
>ntifies modifications to existing scheduled jobs.     - Even 
>t ID 106 (TaskScheduler Operational Log) \u2013 Provides details  
>about scheduled task execution. - Sysmon (Windows):     - Ev 
>ent ID 1 (Process Creation) \u2013 Detects the execution of suspi 
>cious tasks started by `schtasks.exe`, `at.exe`, or `taskeng 
>.exe`. - Linux/macOS Monitoring:     - AuditD: Monitor modif 
>ications to `/etc/cron*`, `/var/spool/cron/`, and `crontab`  
>files.     - Syslog: Capture cron job execution logs from `/ 
>var/log/cron`.     - OSQuery: Query the `crontab` and `launc 
>hd` tables for scheduled job configurations. - Endpoint Dete 
>ction and Response (EDR) Tools:     - Track scheduled task c 
>reation and modification events. - SIEM & XDR Detection Rule 
>s:     - Monitor for scheduled jobs created by unusual users 
>.     - Detect tasks executing scripts from non-standard dir 
>ectories. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--7b375092-3a61-448d-900a-77c9a4bde4dc", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.271000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0005", + "external_id": "DC0005" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Scheduled Job Metadata", + "description": "Contextual data about a scheduled job, which may include information such as name, timing, command(s), etc.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Scheduled Job", + "channel": "None" + }, + { + "name": "linux:cron", + "channel": "cron activity" + }, + { + "name": "fs:fileevents", + "channel": "/Library/LaunchDaemons/*.plist, ~/Library/LaunchAgents/*.plist" + }, + { + "name": "WinEventLog:TaskScheduler", + "channel": "Task registration/execution shortly after a time discovery event" + }, + { + "name": "macos:unifiedlog", + "channel": "New/modified launchd plist (persistence/scheduling) within TimeWindow after time query" + }, + { + "name": "esxi:syslog", + "channel": "/var/log/vpxa.log task invocations tied to time configuration" + }, + { + "name": "WinEventLog:System", + "channel": "EventCode=106, 200" + }, + { + "name": "macos:launchd", + "channel": "launchd.plist and logs" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_data_source_ref": "", + "x_mitre_domains": [ + "enterprise-attack", + "ics-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-22 19:03:38.549000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/datacomponents/DC0005\", \"old_value\": \"https://attack.mitre.org/data-components/DC0005\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][1]\": {\"name\": \"linux:cron\", \"channel\": \"/var/log/syslog or journalctl\"}, \"root['x_mitre_log_sources'][4]\": {\"name\": \"linux::cron\", \"channel\": \"crontab or at job created within TimeWindow post time discovery\"}}}", + "previous_version": "2.0" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--9f387817-df83-432a-b56b-a8fb7f71eedd", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.272000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0029", + "external_id": "DC0029" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Script Execution", + "description": "The execution of a text file that contains code via the interpreter.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Script", + "channel": "None" + }, + { + "name": "m365:office", + "channel": "VBA auto_open, auto_close, or document_open events" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream --predicate 'eventMessage contains \"python\"'" + }, + { + "name": "linux:syslog", + "channel": "/var/log/syslog" + }, + { + "name": "WinEventLog:System", + "channel": "EventCode=1502, 1503" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream --predicate 'eventMessage contains \"wscript\" OR \"vbs\"'" + }, + { + "name": "macos:unifiedlog", + "channel": "osascript or AppleScript invocation modifying UI" + }, + { + "name": "networkdevice:runtime", + "channel": "runtime" + }, + { + "name": "macos:unifiedlog", + "channel": "log" + }, + { + "name": "esxi:vmkernel", + "channel": "boot" + }, + { + "name": "macos:unifiedlog", + "channel": "AppleScript creating login item via 'System Events' dictionary" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "EventCode=4103, 4104, 4105, 4106" + }, + { + "name": "WinEventLog:Application", + "channel": "Stored procedure creation, modification, or xp_cmdshell invocation via SQL logs or SQL Server auditing" + }, + { + "name": "ApplicationLogs:SQL", + "channel": "Stored procedure creation or modification with shell invocation (e.g., system(), exec())" + }, + { + "name": "macos:unifiedlog", + "channel": "subsystem=launchservices" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "Set-ADUser or Set-ADAuthenticationPolicy with MFA attributes disabled" + }, + { + "name": "EDR:scriptblock", + "channel": "Process Tree + Script Block Logging" + }, + { + "name": "linux:syslog", + "channel": "boot logs" + }, + { + "name": "m365:defender", + "channel": "ScriptBlockLogging + AMSI" + }, + { + "name": "macos:unifiedlog", + "channel": "log stream with predicate 'eventMessage CONTAINS \"osascript\"'" + }, + { + "name": "etw:Microsoft-Antimalware-Scan-Interface", + "channel": "Amsi/Script content + API verdicts during in-memory staging" + }, + { + "name": "esxi:shell", + "channel": "None" + }, + { + "name": "WinEventLog:System", + "channel": "EventCode=4016, 5312" + }, + { + "name": "auditd:PROCTITLE", + "channel": "scripting loop invoking sleep/ping" + }, + { + "name": "WinEventLog:PowerShell", + "channel": "Scripts with references to XML parsing, AES decryption, or gpprefdecrypt logic" + }, + { + "name": "macos:syslog", + "channel": "system.log, asl.log" + }, + { + "name": "macos:osquery", + "channel": "exec: Unexpected execution of osascript or AppleScript targeting sensitive apps" + }, + { + "name": "macos:unifiedlog", + "channel": "subsystem=com.apple.Security or com.apple.applescript" + }, + { + "name": "azure:activity", + "channel": "Microsoft.Compute/virtualMachines/runCommand/action: Abnormal initiation of Azure RunCommand jobs or PowerShell/Bash payloads" + }, + { + "name": "EDR:AMSI", + "channel": "Malicious inline C#/script blobs embedded in MSBuild projects if intercepted by AMSI-aware loaders (rare but possible via chained LOLBins)" + }, + { + "name": "macos:unifiedlog", + "channel": "osascript, AppleScript, or Python execution triggered immediately after HID connection" + }, + { + "name": "m365:unified", + "channel": "Scripted Activity" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:36.018000+00:00\"}, \"root['description']\": {\"new_value\": \"The execution of a text file that contains code via the interpreter.\", \"old_value\": \"The execution of a text file that contains code via the interpreter.\\n\\n*Data Collection Measures:*\\n\\n- Windows Event Logs:\\n - Event ID 4104 (PowerShell Script Block Logging) \\u2013 Captures full command-line execution of PowerShell scripts.\\n - Event ID 4688 (Process Creation) \\u2013 Detects script execution by tracking process launches (`powershell.exe`, `wscript.exe`, `cscript.exe`).\\n - Event ID 5861 (Script Execution) \\u2013 Captures script execution via Windows Defender AMSI logging.\\n- Sysmon (Windows):\\n - Event ID 1 (Process Creation) \\u2013 Monitors script execution initiated by scripting engines.\\n - Event ID 11 (File Creation) \\u2013 Detects new script files written to disk before execution.