Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: update to MITRE ATT&CK v16.1 #219

Merged
merged 2 commits into from
Dec 5, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions CHANGELOG-Japanese.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,7 @@
**改善:**

- RDPログオンとログオフの情報が`timeline-logon`タイムラインに追加された。 #209 (@fukusuket)
- MITRE ATT&CKをバージョン16.1に更新した。 (#219) (@fukusuket)

## 2.7.1 [2024/10/31] Halloween Release

Expand Down
1 change: 1 addition & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,7 @@
**Enhancements:**

- RDP logon and logoff information has been added to the `timeline-logon` timeline. #209 (@fukusuket)
- MITRE ATT&CK updated to version 16.1. (#219) (@fukusuket)

## 2.7.1 [2024/10/31] Halloween Release

Expand Down
97 changes: 96 additions & 1 deletion mitre-attack.json
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@
"Technique": "Data Obfuscation"
},
"T1001.003": {
"Sub-Technique": "Protocol Impersonation",
"Sub-Technique": "Protocol or Service Impersonation",
"Tactic": "Command and Control",
"Technique": "Data Obfuscation"
},
Expand Down Expand Up @@ -259,6 +259,11 @@
"Tactic": "Defense Evasion",
"Technique": "Obfuscated Files or Information"
},
"T1027.014": {
"Sub-Technique": "Polymorphic Code",
"Tactic": "Defense Evasion",
"Technique": "Obfuscated Files or Information"
},
"T1029": {
"Sub-Technique": "-",
"Tactic": "Exfiltration",
Expand Down Expand Up @@ -324,6 +329,11 @@
"Tactic": "Defense Evasion",
"Technique": "Masquerading"
},
"T1036.010": {
"Sub-Technique": "Masquerade Account Name",
"Tactic": "Defense Evasion",
"Technique": "Masquerading"
},
"T1037": {
"Sub-Technique": "-",
"Tactic": "Privilege Escalation",
Expand Down Expand Up @@ -594,6 +604,11 @@
"Tactic": "Execution",
"Technique": "Command and Scripting Interpreter"
},
"T1059.011": {
"Sub-Technique": "Lua",
"Tactic": "Execution",
"Technique": "Command and Scripting Interpreter"
},
"T1068": {
"Sub-Technique": "-",
"Tactic": "Discovery",
Expand Down Expand Up @@ -669,6 +684,11 @@
"Tactic": "Defense Evasion",
"Technique": "Indicator Removal"
},
"T1070.010": {
"Sub-Technique": "Relocate Malware",
"Tactic": "Defense Evasion",
"Technique": "Indicator Removal"
},
"T1071": {
"Sub-Technique": "-",
"Tactic": "Command and Control",
Expand All @@ -694,6 +714,11 @@
"Tactic": "Command and Control",
"Technique": "Application Layer Protocol"
},
"T1071.005": {
"Sub-Technique": "Publish/Subscribe Protocols",
"Tactic": "Command and Control",
"Technique": "Application Layer Protocol"
},
"T1072": {
"Sub-Technique": "-",
"Tactic": "Lateral Movement",
Expand Down Expand Up @@ -854,6 +879,11 @@
"Tactic": "Privilege Escalation",
"Technique": "Account Manipulation"
},
"T1098.007": {
"Sub-Technique": "Additional Local or Domain Groups",
"Tactic": "Privilege Escalation",
"Technique": "Account Manipulation"
},
"T1102": {
"Sub-Technique": "-",
"Tactic": "Command and Control",
Expand Down Expand Up @@ -989,6 +1019,11 @@
"Tactic": "Defense Evasion",
"Technique": "Trusted Developer Utilities Proxy Execution"
},
"T1127.002": {
"Sub-Technique": "ClickOnce",
"Tactic": "Defense Evasion",
"Technique": "Trusted Developer Utilities Proxy Execution"
},
"T1129": {
"Sub-Technique": "-",
"Tactic": "Defense Evasion",
Expand Down Expand Up @@ -1259,6 +1294,16 @@
"Tactic": "Collection",
"Technique": "Data from Information Repositories"
},
"T1213.004": {
"Sub-Technique": "Customer Relationship Management Software",
"Tactic": "Collection",
"Technique": "Data from Information Repositories"
},
"T1213.005": {
"Sub-Technique": "Messaging Applications",
"Tactic": "Collection",
"Technique": "Data from Information Repositories"
},
"T1216": {
"Sub-Technique": "-",
"Tactic": "Defense Evasion",
Expand Down Expand Up @@ -1394,6 +1439,11 @@
"Tactic": "Defense Evasion",
"Technique": "Execution Guardrails"
},
"T1480.002": {
"Sub-Technique": "Mutual Exclusion",
"Tactic": "Defense Evasion",
"Technique": "Execution Guardrails"
},
"T1482": {
"Sub-Technique": "-",
"Tactic": "Discovery",
Expand All @@ -1419,6 +1469,11 @@
"Tactic": "Impact",
"Technique": "Data Destruction"
},
"T1485.001": {
"Sub-Technique": "Lifecycle-Triggered Deletion",
"Tactic": "Impact",
"Technique": "Data Destruction"
},
"T1486": {
"Sub-Technique": "-",
"Tactic": "Impact",
Expand Down Expand Up @@ -1459,6 +1514,26 @@
"Tactic": "Impact",
"Technique": "Resource Hijacking"
},
"T1496.001": {
"Sub-Technique": "Compute Hijacking",
"Tactic": "Impact",
"Technique": "Resource Hijacking"
},
"T1496.002": {
"Sub-Technique": "Bandwidth Hijacking",
"Tactic": "Impact",
"Technique": "Resource Hijacking"
},
"T1496.003": {
"Sub-Technique": "SMS Pumping",
"Tactic": "Impact",
"Technique": "Resource Hijacking"
},
"T1496.004": {
"Sub-Technique": "Cloud Service Hijacking",
"Tactic": "Impact",
"Technique": "Resource Hijacking"
},
"T1497": {
"Sub-Technique": "-",
"Tactic": "Discovery",
Expand Down Expand Up @@ -1759,6 +1834,11 @@
"Tactic": "Privilege Escalation",
"Technique": "Event Triggered Execution"
},
"T1546.017": {
"Sub-Technique": "Udev Rules",
"Tactic": "Privilege Escalation",
"Technique": "Event Triggered Execution"
},
"T1547": {
"Sub-Technique": "-",
"Tactic": "Privilege Escalation",
Expand Down Expand Up @@ -2084,6 +2164,11 @@
"Tactic": "Collection",
"Technique": "Adversary-in-the-Middle"
},
"T1557.004": {
"Sub-Technique": "Evil Twin",
"Tactic": "Collection",
"Technique": "Adversary-in-the-Middle"
},
"T1558": {
"Sub-Technique": "-",
"Tactic": "Credential Access",
Expand All @@ -2109,6 +2194,11 @@
"Tactic": "Credential Access",
"Technique": "Steal or Forge Kerberos Tickets"
},
"T1558.005": {
"Sub-Technique": "Ccache Files",
"Tactic": "Credential Access",
"Technique": "Steal or Forge Kerberos Tickets"
},
"T1559": {
"Sub-Technique": "-",
"Tactic": "Execution",
Expand Down Expand Up @@ -3184,6 +3274,11 @@
"Tactic": "Command and Control",
"Technique": "Hide Infrastructure"
},
"T1666": {
"Sub-Technique": "-",
"Tactic": "Defense Evasion",
"Technique": "Modify Cloud Resource Hierarchy"
},
"TA0001": {
"Sub-Technique": "-",
"Tactic": "Initial Access",
Expand Down
Loading