Further subtechnique updates

This commit is contained in:
Ivan Kirillov 2020-06-17 11:31:40 -06:00
parent 5c0bb0e94f
commit b343df2225
11 changed files with 12 additions and 0 deletions

View File

@ -6,6 +6,7 @@ references:
- https://securitylab.github.com/research/octopus-scanner-malware-open-source-supply-chain
tags:
- attack.t1195
- attack.t1195.001
author: NVISO
date: 2020/06/09
logsource:

View File

@ -7,6 +7,7 @@ references:
tags:
- attack.defense_evasion
- attack.t1036
- attack.t1036.005
author: Trent Liffick (@tliffick)
date: 2020/06/03
logsource:

View File

@ -9,6 +9,7 @@ references:
- https://twitter.com/Oddvarmoe/status/1270633613449723905
tags:
- attack.t1059
- attack.t1059.003
- attack.execution
logsource:
category: process_creation

View File

@ -9,6 +9,7 @@ date: 2019/12/22
tags:
- attack.credential_access
- attack.t1003
- attack.t1003.001
falsepositives:
- Unknown
level: high

View File

@ -12,6 +12,7 @@ modified: 2018/12/11
tags:
- attack.execution
- attack.t1064
- attack.t1059.005
detection:
condition: selection
level: high

View File

@ -9,6 +9,7 @@ date: 2020/06/04
tags:
- attack.execution
- attack.t1086
- attack.t1059.001
logsource:
category: process_creation
product: windows

View File

@ -10,6 +10,7 @@ references:
tags:
- attack.command_and_control
- attack.t1071
- attack.t1071.004
logsource:
category: process_creation
product: windows

View File

@ -10,6 +10,7 @@ date: 2020/02/04
tags:
- attack.credential_access
- attack.t1003
- attack.t1003.001
logsource:
product: windows
service: sysmon

View File

@ -9,6 +9,7 @@ date: 2019/12/31
tags:
- attack.credential_access
- attack.t1003
- attack.t1558
- attack.s0005
falsepositives:
- 'Another service that uses a single -s command line switch'

View File

@ -7,6 +7,7 @@ references:
- https://attack.mitre.org/techniques/T1037/
tags:
- attack.t1037
- attack.t1037.001
- attack.persistence
- attack.lateral_movement
author: Tom Ueltschi (@c_APT_ure)

View File

@ -12,6 +12,8 @@ tags:
- attack.t1073
- attack.t1038
- attack.t1112
- attack.t1574.001
- attack.t1574.002
logsource:
product: windows
service: sysmon