\\n- Endpoint Detection and Response (EDR) Tools:\\n - Track script execution behavior, detect obfuscated commands, and prevent malicious scripts.\\n- PowerShell Logging:\\n - Enable Module Logging: Logs all loaded modules and cmdlets.\\n - Enable Script Block Logging: Captures complete PowerShell script execution history.\\n- SIEM Detection Rules:\\n - Detect script execution with obfuscated, encoded, or remote URLs.\\n - Alert on script executions using `-EncodedCommand` or `iex(iwr)`.\", \"diff\": \"--- \\n+++ \\n@@ -1,19 +1 @@\\n The execution of a text file that contains code via the interpreter.\\n-\\n-*Data Collection Measures:*\\n-\\n-- Windows Event Logs:\\n- - Event ID 4104 (PowerShell Script Block Logging) \\u2013 Captures full command-line execution of PowerShell scripts.\\n- - Event ID 4688 (Process Creation) \\u2013 Detects script execution by tracking process launches (`powershell.exe`, `wscript.exe`, `cscript.exe`).\\n- - Event ID 5861 (Script Execution) \\u2013 Captures script execution via Windows Defender AMSI logging.\\n-- Sysmon (Windows):\\n- - Event ID 1 (Process Creation) \\u2013 Monitors script execution initiated by scripting engines.\\n- - Event ID 11 (File Creation) \\u2013 Detects new script files written to disk before execution.\\n-- Endpoint Detection and Response (EDR) Tools:\\n- - Track script execution behavior, detect obfuscated commands, and prevent malicious scripts.\\n-- PowerShell Logging:\\n- - Enable Module Logging: Logs all loaded modules and cmdlets.\\n- - Enable Script Block Logging: Captures complete PowerShell script execution history.\\n-- SIEM Detection Rules:\\n- - Detect script execution with obfuscated, encoded, or remote URLs.\\n- - Alert on script executions using `-EncodedCommand` or `iex(iwr)`.\"}, \"root['x_mitre_log_sources'][11]['channel']\": {\"new_value\": \"EventCode=4103, 4104, 4105, 4106\", \"old_value\": \"EventCode=4103, 4104\"}, \"root['x_mitre_log_sources'][22]['channel']\": {\"new_value\": \"EventCode=4016, 5312\", \"old_value\": \"EventCode=4016,5312\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1The execution of a text file that contains code via the intet1The execution of a text file that contains code via the inte
>rpreter.  *Data Collection Measures:*  - Windows Event Logs:>rpreter.
>     - Event ID 4104 (PowerShell Script Block Logging) \u2013 Cap 
>tures full command-line execution of PowerShell scripts.     
> - Event ID 4688 (Process Creation) \u2013 Detects script executi 
>on by tracking process launches (`powershell.exe`, `wscript. 
>exe`, `cscript.exe`).     - Event ID 5861 (Script Execution) 
> \u2013 Captures script execution via Windows Defender AMSI loggi 
>ng. - Sysmon (Windows):     - Event ID 1 (Process Creation)  
>\u2013 Monitors script execution initiated by scripting engines.  
>    - Event ID 11 (File Creation) \u2013 Detects new script files 
> written to disk before execution. - Endpoint Detection and  
>Response (EDR) Tools:     - Track script execution behavior, 
> detect obfuscated commands, and prevent malicious scripts.  
>- PowerShell Logging:     - Enable Module Logging: Logs all  
>loaded modules and cmdlets.     - Enable Script Block Loggin 
>g: Captures complete PowerShell script execution history. -  
>SIEM Detection Rules:     - Detect script execution with obf 
>uscated, encoded, or remote URLs.     - Alert on script exec 
>utions using `-EncodedCommand` or `iex(iwr)`. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--5297a638-1382-4f0c-8472-0d21830bf705", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.273000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0060", + "external_id": "DC0060" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Service Creation", + "description": "The registration of a new service or daemon on an operating system.\n\n*Data Collection Measures:*\n\n- Windows Event Logs\n - Event ID 4697 - Captures the creation of a new Windows service.\n - Event ID 7045 - Captures services installed by administrators or adversaries.\n - Event ID 7034 - Could indicate malicious service modification or exploitation.\n- Sysmon Logs\n - Sysmon Event ID 1 - Process Creation (captures service executables).\n - Sysmon Event ID 4 - Service state changes (detects service installation).\n - Sysmon Event ID 13 - Registry modifications (captures service persistence changes).\n- PowerShell Logging\n - Monitor `New-Service` and `Set-Service` PowerShell cmdlets in Event ID 4104 (Script Block Logging).\n- Linux/macOS Collection Methods\n - AuditD & Syslog Daemon Logs (`/var/log/syslog`, `/var/log/messages`, `/var/log/daemon.log`)\n - AuditD Rules:\n - `auditctl -w /etc/systemd/system -p wa -k service_creation`\n - Detects changes to `systemd` service configurations.\n- Systemd Journals (`journalctl -u `)\n - Captures newly created systemd services.\n- LaunchDaemons & LaunchAgents (macOS)\n - Monitor `/Library/LaunchDaemons/` and `/Library/LaunchAgents/` for new plist files.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Service", + "channel": "None" + }, + { + "name": "WinEventLog:System", + "channel": "EventCode=7036" + }, + { + "name": "auditd:CONFIG_CHANGE", + "channel": "creation or modification of systemd services" + }, + { + "name": "macos:osquery", + "channel": "Process Events and Launch Daemons" + }, + { + "name": "WinEventLog:System", + "channel": "EventCode=7045" + }, + { + "name": "linux:osquery", + "channel": "newly registered unit file with ExecStart pointing to unknown binary" + }, + { + "name": "macos:unifiedlog", + "channel": "creation or loading of new launchd services" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4697" + }, + { + "name": "linux:syslog", + "channel": "systemctl start/enable with uncommon binary paths" + }, + { + "name": "WinEventLog:System", + "channel": "EventCode=7031, 7034" + }, + { + "name": "macos:osquery", + "channel": "launch_daemons" + }, + { + "name": "macos:unifiedlog", + "channel": "launchd loading new LaunchDaemon or changes to existing daemon configuration" + }, + { + "name": "macos:osquery", + "channel": "detection of new launch agents with suspicious paths or unsigned binaries" + }, + { + "name": "kubernetes:audit", + "channel": "create" + }, + { + "name": "containerLogs:systemd_unit_files", + "channel": "unit file referencing container binary with persistent flags" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:36.315000+00:00\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][5]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=7045\"}}}", + "previous_version": "2.0" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--74fa567d-bc90-425c-8a41-3c703abb221c", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.273000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0041", + "external_id": "DC0041" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Service Metadata", + "description": "Contextual data about a service/daemon, which may include information such as name, service executable, start type, etc.