Merge PR #5966 from @nasbench - Update mitre tags to use attack v19
chore: update mitre tags to use attack v19
This commit is contained in:
committed by
GitHub
parent
0e3b749e0d
commit
34c5d66c22
@@ -10,8 +10,8 @@ date: 2017-07-20
|
||||
modified: 2021-11-27
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.stealth
|
||||
- attack.t1059.003
|
||||
- attack.defense-evasion
|
||||
- attack.t1218.011
|
||||
- attack.s0412
|
||||
- attack.g0001
|
||||
|
||||
@@ -10,7 +10,7 @@ modified: 2025-10-19
|
||||
tags:
|
||||
- attack.privilege-escalation
|
||||
- attack.persistence
|
||||
- attack.defense-evasion
|
||||
- attack.stealth
|
||||
- attack.g0010
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
|
||||
+1
-1
@@ -9,7 +9,7 @@ author: Florian Roth (Nextron Systems)
|
||||
date: 2018-02-22
|
||||
modified: 2021-11-27
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.stealth
|
||||
- attack.t1036.005
|
||||
- cve.2015-1641
|
||||
- detection.emerging-threats
|
||||
|
||||
@@ -10,7 +10,7 @@ date: 2017-06-03
|
||||
modified: 2021-11-27
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.defense-evasion
|
||||
- attack.stealth
|
||||
- attack.t1218.011
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
+1
-1
@@ -8,8 +8,8 @@ author: John Lambert (tech), Florian Roth (Nextron Systems)
|
||||
date: 2017-03-04
|
||||
modified: 2021-11-27
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.privilege-escalation
|
||||
- attack.stealth
|
||||
- attack.t1055
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
@@ -9,9 +9,10 @@ author: Florian Roth (Nextron Systems), Tom Ueltschi
|
||||
date: 2019-01-16
|
||||
modified: 2022-12-15
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.stealth
|
||||
- attack.defense-impairment
|
||||
- attack.t1218.011
|
||||
- attack.t1070.001
|
||||
- attack.t1685.005
|
||||
- attack.credential-access
|
||||
- attack.t1003.001
|
||||
- car.2016-04-002
|
||||
|
||||
+2
-1
@@ -11,8 +11,9 @@ modified: 2023-02-03
|
||||
tags:
|
||||
- attack.privilege-escalation
|
||||
- attack.persistence
|
||||
- attack.execution
|
||||
- attack.stealth
|
||||
- attack.s0013
|
||||
- attack.defense-evasion
|
||||
- attack.t1574.001
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
@@ -10,10 +10,10 @@ date: 2019-01-16
|
||||
modified: 2025-10-18
|
||||
tags:
|
||||
- attack.lateral-movement
|
||||
- attack.defense-impairment
|
||||
- attack.t1210
|
||||
- attack.discovery
|
||||
- attack.t1083
|
||||
- attack.defense-evasion
|
||||
- attack.t1222.001
|
||||
- attack.impact
|
||||
- attack.t1486
|
||||
|
||||
@@ -8,7 +8,7 @@ author: Florian Roth (Nextron Systems)
|
||||
date: 2017-10-22
|
||||
modified: 2023-05-02
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.stealth
|
||||
- attack.g0035
|
||||
- attack.t1036.003
|
||||
- car.2013-05-009
|
||||
|
||||
+1
-1
@@ -8,7 +8,7 @@ author: Trent Liffick (@tliffick), Bartlomiej Czyz (@bczyz1)
|
||||
date: 2020-06-03
|
||||
modified: 2023-03-10
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.stealth
|
||||
- attack.t1036.005
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
@@ -12,7 +12,8 @@ modified: 2023-03-09
|
||||
tags:
|
||||
- attack.privilege-escalation
|
||||
- attack.persistence
|
||||
- attack.defense-evasion
|
||||
- attack.execution
|
||||
- attack.stealth
|
||||
- attack.t1574.001
|
||||
- attack.g0027
|
||||
- detection.emerging-threats
|
||||
|
||||
@@ -10,8 +10,8 @@ author: Florian Roth (Nextron Systems), Jonhnathan Ribeiro, oscd.community
|
||||
date: 2018-03-01
|
||||
modified: 2023-05-31
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.execution
|
||||
- attack.stealth
|
||||
- attack.g0007
|
||||
- attack.t1059.003
|
||||
- attack.t1218.011
