Files
cti/enterprise-attack/attack-pattern/attack-pattern--322bad5a-1c49-4d23-ab79-76d641794afa.json
T
2018-01-17 16:00:03 -05:00

44 lines
2.5 KiB
JSON

{
"type": "bundle",
"id": "bundle--a6b17af3-8a98-4b85-b52f-1f09ef793f75",
"spec_version": "2.0",
"objects": [
{
"type": "attack-pattern",
"id": "attack-pattern--322bad5a-1c49-4d23-ab79-76d641794afa",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"created": "2017-05-31T21:30:21.315Z",
"modified": "2018-01-17T12:56:55.080Z",
"name": "System Service Discovery",
"description": "Adversaries may try to get information about registered services. Commands that may obtain information about services using operating system utilities are \"sc,\" \"tasklist /svc\" using Tasklist, and \"net start\" using Net, but adversaries may also use other tools as well.\n\nDetection: System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained.\n\nMonitor processes and command-line arguments for actions that could be taken to gather system information related to services. Remote access tools with built-in features may interact directly with the Windows API to gather information. Information may also be acquired through Windows system management tools such as Windows Management Instrumentation and PowerShell.\n\nPlatforms: Windows\n\nData Sources: Process command-line parameters, Process monitoring\n\nPermissions Required: User, Administrator, SYSTEM",
"kill_chain_phases": [
{
"kill_chain_name": "mitre-attack",
"phase_name": "discovery"
}
],
"external_references": [
{
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/wiki/Technique/T1007",
"external_id": "T1007"
}
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"x_mitre_data_sources": [
"Process command-line parameters",
"Process monitoring"
],
"x_mitre_permissions_required": [
"User",
"Administrator",
"SYSTEM"
],
"x_mitre_platforms": [
"Windows"
]
}
]
}