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Service", + "channel": "None" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "EventCode=4" + }, + { + "name": "linux:syslog", + "channel": "service stopped messages" + }, + { + "name": "macos:unifiedlog", + "channel": "launchctl disable or bootout calls" + }, + { + "name": "esxi:hostd", + "channel": "Stop VM or disable service events via vim-cmd" + }, + { + "name": "linux:syslog", + "channel": "auditd service stopped or disabled" + }, + { + "name": "macos:osquery", + "channel": "launchd" + }, + { + "name": "linux:osquery", + "channel": "scheduled/real-time" + }, + { + "name": "macos:unifiedlog", + "channel": "subsystem=com.apple.launchservices" + }, + { + "name": "esxi:hostd", + "channel": "registers services with legitimate-sounding names" + }, + { + "name": "WinEventLog:System", + "channel": "EventCode=7035" + }, + { + "name": "linux:syslog", + "channel": "Service restart with modified executable path" + }, + { + "name": "macos:unifiedlog", + "channel": "Observed loading of new LaunchAgent or LaunchDaemon plist" + }, + { + "name": "kubernetes:audit", + "channel": "seccomp or AppArmor profile changes" + }, + { + "name": "WinEventLog:System", + "channel": "Service stopped or RecoveryDisabled set via REAgentC" + }, + { + "name": "esxi:hostd", + "channel": "Service events" + }, + { + "name": "WinEventLog:WinRM", + "channel": "EventCode=6" + }, + { + "name": "auditd:CONFIG_CHANGE", + "channel": "delete: Modification of systemd unit files or config for security agents" + }, + { + "name": "macos:unifiedlog", + "channel": "Modification of system configuration profiles affecting security tools" + }, + { + "name": "kubernetes:audit", + "channel": "kubectl delete or patch of security pods/admission controllers" + }, + { + "name": "networkdevice:config", + "channel": "write: Startup configuration changes disabling security checks" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:36.382000+00:00\"}, \"root['x_mitre_log_sources'][1]['name']\": {\"new_value\": \"WinEventLog:Sysmon\", \"old_value\": \"WinEventLog:sysmon\"}}}", + "previous_version": "2.0" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--66531bc6-a509-4868-8314-4d599e91d222", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.273000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0065", + "external_id": "DC0065" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Service Modification", + "description": "Changes made to an existing service or daemon, such as modifying the service name, start type, execution parameters, or security configurations.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Service", + "channel": "None" + }, + { + "name": "WinEventLog:Microsoft-IIS-Configuration", + "channel": "Module or ISAPI filter registration events" + }, + { + "name": "WinEventLog:System", + "channel": "EventCode=7040" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:37.211000+00:00\"}, \"root['description']\": {\"new_value\": \"Changes made to an existing service or daemon, such as modifying the service name, start type, execution parameters, or security configurations.\", \"old_value\": \"Changes made to an existing service or daemon, such as modifying the service name, start type, execution parameters, or security configurations.\\n\\n*Data Collection Measures: *\\n\\n- Windows Event Logs\\n - Event ID 7040 - Detects modifications to the startup behavior of a service.\\n - Event ID 7045 - Can capture changes made to existing services.\\n - Event ID 7036 - Tracks when services start or stop, potentially indicating malicious tampering.\\n - Event ID 4697 - Can detect when an adversary reinstalls a service with different parameters.\\n- Sysmon Logs\\n - Sysmon Event ID 13 - Detects changes to service configurations in the Windows Registry (e.g., `HKLM\\\\SYSTEM\\\\CurrentControlSet\\\\Services\\\\`).\\n - Sysmon Event ID 1 - Can track execution of `sc.exe` or `PowerShell Set-Service`.\\n- PowerShell Logging\\n - Event ID 4104 (Script Block Logging) - Captures execution of commands like `Set-Service`, `New-Service`, or `sc config`.\\n - Command-Line Logging (Event ID 4688) - Tracks usage of service modification commands:\\n - `sc config start= auto` \\n - `sc qc ` \\n- Linux/macOS Collection Methods\\n - Systemd Journals (`journalctl -u `) Tracks modifications to systemd service configurations.\\n - Daemon Logs (`/var/log/syslog`, `/var/log/messages`, `/var/log/daemon.log`) Captures changes to service state and execution parameters.\\n - AuditD Rules for Service Modification \\n - Monitor modifications to `/etc/systemd/system/` for new or altered service unit files: `auditctl -w /etc/systemd/system/ -p wa -k service_modification`\\n - Track execution of `systemctl` or `service` commands: `auditctl -a always,exit -F arch=b64 -S execve -F a0=systemctl -F key=service_mod`\\n - OSQuery for Linux/macOS Monitoring\\n - Query modified services using OSQuery\\u2019s `processes` or `system_info` tables: `SELECT * FROM systemd_units WHERE state != 'running';`\\n - macOS Launch Daemon/Agent Modification\\n - Monitor for changes in:\\n - `/Library/LaunchDaemons/`\\n - `/Library/LaunchAgents/`\\n - Track modifications to `.plist` files indicating persistence attempts.\", \"diff\": \"--- \\n+++ \\n@@ -1,30 +1 @@\\n Changes made to an existing service or daemon, such as modifying the service name, start type, execution parameters, or security configurations.\\n-\\n-*Data Collection Measures: *\\n-\\n-- Windows Event Logs\\n- - Event ID 7040 - Detects modifications to the startup behavior of a service.\\n- - Event ID 7045 - Can capture changes made to existing services.\\n- - Event ID 7036 - Tracks when services start or stop, potentially indicating malicious tampering.\\n- - Event ID 4697 - Can detect when an adversary reinstalls a service with different parameters.\\n-- Sysmon Logs\\n- - Sysmon Event ID 13 - Detects changes to service configurations in the Windows Registry (e.g., `HKLM\\\\SYSTEM\\\\CurrentControlSet\\\\Services\\\\`).\\n- - Sysmon Event ID 1 - Can track execution of `sc.exe` or `PowerShell Set-Service`.\\n-- PowerShell Logging\\n- - Event ID 4104 (Script Block Logging) - Captures execution of commands like `Set-Service`, `New-Service`, or `sc config`.\\n- - Command-Line Logging (Event ID 4688) - Tracks usage of service modification commands:\\n- - `sc config start= auto` \\n- - `sc qc ` \\n-- Linux/macOS Collection Methods\\n- - Systemd Journals (`journalctl -u `) Tracks modifications to systemd service configurations.\\n- - Daemon Logs (`/var/log/syslog`, `/var/log/messages`, `/var/log/daemon.log`) Captures changes to service state and execution parameters.\\n- - AuditD Rules for Service Modification \\n- - Monitor modifications to `/etc/systemd/system/` for new or altered service unit files: `auditctl -w /etc/systemd/system/ -p wa -k service_modification`\\n- - Track execution of `systemctl` or `service` commands: `auditctl -a always,exit -F arch=b64 -S execve -F a0=systemctl -F key=service_mod`\\n- - OSQuery for Linux/macOS Monitoring\\n- - Query modified services using OSQuery\\u2019s `processes` or `system_info` tables: `SELECT * FROM systemd_units WHERE state != 'running';`\\n- - macOS Launch Daemon/Agent Modification\\n- - Monitor for changes in:\\n- - `/Library/LaunchDaemons/`\\n- - `/Library/LaunchAgents/`\\n- - Track modifications to `.plist` files indicating persistence attempts.\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1Changes made to an existing service or daemon, such as modift1Changes made to an existing service or daemon, such as modif
>ying the service name, start type, execution parameters, or >ying the service name, start type, execution parameters, or 
>security configurations.  *Data Collection Measures: *  - Wi>security configurations.