|
||||
|
||||
+1
-1
@@ -12,7 +12,7 @@ author: '@41thexplorer'
|
||||
date: 2018-11-20
|
||||
modified: 2023-02-20
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.stealth
|
||||
- attack.t1218.011
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
+1
-1
@@ -13,8 +13,8 @@ author: Florian Roth (Nextron Systems), @41thexplorer
|
||||
date: 2018-11-20
|
||||
modified: 2023-03-08
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.execution
|
||||
- attack.stealth
|
||||
- attack.t1218.011
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
+1
-1
@@ -10,7 +10,7 @@ date: 2019-04-14
|
||||
modified: 2023-09-28
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.defense-evasion
|
||||
- attack.defense-impairment
|
||||
- attack.t1112
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
+1
-1
@@ -7,8 +7,8 @@ references:
|
||||
author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023-03-10
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.execution
|
||||
- attack.stealth
|
||||
- attack.g0069
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
@@ -18,11 +18,11 @@ tags:
|
||||
- attack.privilege-escalation
|
||||
- attack.execution
|
||||
- attack.persistence
|
||||
- attack.defense-impairment
|
||||
- attack.g0049
|
||||
- attack.t1053.005
|
||||
- attack.s0111
|
||||
- attack.t1543.003
|
||||
- attack.defense-evasion
|
||||
- attack.t1112
|
||||
- attack.command-and-control
|
||||
- attack.t1071.004
|
||||
|
||||
@@ -18,11 +18,11 @@ tags:
|
||||
- attack.privilege-escalation
|
||||
- attack.execution
|
||||
- attack.persistence
|
||||
- attack.defense-impairment
|
||||
- attack.g0049
|
||||
- attack.t1053.005
|
||||
- attack.s0111
|
||||
- attack.t1543.003
|
||||
- attack.defense-evasion
|
||||
- attack.t1112
|
||||
- attack.command-and-control
|
||||
- attack.t1071.004
|
||||
|
||||
@@ -18,11 +18,11 @@ tags:
|
||||
- attack.privilege-escalation
|
||||
- attack.execution
|
||||
- attack.persistence
|
||||
- attack.defense-impairment
|
||||
- attack.g0049
|
||||
- attack.t1053.005
|
||||
- attack.s0111
|
||||
- attack.t1543.003
|
||||
- attack.defense-evasion
|
||||
- attack.t1112
|
||||
- attack.command-and-control
|
||||
- attack.t1071.004
|
||||
|
||||
@@ -18,11 +18,11 @@ tags:
|
||||
- attack.privilege-escalation
|
||||
- attack.execution
|
||||
- attack.persistence
|
||||
- attack.defense-impairment
|
||||
- attack.g0049
|
||||
- attack.t1053.005
|
||||
- attack.s0111
|
||||
- attack.t1543.003
|
||||
- attack.defense-evasion
|
||||
- attack.t1112
|
||||
- attack.command-and-control
|
||||
- attack.t1071.004
|
||||
|
||||
+1
-1
@@ -9,8 +9,8 @@ date: 2019-11-15
|
||||
modified: 2021-11-27
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.defense-evasion
|
||||
- attack.privilege-escalation
|
||||
- attack.stealth
|
||||
- attack.t1068
|
||||
- attack.execution
|
||||
- attack.t1059.003
|
||||
|
||||
-1
@@ -13,7 +13,6 @@ author: Florian Roth (Nextron Systems)
|
||||
date: 2019-10-15
|
||||
modified: 2022-11-26
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.privilege-escalation
|
||||
- attack.t1068
|
||||
- attack.t1548.003
|
||||
|
||||
-1
@@ -10,7 +10,6 @@ author: Florian Roth (Nextron Systems)
|
||||
date: 2019-10-15
|
||||
modified: 2022-10-05
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.privilege-escalation
|
||||
- attack.t1068
|
||||
- attack.t1548.003
|
||||
|
||||
+1
-1
@@ -9,8 +9,8 @@ date: 2019-02-24
|
||||
modified: 2023-03-08
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.defense-evasion
|
||||
- attack.discovery
|
||||
- attack.stealth
|
||||
- attack.t1012
|
||||
- attack.t1059.003
|
||||
- attack.t1059.001
|
||||
|
||||
@@ -9,8 +9,8 @@ author: Florian Roth (Nextron Systems), oscd.community, Nasreddine Bencherchali
