Files
cti/enterprise-attack/attack-pattern/attack-pattern--4a6cfdae-1417-40c7-a84e-f59d21c58266.json
2026-04-27 15:21:34 -04:00

54 lines
2.9 KiB
JSON

{
"type": "bundle",
"id": "bundle--9525634f-a591-483e-803d-300aaee874b3",
"spec_version": "2.0",
"objects": [
{
"type": "attack-pattern",
"id": "attack-pattern--4a6cfdae-1417-40c7-a84e-f59d21c58266",
"created": "2025-05-22T18:57:47.616Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"revoked": false,
"external_references": [
{
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/techniques/T1518/002",
"external_id": "T1518.002"
},
{
"source_name": "Symantec Play Ransomware 2023",
"description": "Symantec Threat Hunter Team. (2023, April 19). Play Ransomware Group Using New Custom Data-Gathering Tools. Retrieved May 22, 2025.",
"url": "https://www.security.com/threat-intelligence/play-ransomware-volume-shadow-copy"
}
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"modified": "2025-10-22T03:53:48.786Z",
"name": "Backup Software Discovery",
"description": "Adversaries may attempt to get a listing of backup software or configurations that are installed on a system. Adversaries may use this information to shape follow-on behaviors, such as [Data Destruction](https://attack.mitre.org/techniques/T1485), [Inhibit System Recovery](https://attack.mitre.org/techniques/T1490), or [Data Encrypted for Impact](https://attack.mitre.org/techniques/T1486). \n\nCommands that can be used to obtain security software information are [netsh](https://attack.mitre.org/software/S0108), `reg query` with [Reg](https://attack.mitre.org/software/S0075), `dir` with [cmd](https://attack.mitre.org/software/S0106), and [Tasklist](https://attack.mitre.org/software/S0057), but other indicators of discovery behavior may be more specific to the type of software or security system the adversary is looking for, such as Veeam, Acronis, Dropbox, or Paragon.(Citation: Symantec Play Ransomware 2023)",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "discovery"
}
],
"x_mitre_attack_spec_version": "3.3.0",
"x_mitre_contributors": [
"Florian Heigl"
],
"x_mitre_deprecated": false,
"x_mitre_domains": [
"enterprise-attack"
],
"x_mitre_is_subtechnique": true,
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_platforms": [
"Windows",
"macOS",
"Linux"
],
"x_mitre_version": "1.0"
}
]
}