>ndows Event Logs     - Event ID 7040 - Detects modifications 
> to the startup behavior of a service.     - Event ID 7045 - 
> Can capture changes made to existing services.     - Event  
>ID 7036 - Tracks when services start or stop, potentially in 
>dicating malicious tampering.     - Event ID 4697 - Can dete 
>ct when an adversary reinstalls a service with different par 
>ameters. - Sysmon Logs     - Sysmon Event ID 13 - Detects ch 
>anges to service configurations in the Windows Registry (e.g 
>., `HKLM\\SYSTEM\\CurrentControlSet\\Services\\`).     - Sysmon  
>Event ID 1 - Can track execution of `sc.exe` or `PowerShell  
>Set-Service`. - PowerShell Logging     - Event ID 4104 (Scri 
>pt Block Logging) - Captures execution of commands like `Set 
>-Service`, `New-Service`, or `sc config`.     - Command-Line 
> Logging (Event ID 4688) - Tracks usage of service modificat 
>ion commands:         - `sc config <service_name> start= aut 
>o`           - `sc qc <service_name>`   - Linux/macOS Collec 
>tion Methods     - Systemd Journals (`journalctl -u <service 
>_name>`) Tracks modifications to systemd service configurati 
>ons.     - Daemon Logs (`/var/log/syslog`, `/var/log/message 
>s`, `/var/log/daemon.log`) Captures changes to service state 
> and execution parameters.     - AuditD Rules for Service Mo 
>dification          - Monitor modifications to `/etc/systemd 
>/system/` for new or altered service unit files: `auditctl - 
>w /etc/systemd/system/ -p wa -k service_modification`        
>  - Track execution of `systemctl` or `service` commands: `a 
>uditctl -a always,exit -F arch=b64 -S execve -F a0=systemctl 
> -F key=service_mod`     - OSQuery for Linux/macOS Monitorin 
>g         - Query modified services using OSQuery\u2019s `process 
>es` or `system_info` tables: `SELECT * FROM systemd_units WH 
>ERE state != 'running';`     - macOS Launch Daemon/Agent Mod 
>ification         - Monitor for changes in:             - `/ 
>Library/LaunchDaemons/`             - `/Library/LaunchAgents 
>/`         - Track modifications to `.plist` files indicatin 
>g persistence attempts. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--a953ca55-921a-44f7-9b8d-3d40141aa17e", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.271000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0002", + "external_id": "DC0002" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "User Account Authentication", + "description": "An attempt (successful and failed login attempts) by a user, service, or application to gain access to a network, system, or cloud-based resource. This typically involves credentials such as passwords, tokens, multi-factor authentication (MFA), or biometric validation.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "User Account", + "channel": "None" + }, + { + "name": "NSM:Flow", + "channel": "TGS-REQ and AS-REQ seen for new user shortly after domain-modifying process" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4625" + }, + { + "name": "saas:okta", + "channel": "session.impersonation.start" + }, + { + "name": "Okta:SystemLog", + "channel": "eventType: user.authentication.sso, app.oauth2.token.grant" + }, + { + "name": "azure:signinlogs", + "channel": "Success logs from high-risk accounts" + }, + { + "name": "networkdevice:syslog", + "channel": "config access, authentication logs" + }, + { + "name": "ESXiLogs:authlog", + "channel": "Unexpected login followed by encoding commands" + }, + { + "name": "saas:okta", + "channel": "Unusual OAuth app requesting message-read scopes for Slack/Teams/Jira" + }, + { + "name": "NSM:Connections", + "channel": "Accepted password or publickey for user from remote IP" + }, + { + "name": "macos:unifiedlog", + "channel": "successful sudo or authentication for account not normally associated with admin actions" + }, + { + "name": "esxi:vpxa", + "channel": "user login from unexpected IP or non-admin user role" + }, + { + "name": "m365:signinlogs", + "channel": "Sign-in from anomalous location or impossible travel condition" + }, + { + "name": "networkdevice:syslog", + "channel": "User privilege escalation to level 15/root prior to destructive commands" + }, + { + "name": "networkdevice:syslog", + "channel": "authorization/accounting logs" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4769, 1200, 1202" + }, + { + "name": "linux:syslog", + "channel": "sudo/date/timedatectl execution by non-standard users" + }, + { + "name": "saas:audit", + "channel": "Repeated requests to SMS-generating endpoints using anomalous or new user agents, IP ranges, or geographies." + }, + { + "name": "azure:signinlogs", + "channel": "Multiple MFA challenge requests without successful primary login" + }, + { + "name": "AWS:CloudTrail", + "channel": "AssumeRole or ConsoleLogin with repeated MFA failures followed by repeated MFA requests" + }, + { + "name": "auditd:AUTH", + "channel": "pam_unix or pam_google_authenticator invoked repeatedly within short interval" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4768, 4769, 4770" + }, + { + "name": "NSM:Connections", + "channel": "Repeated failed authentication attempts or replay patterns" + }, + { + "name": "azure:signinlogs", + "channel": "TokenIssued, TokenRenewed: Unexpected or anomalous token issuance events" + }, + { + "name": "azure:signinlogs", + "channel": "SignIn: Sign-ins flagged as atypical (new geographic region, unfamiliar device id) shortly after correlated endpoint/browser compromise times" + }, + { + "name": "AWS:CloudTrail", + "channel": "sts:GetFederationToken" + }, + { + "name": "m365:unified", + "channel": "Delegated permission grants without user login event" + }, + { + "name": "saas:salesforce", + "channel": "API login using access_token without login history" + }, + { + "name": "AWS:CloudTrail", + "channel": "AssumeRoleWithWebIdentity" + }, + { + "name": "azure:signinlogs", + "channel": "Operation=UserLogin" + }, + { + "name": "esxi:auth", + "channel": "interactive shell or SSH access preceding storage enumeration" + }, + { + "name": "NSM:Connections", + "channel": "Successful login without expected MFA challenge" + }, + { + "name": "macos:unifiedlog", + "channel": "Login success without MFA step" + }, + { + "name": "kubernetes:apiserver", + "channel": "get/list requests to /api/v1/secrets or /api/v1/namespaces/*/serviceaccounts" + }, + { + "name": "auditd:SYSCALL", + "channel": "pam_authenticate, sshd" + }, + { + "name": "macos:unifiedlog", + "channel": "log show --predicate 'eventMessage contains \"Authentication\"'" + }, + { + "name": "esxi:vpxd", + "channel": "/var/log/vmware/vpxd.log" + }, + { + "name": "azure:signinlogs", + "channel": "Unusual Token Usage or Application