|
||||
date: 2019-01-10
|
||||
modified: 2023-02-03
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.privilege-escalation
|
||||
- attack.stealth
|
||||
- attack.t1055
|
||||
- attack.discovery
|
||||
- attack.t1135
|
||||
|
||||
@@ -12,8 +12,8 @@ date: 2019-09-30
|
||||
modified: 2023-02-04
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.stealth
|
||||
- attack.t1059.001
|
||||
- attack.defense-evasion
|
||||
- attack.t1027
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
@@ -10,8 +10,8 @@ date: 2019-02-13
|
||||
modified: 2025-10-22
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.defense-evasion
|
||||
- attack.execution
|
||||
- attack.defense-impairment
|
||||
- attack.t1112
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
+1
-1
@@ -8,7 +8,7 @@ author: Florian Roth (Nextron Systems), Tim Shelton, Nasreddine Bencherchali (Ne
|
||||
date: 2019-10-02
|
||||
modified: 2023-03-29
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.stealth
|
||||
- attack.t1218.010
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
@@ -9,7 +9,7 @@ author: Markus Neis, Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2019-04-02
|
||||
modified: 2023-03-09
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.stealth
|
||||
- attack.t1218.010
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
+1
-1
@@ -9,8 +9,8 @@ author: Florian Roth (Nextron Systems)
|
||||
date: 2019-03-04
|
||||
modified: 2023-03-09
|
||||
tags:
|
||||
- attack.stealth
|
||||
- attack.g0020
|
||||
- attack.defense-evasion
|
||||
- attack.t1218.011
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
@@ -15,8 +15,8 @@ tags:
|
||||
- attack.privilege-escalation
|
||||
- attack.persistence
|
||||
- attack.discovery
|
||||
- attack.stealth
|
||||
- attack.t1012
|
||||
- attack.defense-evasion
|
||||
- attack.t1036.004
|
||||
- attack.t1027
|
||||
- attack.execution
|
||||
|
||||
@@ -13,8 +13,8 @@ tags:
|
||||
- attack.privilege-escalation
|
||||
- attack.persistence
|
||||
- attack.discovery
|
||||
- attack.stealth
|
||||
- attack.t1012
|
||||
- attack.defense-evasion
|
||||
- attack.t1036.004
|
||||
- attack.t1027
|
||||
- attack.execution
|
||||
|
||||
+1
-1
@@ -12,7 +12,7 @@ modified: 2024-03-25
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.execution
|
||||
- attack.defense-evasion
|
||||
- attack.defense-impairment
|
||||
- attack.t1112
|
||||
- cve.2020-1048
|
||||
- detection.emerging-threats
|
||||
|
||||
+1
-1
@@ -12,8 +12,8 @@ date: 2020-05-14
|
||||
modified: 2022-10-09
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.defense-evasion
|
||||
- attack.execution
|
||||
- attack.defense-impairment
|
||||
- attack.t1112
|
||||
- attack.t1047
|
||||
- detection.emerging-threats
|
||||
|
||||
+1
-1
@@ -11,9 +11,9 @@ author: Trent Liffick (@tliffick)
|
||||
date: 2020-05-14
|
||||
modified: 2023-08-17
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.execution
|
||||
- attack.persistence
|
||||
- attack.defense-impairment
|
||||
- attack.t1112
|
||||
- attack.t1047
|
||||
- detection.emerging-threats
|
||||
|
||||
@@ -8,7 +8,6 @@ author: Florian Roth (Nextron Systems)
|
||||
date: 2020-05-26
|
||||
modified: 2024-02-26
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.command-and-control
|
||||
- attack.t1071.001
|
||||
- attack.g0010
|
||||
|
||||
+1
-1
@@ -9,7 +9,7 @@ author: FPT.EagleEye
|
||||
date: 2020-12-25
|
||||
modified: 2023-02-21
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.stealth
|
||||
- attack.t1218.011
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
+1
-1
@@ -10,8 +10,8 @@ author: NVISO
|
||||
date: 2020-06-09
|
||||
modified: 2024-03-20
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.persistence
|
||||
- attack.defense-impairment
|
||||
- attack.t1112
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
+2
-2
@@ -9,9 +9,9 @@ author: Markus Neis, Swisscom
|
||||
date: 2020-06-18
|
||||
modified: 2023-03-10
|
||||
tags:
|
||||
- attack.defense-impairment
|
||||
- attack.g0004
|
||||
- attack.defense-evasion
|
||||
- attack.t1562.001
|
||||
- attack.t1685
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
category: process_creation
|
||||
|
||||
@@ -9,7 +9,7 @@ author: Florian Roth (Nextron Systems)
|
||||
date: 2020-07-10
|
||||
modified: 2023-03-09
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.stealth
|
||||
- attack.t1218.011
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
@@ -8,12 +8,12 @@ author: Florian Roth (Nextron Systems)
|
||||
date: 2020-05-20
|
||||
modified: 2023-03-09
|
||||
tags:
|
||||
- attack.stealth
|
||||
- attack.g0049
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
- attack.command-and-control
|
||||
- attack.t1105
|
||||
- attack.defense-evasion
|
||||
- attack.t1036.005
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
@@ -9,8 +9,8 @@ date: 2020-07-30
|
||||
modified: 2021-11-27
|
||||
tags:
|
||||
- attack.privilege-escalation
|
||||
- attack.defense-evasion
|
||||
- attack.execution
|
||||
- attack.stealth
|
||||
- attack.t1055.001
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
@@ -10,7 +10,8 @@ modified: 2021-11-27
|
||||
tags:
|
||||
- attack.privilege-escalation
|
||||
- attack.persistence
|
||||
- attack.defense-evasion
|
||||
- attack.execution
|
||||
- attack.stealth
|
||||
- attack.t1574.001
|
||||
- attack.g0044
|
||||
- detection.emerging-threats
|
||||
|
||||
@@ -10,7 +10,8 @@ modified: 2021-11-27
|
||||
tags:
|
||||
- attack.privilege-escalation
|
||||
- attack.persistence
|
||||
- attack.defense-evasion
|
||||
- attack.execution
|
||||
- attack.stealth
|
||||
- attack.t1574.001
|
||||
- attack.g0044
|
||||
- detection.emerging-threats
|
||||
|
||||
+1
-1
@@ -10,8 +10,8 @@ author: Sittikorn S, Nuttakorn T, Tim Shelton
|
||||
date: 2021-07-01
|
||||
modified: 2023-10-23
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.privilege-escalation
|
||||
- attack.stealth
|
||||
- attack.t1055
|
||||
- detection.emerging-threats
|
||||
- cve.2021-34527
|
||||
|
||||
+2
-1
@@ -10,8 +10,9 @@ date: 2021-07-01
|
||||
modified: 2023-02-17
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.defense-evasion
|
||||
- attack.privilege-escalation
|
||||
- attack.execution
|
||||
- attack.stealth
|
||||
- attack.t1574
|
||||
- cve.2021-1675
|
||||
- detection.emerging-threats
|
||||
|
||||
+2
-1
@@ -11,8 +11,9 @@ date: 2021-06-29
|
||||
modified: 2022-06-02
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.defense-evasion
|
||||
- attack.privilege-escalation
|
||||
- attack.execution
|
||||
- attack.stealth
|
||||
- attack.t1574
|
||||
- cve.2021-1675
|
||||
- cve.2021-34527
|
||||
|
||||
-1
@@ -8,7 +8,6 @@ author: Sreeman
|
||||
date: 2022-01-26
|
||||
modified: 2024-09-11
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.privilege-escalation
|
||||
- attack.t1548.001
|
||||
- detection.emerging-threats
|
||||
|
||||
+1
-1
@@ -11,9 +11,9 @@ date: 2022-06-02
|
||||
modified: 2023-02-04
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.defense-evasion
|
||||
- cve.2021-40444
|
||||
- detection.emerging-threats
|
||||
- attack.stealth
|
||||
logsource:
|
||||
product: windows
|
||||
category: process_creation
|
||||
|
||||
+1
-1
@@ -9,8 +9,8 @@ date: 2021-12-22
|
||||
modified: 2022-12-25
|
||||
tags:
|
||||
- attack.privilege-escalation
|
||||
- attack.defense-evasion
|
||||
- attack.persistence
|
||||
- attack.stealth