Consent" + }, + { + "name": "networkdevice:syslog", + "channel": "Failed and successful logins to network devices outside approved admin IP ranges" + }, + { + "name": "azure:signinlogs", + "channel": "OperationName=SetDomainAuthentication OR Set-FederatedDomain" + }, + { + "name": "network:auth", + "channel": "repeated successful authentications with previously unknown accounts or anomalous password acceptance" + }, + { + "name": "azure:signinlogs", + "channel": "Sign-in with unfamiliar location/device + portal navigation" + }, + { + "name": "m365:signinlogs", + "channel": "UserLoginSuccess" + }, + { + "name": "saas:salesforce", + "channel": "Login" + }, + { + "name": "networkdevice:syslog", + "channel": "Privileged login followed by destructive format command" + }, + { + "name": "networkdevice:syslog", + "channel": "admin login events" + }, + { + "name": "networkdevice:syslog", + "channel": "Privileged login followed by destructive command sequence" + }, + { + "name": "azure:signinlogs", + "channel": "Login from newly created account" + }, + { + "name": "auditd:SYSCALL", + "channel": "execution of ssh, scp, or sftp using previously unseen credentials or keys" + }, + { + "name": "m365:unified", + "channel": "login using refresh_token with no preceding authentication context" + }, + { + "name": "saas:googleworkspace", + "channel": "API access without user login" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4769" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4776, 4625" + }, + { + "name": "azure:signinlogs", + "channel": "Interactive/Non-Interactive Sign-In" + }, + { + "name": "AWS:CloudTrail", + "channel": "AWS IAM: ListUsers, ListRoles" + }, + { + "name": "gcp:workspaceaudit", + "channel": "Token Generation via Domain Delegation" + }, + { + "name": "m365:signinlogs", + "channel": "Unusual sign-in from service principal to user mailbox" + }, + { + "name": "macos:unifiedlog", + "channel": "User credential prompt events without associated trusted installer package" + }, + { + "name": "linux:auth", + "channel": "sshd login" + }, + { + "name": "saas:googleworkspace", + "channel": "Accessed third-party credential management service" + }, + { + "name": "azure:signinlogs", + "channel": "Reset password or download key from portal" + }, + { + "name": "linux:syslog", + "channel": "SSH failed login" + }, + { + "name": "macos:unifiedlog", + "channel": "Login failure / authorization denied" + }, + { + "name": "azure:signinlogs", + "channel": "status = failure" + }, + { + "name": "Okta:authn", + "channel": "authentication_failure" + }, + { + "name": "saas-app:auth", + "channel": "login_failure" + }, + { + "name": "networkdevice:syslog", + "channel": "AAA, RADIUS, or TACACS authentication" + }, + { + "name": "kubernetes:apiserver", + "channel": "authentication.k8s.io/v1beta1" + }, + { + "name": "m365:exchange", + "channel": "Logon failure" + }, + { + "name": "AWS:CloudTrail", + "channel": "eventName=ConsoleLogin | eventType=AwsConsoleSignIn" + }, + { + "name": "auditd:USER_LOGIN", + "channel": "USER_AUTH" + }, + { + "name": "azure:signinlogs", + "channel": "Sign-in logs" + }, + { + "name": "macos:unifiedlog", + "channel": "auth" + }, + { + "name": "m365:unified", + "channel": "Sign-in logs" + }, + { + "name": "AWS:CloudTrail", + "channel": "ConsoleLogin or AssumeRole" + }, + { + "name": "esxi:auth", + "channel": "/var/log/auth.log" + }, + { + "name": "networkdevice:syslog", + "channel": "authentication logs" + }, + { + "name": "azure:signinlogs", + "channel": "SigninSuccess" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4625, 4771, 4648" + }, + { + "name": "linux:syslog", + "channel": "Failed password for invalid user" + }, + { + "name": "macos:unifiedlog", + "channel": "Login Window and Authd errors" + }, + { + "name": "azure:signinlogs", + "channel": "Failure Reason + UserPrincipalName" + }, + { + "name": "saas:okta", + "channel": "authentication_failure" + }, + { + "name": "networkdevice:syslog", + "channel": "AAA or TACACS authentication failures" + }, + { + "name": "kubernetes:audit", + "channel": "Failed login" + }, + { + "name": "m365:exchange", + "channel": "FailedLogin" + }, + { + "name": "saas:auth", + "channel": "signin_failed" + }, + { + "name": "saas:googleworkspace", + "channel": "login with reused session token and mismatched user agent or IP" + }, + { + "name": "saas:googleworkspace", + "channel": "Access via OAuth credentials with unusual scopes or from anomalous IPs" + }, + { + "name": "networkdevice:syslog", + "channel": "authentication & authorization" + }, + { + "name": "azure:signinlogs", + "channel": "Sign-in activity" + }, + { + "name": "AWS:CloudTrail", + "channel": "ConsoleLogin, AssumeRole, ListAccessKeys, CreateUser" + }, + { + "name": "gcp:audit", + "channel": "drive.activity" + }, + { + "name": "gcp:audit", + "channel": "login.event" + }, + { + "name": "linux:syslog", + "channel": "sshd[pid]: Failed password" + }, + { + "name": "macos:unifiedlog", + "channel": "authd" + }, + { + "name": "networkdevice:syslog", + "channel": "login failed" + }, + { + "name": "GCPAuditLogs:login.googleapis.com", + "channel": "Failed sign-in events" + }, + { + "name": "esxi:auth", + "channel": "SSH session/login" + }, + { + "name": "NSM:Connections", + "channel": "sshd or PAM logins" + }, + { + "name": "saas:okta", + "channel": "Sign-in logs / audit events" + }, + { + "name": "gcp:audit", + "channel": "Sign-in logs / audit events" + }, + { + "name": "azure:signinlogs", + "channel": "Sign-in logs / audit events" + }, + { + "name": "kubernetes:audit", + "channel": "authentication.k8s.io" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4648" + }, + { + "name": "linux:syslog", + "channel": "authentication and authorization events during environmental validation phase" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-21 15:14:34.948000+00:00\"}, \"root['description']\": {\"new_value\": \"An attempt (successful and failed login attempts) by a user, service, or application to gain access to a network, system, or cloud-based resource. This typically involves credentials such as passwords, tokens, multi-factor authentication (MFA), or biometric validation.\", \"old_value\": \"An attempt (successful and failed login attempts) by a user, service, or application to gain access to a network, system, or cloud-based resource. This typically involves credentials such as passwords, tokens, multi-factor authentication (MFA), or biometric validation.\\n\\n*Data Collection Measures:*\\n\\n- Host-Based Authentication Logs\\n - Windows Event Logs\\n - Event ID 4776 \\u2013 NTLM authentication attempt.\\n - Event ID 4624 \\u2013 Successful user logon.\\n - Event ID 4625 \\u2013 Failed authentication attempt.