|
||||
- attack.t1036
|
||||
- attack.t1098
|
||||
- cve.2021-42287
|
||||
|
||||
+1
-1
@@ -9,8 +9,8 @@ author: Florian Roth (Nextron Systems), Maxime Thiebaut
|
||||
date: 2021-08-23
|
||||
modified: 2024-12-01
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.privilege-escalation
|
||||
- attack.defense-impairment
|
||||
- attack.t1553
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
+1
-1
@@ -9,8 +9,8 @@ date: 2022-02-25
|
||||
modified: 2023-02-08
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.defense-evasion
|
||||
- attack.impact
|
||||
- attack.stealth
|
||||
- attack.t1485
|
||||
- attack.t1498
|
||||
- attack.t1059.001
|
||||
|
||||
+1
-1
@@ -13,7 +13,7 @@ date: 2022-01-24
|
||||
modified: 2025-10-21
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.defense-evasion
|
||||
- attack.defense-impairment
|
||||
- attack.t1112
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
+1
-1
@@ -7,8 +7,8 @@ references:
|
||||
author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023-05-15
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- detection.emerging-threats
|
||||
- attack.stealth
|
||||
logsource:
|
||||
product: windows
|
||||
category: file_event
|
||||
|
||||
+1
-1
@@ -12,7 +12,7 @@ author: Nasreddine Bencherchali (Nextron Systems), NCSC (Idea)
|
||||
date: 2023-05-15
|
||||
modified: 2025-10-19
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.stealth
|
||||
- attack.t1218
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
+1
-1
@@ -8,8 +8,8 @@ author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023-05-14
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.defense-evasion
|
||||
- detection.emerging-threats
|
||||
- attack.stealth
|
||||
logsource:
|
||||
product: windows
|
||||
category: file_event
|
||||
|
||||
+1
-1
@@ -7,8 +7,8 @@ references:
|
||||
author: X__Junior (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023-05-15
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- detection.emerging-threats
|
||||
- attack.stealth
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
|
||||
@@ -13,7 +13,7 @@ date: 2021-10-07
|
||||
modified: 2025-11-03
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.defense-evasion
|
||||
- attack.defense-impairment
|
||||
- attack.t1112
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
+2
-1
@@ -15,8 +15,9 @@ date: 2021-05-05
|
||||
modified: 2023-02-17
|
||||
tags:
|
||||
- attack.privilege-escalation
|
||||
- attack.defense-evasion
|
||||
- attack.persistence
|
||||
- attack.execution
|
||||
- attack.stealth
|
||||
- attack.t1574.001
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
+2
-1
@@ -15,8 +15,9 @@ date: 2021-05-05
|
||||
modified: 2023-02-17
|
||||
tags:
|
||||
- attack.privilege-escalation
|
||||
- attack.defense-evasion
|
||||
- attack.persistence
|
||||
- attack.execution
|
||||
- attack.stealth
|
||||
- attack.t1574.001
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
+2
-1
@@ -15,8 +15,9 @@ date: 2021-05-05
|
||||
modified: 2023-02-17
|
||||
tags:
|
||||
- attack.privilege-escalation
|
||||
- attack.defense-evasion
|
||||
- attack.persistence
|
||||
- attack.execution
|
||||
- attack.stealth
|
||||
- attack.t1574.001
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
+1
-1
@@ -7,7 +7,7 @@ references:
|
||||
author: Nasreddine Bencherchali (Nextron Systems), X__Junior (Nextron Systems)
|
||||
date: 2023-05-19
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.stealth
|
||||
- attack.t1036.005
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
+2
-1
@@ -8,8 +8,9 @@ author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023-05-19
|
||||
tags:
|
||||
- attack.privilege-escalation
|
||||
- attack.defense-evasion
|
||||
- attack.persistence
|
||||
- attack.execution
|
||||
- attack.stealth
|
||||
- attack.t1574.001
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
@@ -8,8 +8,8 @@ author: Florian Roth (Nextron Systems)
|
||||
date: 2021-09-07
|
||||
modified: 2022-10-09
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.privilege-escalation
|
||||
- attack.stealth
|
||||
- attack.t1055
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
+1
-1
@@ -9,7 +9,7 @@ author: Sittikorn S
|
||||
date: 2020-05-31
|
||||
modified: 2023-08-17
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.stealth
|
||||
- attack.t1221
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
+1
-1
@@ -7,8 +7,8 @@ references:
|
||||
author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2022-09-27
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.execution
|
||||
- attack.stealth
|
||||
- attack.t1218.011
|
||||
- attack.t1059.001
|
||||
- detection.emerging-threats
|
||||
|
||||
+1
-1
@@ -10,9 +10,9 @@ author: Nasreddine Bencherchali (Nextron Systems), X__Junior (Nextron Systems)
|
||||
date: 2023-07-13
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.defense-evasion
|
||||
- cve.2023-36884
|
||||
- detection.emerging-threats
|
||||
- attack.stealth
|
||||
logsource:
|
||||
category: file_event
|
||||
product: windows
|
||||
|
||||
+1
-1
@@ -8,8 +8,8 @@ author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023-04-30
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.defense-evasion
|
||||
- detection.emerging-threats
|
||||
- attack.stealth
|
||||
logsource:
|
||||
category: file_event
|
||||
product: windows
|
||||
|
||||
+1
-1
@@ -8,8 +8,8 @@ author: X__Junior (Nextron Systems)
|
||||
date: 2023-04-30
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.defense-evasion
|
||||
- detection.emerging-threats
|
||||
- attack.stealth
|
||||
logsource:
|
||||
category: file_event
|
||||
product: windows
|
||||
|
||||
+1
-1
@@ -9,8 +9,8 @@ author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023-05-02
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.defense-evasion
|
||||
- detection.emerging-threats
|
||||
- attack.stealth
|
||||
logsource:
|
||||
product: windows
|
||||
category: image_load
|
||||
|
||||
+1
-1
@@ -8,8 +8,8 @@ author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023-04-30
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.defense-evasion
|
||||
- detection.emerging-threats
|
||||
- attack.stealth
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
|
||||
+1
-1
@@ -8,8 +8,8 @@ author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023-04-30
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.defense-evasion
|
||||
- detection.emerging-threats
|
||||
- attack.stealth
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
|
||||
+1
-1
@@ -8,8 +8,8 @@ author: X__Junior (Nextron Systems)
|
||||
date: 2023-04-30
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.defense-evasion
|
||||
- detection.emerging-threats
|
||||
- attack.stealth
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
|
||||
+1
-1
@@ -7,9 +7,9 @@ references:
|
||||
author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023-05-02
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.persistence
|
||||
- detection.emerging-threats
|
||||
- attack.stealth
|
||||
logsource:
|
||||
product: windows
|
||||
service: system
|
||||
|
||||
+1
-1
@@ -10,7 +10,7 @@ author: '@kostastsale'
|
||||
date: 2023-08-07
|
||||
tags:
|
||||
- attack.privilege-escalation
|
||||
- attack.defense-evasion
|
||||
- attack.stealth
|
||||
- attack.t1055
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
+1
-1
@@ -8,7 +8,7 @@ references:
|
||||