\\n - Event ID 4648 \\u2013 Explicit logon with alternate credentials.\\n - Linux/macOS Authentication Logs\\n - `/var/log/auth.log`, `/var/log/secure` \\u2013 Logs SSH, sudo, and other authentication attempts.\\n - AuditD \\u2013 Tracks authentication events via PAM modules.\\n - macOS Unified Logs \\u2013 `/var/db/diagnostics` captures authentication failures.\\n- Cloud Authentication Logs\\n - Azure AD Logs\\n - Sign-in Logs \\u2013 Tracks authentication attempts, MFA challenges, and conditional access failures.\\n - Audit Logs \\u2013 Captures authentication-related configuration changes.\\n - Microsoft Graph API \\u2013 Provides real-time sign-in analytics.\\n - Google Workspace & Office 365\\n - Google Admin Console \\u2013 `User Login Report` tracks login attempts and failures.\\n - Office 365 Unified Audit Logs \\u2013 Captures logins across Exchange, SharePoint, and Teams.\\n - AWS CloudTrail & IAM\\n - Tracks authentication via `AWS IAM AuthenticateUser` and `sts:GetSessionToken`.\\n - Logs failed authentications to AWS Management Console and API requests.\\n- Container Authentication Monitoring\\n - Kubernetes Authentication Logs\\n - kubectl audit logs \\u2013 Captures authentication attempts for service accounts and admin users.\\n - Azure Kubernetes Service (AKS) and Google Kubernetes Engine (GKE) \\u2013 Logs IAM authentication events.\", \"diff\": \"--- \\n+++ \\n@@ -1,29 +1 @@\\n An attempt (successful and failed login attempts) by a user, service, or application to gain access to a network, system, or cloud-based resource. This typically involves credentials such as passwords, tokens, multi-factor authentication (MFA), or biometric validation.\\n-\\n-*Data Collection Measures:*\\n-\\n-- Host-Based Authentication Logs\\n- - Windows Event Logs\\n- - Event ID 4776 \\u2013 NTLM authentication attempt.\\n- - Event ID 4624 \\u2013 Successful user logon.\\n- - Event ID 4625 \\u2013 Failed authentication attempt.\\n- - Event ID 4648 \\u2013 Explicit logon with alternate credentials.\\n- - Linux/macOS Authentication Logs\\n- - `/var/log/auth.log`, `/var/log/secure` \\u2013 Logs SSH, sudo, and other authentication attempts.\\n- - AuditD \\u2013 Tracks authentication events via PAM modules.\\n- - macOS Unified Logs \\u2013 `/var/db/diagnostics` captures authentication failures.\\n-- Cloud Authentication Logs\\n- - Azure AD Logs\\n- - Sign-in Logs \\u2013 Tracks authentication attempts, MFA challenges, and conditional access failures.\\n- - Audit Logs \\u2013 Captures authentication-related configuration changes.\\n- - Microsoft Graph API \\u2013 Provides real-time sign-in analytics.\\n- - Google Workspace & Office 365\\n- - Google Admin Console \\u2013 `User Login Report` tracks login attempts and failures.\\n- - Office 365 Unified Audit Logs \\u2013 Captures logins across Exchange, SharePoint, and Teams.\\n- - AWS CloudTrail & IAM\\n- - Tracks authentication via `AWS IAM AuthenticateUser` and `sts:GetSessionToken`.\\n- - Logs failed authentications to AWS Management Console and API requests.\\n-- Container Authentication Monitoring\\n- - Kubernetes Authentication Logs\\n- - kubectl audit logs \\u2013 Captures authentication attempts for service accounts and admin users.\\n- - Azure Kubernetes Service (AKS) and Google Kubernetes Engine (GKE) \\u2013 Logs IAM authentication events.\"}, \"root['x_mitre_log_sources'][12]['name']\": {\"new_value\": \"m365:signinlogs\", \"old_value\": \"m365:signin\"}, \"root['x_mitre_log_sources'][15]['channel']\": {\"new_value\": \"EventCode=4776, 4625\", \"old_value\": \"EventCode=4769,1200,1202\", \"new_path\": \"root['x_mitre_log_sources'][52]['channel']\"}}, \"iterable_item_added\": {\"root['x_mitre_log_sources'][15]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4769, 1200, 1202\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][52]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4624, 4625\"}, \"root['x_mitre_log_sources'][70]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4625, 4624\"}, \"root['x_mitre_log_sources'][91]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"4624, 4625\"}, \"root['x_mitre_log_sources'][101]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventID=4625\"}}}", + "previous_version": "2.0", + "description_change_table": "\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n

Old Description
New Description
t1An attempt (successful and failed login attempts) by a user,t1An attempt (successful and failed login attempts) by a user,
> service, or application to gain access to a network, system> service, or application to gain access to a network, system
>, or cloud-based resource. This typically involves credentia>, or cloud-based resource. This typically involves credentia
>ls such as passwords, tokens, multi-factor authentication (M>ls such as passwords, tokens, multi-factor authentication (M
>FA), or biometric validation.  *Data Collection Measures:*  >FA), or biometric validation.
>- Host-Based Authentication Logs     - Windows Event Logs    
>      - Event ID 4776 \u2013 NTLM authentication attempt.         
> - Event ID 4624 \u2013 Successful user logon.         - Event ID 
> 4625 \u2013 Failed authentication attempt.         - Event ID 46 
>48 \u2013 Explicit logon with alternate credentials.     - Linux/ 
>macOS Authentication Logs         - `/var/log/auth.log`, `/v 
>ar/log/secure` \u2013 Logs SSH, sudo, and other authentication at 
>tempts.         - AuditD \u2013 Tracks authentication events via  
>PAM modules.         - macOS Unified Logs \u2013 `/var/db/diagnos 
>tics` captures authentication failures. - Cloud Authenticati 
>on Logs     - Azure AD Logs         - Sign-in Logs \u2013 Tracks  
>authentication attempts, MFA challenges, and conditional acc 
>ess failures.         - Audit Logs \u2013 Captures authentication 
>-related configuration changes.         - Microsoft Graph AP 
>I \u2013 Provides real-time sign-in analytics.     - Google Works 
>pace & Office 365         - Google Admin Console \u2013 `User Log 
>in Report` tracks login attempts and failures.         - Off 
>ice 365 Unified Audit Logs \u2013 Captures logins across Exchange 
>, SharePoint, and Teams.     - AWS CloudTrail & IAM          
>- Tracks authentication via `AWS IAM AuthenticateUser` and ` 
>sts:GetSessionToken`.         - Logs failed authentications  
>to AWS Management Console and API requests. - Container Auth 
>entication Monitoring     - Kubernetes Authentication Logs   
>       - kubectl audit logs \u2013 Captures authentication attemp 
>ts for service accounts and admin users.         - Azure Kub 
>ernetes Service (AKS) and Google Kubernetes Engine (GKE) \u2013 L 
>ogs IAM authentication events. 
" + }, + { + "type": "x-mitre-data-component", + "id": "x-mitre-data-component--da85d358-741a-410d-9433-20d6269a6170", + "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "created": "2021-10-20 15:05:19.273000+00:00", + "modified": "2025-11-12 22:03:39.105000+00:00", + "revoked": false, + "external_references": [ + { + "source_name": "mitre-attack", + "url": "https://attack.mitre.org/datacomponents/DC0063", + "external_id": "DC0063" + } + ], + "object_marking_refs": [ + "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" + ], + "name": "Windows Registry Key Modification", + "description": "Changes made to an existing registry key or its values. These modifications can include altering permissions, modifying stored data, or updating configuration settings.\n\n*Data Collection Measures:*\n\n- Windows Event Logs\n - Event ID 4657 - Registry Value Modified: Logs changes to registry values, including modifications to startup entries, security settings, or system configurations.\n- Sysmon (System Monitor) for Windows\n - Sysmon Event ID 13 - Registry Value Set: Captures changes to specific registry values.\n - Sysmon Event ID 14 - Registry Key & Value Renamed: Logs renaming of registry keys, which may indicate evasion attempts.\n- Endpoint Detection and Response (EDR) Solutions\n - Monitor registry modifications for suspicious behavior.", + "x_mitre_attack_spec_version": "3.3.0", + "x_mitre_deprecated": false, + "x_mitre_log_sources": [ + { + "name": "Windows Registry", + "channel": "None" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4657" + }, + { + "name": "WinEventLog:Security", + "channel": "EventCode=4663, 4670, 4656" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "StubPath value written under HKLM\\SOFTWARE\\Microsoft\\Active Setup\\Installed Components" + }, + { + "name": "m365:unified", + "channel": "MacroSecuritySettingsChanged or SafeModeDisabled" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "EventCode=13, 14" + }, + { + "name": "WinEventLog:Security", + "channel": "modification to Winlogon registry keys such as Shell, Notify, or Userinit" + }, + { + "name": "WinEventLog:Security", + "channel": "Registry key modification HKLM\\Software\\Policies\\Microsoft\\Windows NT\\DNSClient\\EnableMulticast" + }, + { + "name": "macos:unifiedlog", + "channel": "g_CiOptions modification or SIP state change" + }, + { + "name": "WinEventLog:Sysmon", + "channel": "Autoruns reports DLLs in AppInit_DLLs key" + } + ], + "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", + "x_mitre_version": "2.0", + "x_mitre_data_source_ref": "", + "x_mitre_domains": [ + "ics-attack", + "enterprise-attack" + ], + "detailed_diff": "{\"values_changed\": {\"root['modified']\": {\"new_value\": \"2025-11-12 22:03:39.105000+00:00\", \"old_value\": \"2025-10-22 18:34:46.572000+00:00\"}, \"root['external_references'][0]['url']\": {\"new_value\": \"https://attack.mitre.org/datacomponents/DC0063\", \"old_value\": \"https://attack.mitre.org/data-components/DC0063\"}, \"root['x_mitre_log_sources'][3]['channel']\": {\"new_value\": \"EventCode=4663, 4670, 4656\", \"old_value\": \"EventCode=4663\", \"new_path\": \"root['x_mitre_log_sources'][2]['channel']\"}}, \"iterable_item_removed\": {\"root['x_mitre_log_sources'][1]\": {\"name\": \"WinEventLog:Sysmon\", \"channel\": \"EventCode=13\"}, \"root['x_mitre_log_sources'][4]\": {\"name\": \"WinEventLog:Sysmon\", \"channel\": \"EventCode=14\"}, \"root['x_mitre_log_sources'][5]\": {\"name\": \"WinEventLog:Security\", \"channel\": \"EventCode=4670\"}}}", + "previous_version": "2.0" + } + ], + "revocations": [], + "deprecations": [], + "deletions": [] + }, + "detectionstrategies": { + "additions": [], + "major_version_changes": [], + "minor_version_changes": [], + "other_version_changes": [], + "patches": [], + "revocations": [], + "deprecations": [], + "deletions": [] + }, + "analytics": { + "additions": [], + "major_version_changes": [], + "minor_version_changes": [], + "other_version_changes": [], + "patches": [], + "revocations": [], + "deprecations": [], + "deletions": [] + } + }, + "new-contributors": [ + "Hajime Yanagishita, Macnica, Inc.", + "Suguru Ishimaru, ITOCHU Cyber & Intelligence Inc.", + "Wai Linn Oo @ Kernellix", + "Yusuke Niwa, ITOCHU Cyber & Intelligence Inc.", + "ZScaler ThreatLabz" + ] +} \ No newline at end of file diff --git a/modules/resources/docs/changelogs/v18.0-v18.1/layer-enterprise.json b/modules/resources/docs/changelogs/v18.0-v18.1/layer-enterprise.json new file mode 100644 index 00000000000..6a3b4a8f430 --- /dev/null +++ b/modules/resources/docs/changelogs/v18.0-v18.1/layer-enterprise.json @@ -0,0 +1,90 @@ +{ + "versions": { + "layer": "4.5", + "navigator": "5.0.0", + "attack": "18.1" + }, + "name": "November 2025 Enterprise Updates", + "description": "Enterprise updates for the November 2025 release of ATT&CK", + "domain": "enterprise-attack", + "techniques": [ + { + "techniqueID": "T1574.001", + "tactic": "persistence", + "enabled": true, + "color": "#B99095", + "comment": "patche" + }, + { + "techniqueID": "T1574.001", + "tactic": "privilege-escalation", + "enabled": true, + "color": "#B99095", + "comment": "patche" + }, + { + "techniqueID": "T1574.001", + "tactic": "defense-evasion", + "enabled": true, + "color": "#B99095", + "comment": "patche" + }, + { + "techniqueID": "T1564.006", + "tactic": "defense-evasion", + "enabled": true, + "color": "#B99095", + "comment": "patche" + }, + { + "techniqueID": "T1199", + "tactic": "initial-access", + "enabled": true, + "color": "#B99095", + "comment": "patche" + } + ], + "sorting": 0, + "hideDisabled": false, + "legendItems": [ + { + "color": "#a1d99b", + "label": "additions: ATT&CK objects which are only present in the new release." + }, + { + "color": "#fcf3a2", + "label": "major_version_changes: ATT&CK objects that have a major version change. (e.g. 1.0 \u2192 2.0)" + }, + { + "color": "#c7c4e0", + "label": "minor_version_changes: ATT&CK objects that have a minor version change. (e.g. 1.0 \u2192 1.1)" + }, + { + "color": "#B5E5CF", + "label": "other_version_changes: ATT&CK objects that have a version change of any other kind. (e.g. 1.0 \u2192 1.2)" + }, + { + "color": "#B99095", + "label": "patches: ATT&CK objects that have been patched while keeping the version the same. (e.g., 1.0 \u2192 1.0 but something like a typo, a URL, or some metadata was fixed)" + }, + { + "color": "#ff9000", + "label": "revocations: ATT&CK objects which are revoked by a different object." + }, + { + "color": "#ff6363", + "label": "deprecations: ATT&CK objects which are deprecated and no longer in use, and not replaced." + }, + { + "color": "#ff00e1", + "label": "deletions: ATT&CK objects which are no longer found in the STIX data." + }, + { + "color": "#ffffff", + "label": "unchanged: ATT&CK objects which did not change between the two versions." + } + ], + "showTacticRowBackground": true, + "tacticRowBackground": "#205b8f", + "selectTechniquesAcrossTactics": true +} \ No newline at end of file diff --git a/modules/resources/docs/changelogs/v18.0-v18.1/layer-ics.json b/modules/resources/docs/changelogs/v18.0-v18.1/layer-ics.json new file mode 100644 index 00000000000..401b2592bec --- /dev/null +++ b/modules/resources/docs/changelogs/v18.0-v18.1/layer-ics.json @@ -0,0 +1,54 @@ +{ + "versions": { + "layer": "4.5", + "navigator": "5.0.0", + "attack": "18.1" + }, + "name": "November 2025 ICS Updates", + "description": "ICS updates for the November 2025 release of ATT&CK", + "domain": "ics-attack", + "techniques": [], + "sorting": 0, + "hideDisabled": false, + "legendItems": [ + { + "color": "#a1d99b", + "label": "additions: ATT&CK objects which are only present in the new release." + }, + { + "color": "#fcf3a2", + "label": "major_version_changes: ATT&CK objects that have a major version change. (e.g. 1.0 \u2192 2.0)" + }, + { + "color": "#c7c4e0", + "label": "minor_version_changes: ATT&CK objects that have a minor version change. (e.g. 1.0 \u2192 1.1)" + }, + { + "color": "#B5E5CF", + "label": "other_version_changes: ATT&CK objects that have a version change of any other kind. (e.g. 1.0 \u2192 1.2)" + }, + { + "color": "#B99095", + "label": "patches: ATT&CK objects that have been patched while keeping the version the same. (e.g., 1.0 \u2192 1.0 but something like a typo, a URL, or some metadata was fixed)" + }, + { + "color": "#ff9000", + "label": "revocations: ATT&CK objects which are revoked by a different object." + }, + { + "color": "#ff6363", + "label": "deprecations: ATT&CK objects which are deprecated and no longer in use, and not replaced." + }, + { + "color": "#ff00e1", + "label": "deletions: ATT&CK objects which are no longer found in the STIX data." + }, + { + "color": "#ffffff", + "label": "unchanged: ATT&CK objects which did not change between the two versions." + } + ], + "showTacticRowBackground": true, + "tacticRowBackground": "#205b8f", + "selectTechniquesAcrossTactics": true +} \ No newline at end of file diff --git a/modules/resources/docs/changelogs/v18.0-v18.1/layer-mobile.json b/modules/resources/docs/changelogs/v18.0-v18.1/layer-mobile.json new file mode 100644 index 00000000000..7fc6ee3644d --- /dev/null +++ b/modules/resources/docs/changelogs/v18.0-v18.1/layer-mobile.json @@ -0,0 +1,62 @@ +{ + "versions": { + "layer": "4.5", + "navigator": "5.0.0", + "attack": "18.1" + }, + "name": "November 2025 Mobile Updates", + "description": "Mobile updates for the November 2025 release of ATT&CK", + "domain": "mobile-attack", + "techniques": [ + { + "techniqueID": "T1454", + "tactic": "collection", + "enabled": true, + "color": "#a1d99b", + "comment": "addition" + } + ], + "sorting": 0, + "hideDisabled": false, + "legendItems": [ + { + "color": "#a1d99b", + "label": "additions: ATT&CK objects which are only present in the new release." + }, + { + "color": "#fcf3a2", + "label": "major_version_changes: ATT&CK objects that have a major version change. (e.g. 1.0 \u2192 2.0)" + }, + { + "color": "#c7c4e0", + "label": "minor_version_changes: ATT&CK objects that have a minor version change. (e.g. 1.0 \u2192 1.1)" + }, + { + "color": "#B5E5CF", + "label": "other_version_changes: ATT&CK objects that have a version change of any other kind. (e.g. 1.0 \u2192 1.2)" + }, + { + "color": "#B99095", + "label": "patches: ATT&CK objects that have been patched while keeping the version the same. (e.g., 1.0 \u2192 1.0 but something like a typo, a URL, or some metadata was fixed)" + }, + { + "color": "#ff9000", + "label": "revocations: ATT&CK objects which are revoked by a different object." + }, + { + "color": "#ff6363", + "label": "deprecations: ATT&CK objects which are deprecated and no longer in use, and not replaced." + }, + { + "color": "#ff00e1", + "label": "deletions: ATT&CK objects which are no longer found in the STIX data." + }, + { + "color": "#ffffff", + "label": "unchanged: ATT&CK objects which did not change between the two versions." + } + ], + "showTacticRowBackground": true, + "tacticRowBackground": "#205b8f", + "selectTechniquesAcrossTactics": true +} \ No newline at end of file diff --git a/modules/resources/static_pages/updates-october-2025.md b/modules/resources/static_pages/updates-october-2025.md index dc7f6ae1be1..f9cb498f9f9 100644 --- a/modules/resources/static_pages/updates-october-2025.md +++ b/modules/resources/static_pages/updates-october-2025.md @@ -8,7 +8,7 @@ save_as: resources/updates/updates-october-2025/index.html | Version | Start Date | End Date | Data | Changelogs | |:--------|:-----------|:---------|:-----|:-----------| -| [ATT&CK v18](/versions/v18) | October 28, 2025 | Current version of ATT&CK | [v18.0 on MITRE/CTI](https://github.com/mitre/cti/releases/tag/ATT%26CK-v18.0) | 17.1 - 18.0 [Details](/docs/changelogs/v17.1-v18.0/changelog-detailed.html) ([JSON](/docs/changelogs/v17.1-v18.0/changelog.json)) | +| [ATT&CK v18](/versions/v18) | October 28, 2025 | Current version of ATT&CK | [v18.0 on MITRE/CTI](https://github.com/mitre/cti/releases/tag/ATT%26CK-v18.0)
[v18.1 on MITRE/CTI](https://github.com/mitre/cti/releases/tag/ATT%26CK-v18.1) | 17.1 - 18.0 [Details](/docs/changelogs/v17.1-v18.0/changelog-detailed.html) ([JSON](/docs/changelogs/v17.1-v18.0/changelog.json))
18.0 - 18.1 [Details](/docs/changelogs/v18.0-v18.1/changelog-detailed.html) ([JSON](/docs/changelogs/v18.0-v18.1/changelog.json)) | The October 2025 (v18) ATT&CK release updates Techniques, Groups, Campaigns and Software for Enterprise, Mobile, and ICS. @@ -20,13 +20,13 @@ This release also includes a [human-readable detailed changelog](/docs/changelog ## Statistics -This version of ATT&CK contains 910 Software, 176 Groups, and 55 Campaigns. +This version of ATT&CK contains 910 Pieces of Software, 176 Groups, and 55 Campaigns. Broken out by domain: -* Enterprise: 14 Tactics, 216 Techniques, 475 Sub-Techniques, 172 Groups, 784 Software, 52 Campaigns, 44 Mitigations, 691 Detection Strategies, 1739 Analytics, and 106 Data Components -* Mobile: 12 Tactics, 77 Techniques, 47 Sub-Techniques, 17 Groups, 122 Software, 3 Campaigns, 13 Mitigations, 124 Detection Strategies, 211 Analytics, and 17 Data Components -* ICS: 12 Tactics, 83 Techniques, 14 Groups, 23 Software, 7 Campaigns, 52 Mitigations, 18 Assets, 83 Detection Strategies, 82 Analytics, and 36 Data Components +* Enterprise: 14 Tactics, 216 Techniques, 475 Sub-Techniques, 172 Groups, 784 Pieces of Software, 52 Campaigns, 44 Mitigations, 691 Detection Strategies, 1739 Analytics, and 106 Data Components +* Mobile: 12 Tactics, 77 Techniques, 47 Sub-Techniques, 17 Groups, 122 Pieces of Software, 3 Campaigns, 13 Mitigations, 124 Detection Strategies, 211 Analytics, and 17 Data Components +* ICS: 12 Tactics, 83 Techniques, 14 Groups, 23 Pieces of Software, 7 Campaigns, 52 Mitigations, 18 Assets, 83 Detection Strategies, 82 Analytics, and 36 Data Components ## Release Notes Terminology diff --git a/pyproject.toml b/pyproject.toml index 66f3f8bc9ca..e67ffb24f66 100644 --- a/pyproject.toml +++ b/pyproject.toml @@ -6,7 +6,7 @@ profile = "black" [tool.towncrier] name = "ATT&CK website" - version = "4.4.0" + version = "4.4.1" filename = "CHANGELOG.md" issue_format = "[#{issue}](https://github.com/mitre-attack/attack-website/issues/{issue})" template = ".towncrier.template.md" diff --git a/requirements.txt b/requirements.txt index 89e7b67bea1..0b9dc8e9c63 100644 --- a/requirements.txt +++ b/requirements.txt @@ -4,7 +4,7 @@ bleach==6.1.0 colorama==0.4.6 future==1.0.0 loguru==0.7.2 -mitreattack-python==5.2.1 +mitreattack-python==5.3.0 pelican==4.10.2 python-dotenv==1.0.1 requests==2.32.3