author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023-08-31
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.stealth
|
||||
- attack.t1218.011
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
+1
-1
@@ -11,9 +11,9 @@ references:
|
||||
author: Alejandro Houspanossian ('@lekz86')
|
||||
date: 2024-01-02
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.command-and-control
|
||||
- attack.execution
|
||||
- attack.stealth
|
||||
- attack.t1059.003
|
||||
- attack.t1105
|
||||
- attack.t1218
|
||||
|
||||
+1
-1
@@ -13,7 +13,7 @@ date: 2023-10-27
|
||||
modified: 2024-01-26
|
||||
tags:
|
||||
- attack.privilege-escalation
|
||||
- attack.defense-evasion
|
||||
- attack.stealth
|
||||
- attack.t1055.012
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
+1
-1
@@ -11,9 +11,9 @@ references:
|
||||
author: Swachchhanda Shrawan Poudel, Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2024-01-26
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.execution
|
||||
- detection.emerging-threats
|
||||
- attack.stealth
|
||||
logsource:
|
||||
product: windows
|
||||
category: process_creation
|
||||
|
||||
+1
-1
@@ -8,9 +8,9 @@ author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023-05-26
|
||||
modified: 2024-03-05
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.execution
|
||||
- detection.emerging-threats
|
||||
- attack.stealth
|
||||
logsource:
|
||||
product: windows
|
||||
category: process_creation
|
||||
|
||||
+1
-1
@@ -7,9 +7,9 @@ references:
|
||||
author: X__Junior (Nextron Systems)
|
||||
date: 2023-05-24
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.execution
|
||||
- detection.emerging-threats
|
||||
- attack.stealth
|
||||
logsource:
|
||||
product: windows
|
||||
category: process_creation
|
||||
|
||||
+1
-1
@@ -8,9 +8,9 @@ author: X__Junior (Nextron Systems)
|
||||
date: 2023-05-24
|
||||
modified: 2023-05-30
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.execution
|
||||
- detection.emerging-threats
|
||||
- attack.stealth
|
||||
logsource:
|
||||
product: windows
|
||||
category: process_creation
|
||||
|
||||
+1
-1
@@ -7,9 +7,9 @@ references:
|
||||
author: X__Junior (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023-05-24
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.execution
|
||||
- detection.emerging-threats
|
||||
- attack.stealth
|
||||
logsource:
|
||||
product: windows
|
||||
category: process_creation
|
||||
|
||||
+1
-1
@@ -11,7 +11,7 @@ author: TropChaud
|
||||
date: 2023-01-26
|
||||
modified: 2023-02-05
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.stealth
|
||||
- attack.t1218.011
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
-1
@@ -11,7 +11,6 @@ tags:
|
||||
- attack.execution
|
||||
- attack.t1059.003
|
||||
- attack.t1059.001
|
||||
- attack.defense-evasion
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
category: process_creation
|
||||
|
||||
+1
-1
@@ -23,8 +23,8 @@ author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023-03-31
|
||||
modified: 2024-11-23
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- detection.emerging-threats
|
||||
- attack.stealth
|
||||
logsource:
|
||||
category: image_load
|
||||
product: windows
|
||||
|
||||
+1
-1
@@ -23,7 +23,7 @@ author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023-03-29
|
||||
modified: 2024-11-23
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.stealth
|
||||
- attack.t1218
|
||||
- attack.execution
|
||||
- detection.emerging-threats
|
||||
|
||||
+1
-1
@@ -25,7 +25,7 @@ date: 2023-03-29
|
||||
tags:
|
||||
- attack.command-and-control
|
||||
- attack.execution
|
||||
- attack.defense-evasion
|
||||
- attack.stealth
|
||||
- attack.t1218
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
+1
-1
@@ -23,7 +23,7 @@ references:
|
||||
author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023-03-29
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.stealth
|
||||
- attack.t1218
|
||||
- attack.execution
|
||||
- detection.emerging-threats
|
||||
|
||||
+2
-1
@@ -7,9 +7,10 @@ references:
|
||||
author: CISA
|
||||
date: 2023-12-18
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.persistence
|
||||
- attack.privilege-escalation
|
||||
- attack.execution
|
||||
- attack.stealth
|
||||
- attack.t1574.001
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
+2
-1
@@ -7,9 +7,10 @@ references:
|
||||
author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023-10-24
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.persistence
|
||||
- attack.privilege-escalation
|
||||
- attack.execution
|
||||
- attack.stealth
|
||||
- attack.t1574.001
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
+2
-2
@@ -8,8 +8,8 @@ references:
|
||||
author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023-10-24
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.t1562
|
||||
- attack.defense-impairment
|
||||
- attack.t1685
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
product: windows
|
||||
|
||||
+2
-1
@@ -8,9 +8,10 @@ references:
|
||||
author: Thurein Oo, Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023-10-18
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.privilege-escalation
|
||||
- attack.persistence
|
||||
- attack.execution
|
||||
- attack.stealth
|
||||
- attack.t1574.001
|
||||
- attack.g0032
|
||||
- detection.emerging-threats
|
||||
|
||||
+1
-1
@@ -9,8 +9,8 @@ date: 2023-06-16
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.persistence
|
||||
- attack.defense-evasion
|
||||
- detection.emerging-threats
|
||||
- attack.stealth
|
||||
logsource:
|
||||
product: linux
|
||||
category: file_event
|
||||
|
||||
+1
-1
@@ -10,8 +10,8 @@ modified: 2025-08-19
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.persistence
|
||||
- attack.defense-evasion
|
||||
- detection.emerging-threats
|
||||
- attack.stealth
|
||||
logsource:
|
||||
product: linux
|
||||
category: file_event
|
||||
|
||||
+1
-1
@@ -7,7 +7,7 @@ references:
|
||||
author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023-06-16
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.stealth
|
||||
- attack.t1140
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
+1
-1
@@ -7,7 +7,7 @@ references:
|
||||
author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023-06-16
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.stealth
|
||||
- attack.t1140
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
+1
-1
@@ -7,7 +7,7 @@ references:
|
||||
author: Nasreddine Bencherchali (Nextron Systems)
|
||||
date: 2023-06-16
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- attack.stealth
|
||||
- attack.t1140
|
||||
- detection.emerging-threats
|
||||
logsource:
|
||||
|
||||
+1
-1
@@ -15,9 +15,9 @@ references:
|
||||
author: Matt Anderson, Kris Luzadre, Andrew Schwartz, Huntress
|
||||
date: 2024-02-20
|
||||
tags:
|
||||
- attack.defense-evasion
|
||||
- cve.2024-1709
|
||||
- detection.emerging-threats
|
||||
- attack.defense-impairment
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
|
||||
+1
-1
@@ -15,9 +15,9 @@ tags:
|
||||
- attack.initial-access
|
||||
- attack.persistence
|
||||
- attack.privilege-escalation
|
||||
- attack.defense-evasion
|
||||
- cve.2024-3400
|
||||
- detection.emerging-threats
|
||||
- attack.stealth
|
||||
logsource:
|
||||
category: appliance
|
||||
product: paloalto
|
||||
|
||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user