Trusted Design

TA0002 - Execution

戦術「Execution」に関連する攻撃手法(Technique)の一覧です。

Technique ID Name Description
T1028 Windows Remote Management Windows Remote Management (WinRM) is the name of both a Windows service and a protocol that allows a user to interact wi…
T1035 Service Execution Adversaries may execute a binary, command, or script via a method that interacts with Windows services, such as the Serv…
T1047 Windows Management Instrumentation Adversaries may abuse Windows Management Instrumentation (WMI) to execute malicious commands and payloads. WMI is design…
T1053 Scheduled Task/Job Adversaries may abuse task scheduling functionality to facilitate initial or recurring execution of malicious code. Util…
T1053.001 At (Linux) Adversaries may abuse the [at](https://attack.mitre.org/software/S0110) utility to perform task scheduling for initial, …
T1053.002 At Adversaries may abuse the [at](https://attack.mitre.org/software/S0110) utility to perform task scheduling for initial o…
T1053.003 Cron Adversaries may abuse the <code>cron</code> utility to perform task scheduling for initial or recurring execution of mal…
T1053.004 Launchd This technique is deprecated due to the inaccurate usage. The report cited did not provide technical detail as to how th…
T1053.005 Scheduled Task Adversaries may abuse the Windows Task Scheduler to perform task scheduling for initial or recurring execution of malici…
T1053.006 Systemd Timers Adversaries may abuse systemd timers to perform task scheduling for initial or recurring execution of malicious code. Sy…
T1053.007 Container Orchestration Job Adversaries may abuse task scheduling functionality provided by container orchestration tools such as Kubernetes to sche…
T1059 Command and Scripting Interpreter Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries. These interfaces and la…
T1059.001 PowerShell Adversaries may abuse PowerShell commands and scripts for execution. PowerShell is a powerful interactive command-line i…
T1059.002 AppleScript Adversaries may abuse AppleScript for execution. AppleScript is a macOS scripting language designed to control applicati…
T1059.003 Windows Command Shell Adversaries may abuse the Windows command shell for execution. The Windows command shell ([cmd](https://attack.mitre.org…
T1059.004 Unix Shell Adversaries may abuse Unix shell commands and scripts for execution. Unix shells are the primary command prompt on Linux…
T1059.005 Visual Basic Adversaries may abuse Visual Basic (VB) for execution. VB is a programming language created by Microsoft with interopera…
T1059.006 Python Adversaries may abuse Python commands and scripts for execution. Python is a very popular scripting/programming language…
T1059.007 JavaScript Adversaries may abuse various implementations of JavaScript for execution. JavaScript (JS) is a platform-independent scr…
T1059.008 Network Device CLI Adversaries may abuse scripting or built-in command line interpreters (CLI) on network devices to execute malicious comm…
T1059.009 Cloud API Adversaries may abuse cloud APIs to execute malicious commands. APIs available in cloud environments provide various fun…
T1059.010 AutoHotKey & AutoIT Adversaries may execute commands and perform malicious tasks using AutoIT and AutoHotKey automation scripts. AutoIT and …
T1059.011 Lua Adversaries may abuse Lua commands and scripts for execution. Lua is a cross-platform scripting and programming language…
T1059.012 Hypervisor CLI Adversaries may abuse hypervisor command line interpreters (CLIs) to execute malicious commands. Hypervisor CLIs typical…
T1059.013 Container CLI/API Adversaries may abuse built-in CLI tools or API calls to execute malicious commands in containerized environments. The …
T1061 Graphical User Interface **This technique has been deprecated. Please use [Remote Services](https://attack.mitre.org/techniques/T1021) where appr…
T1072 Software Deployment Tools Adversaries may gain access to and use centralized software suites installed within an enterprise to execute commands an…
T1086 PowerShell PowerShell is a powerful interactive command-line interface and scripting environment included in the Windows operating …
T1106 Native API Adversaries may interact with the native OS application programming interface (API) to execute behaviors. Native APIs pr…
T1129 Shared Modules Adversaries may execute malicious payloads via loading shared modules. Shared modules are executable files that are load…
T1153 Source **This technique has been deprecated and should no longer be used.** The <code>source</code> command loads functions in…
T1154 Trap The <code>trap</code> command allows programs and shells to specify commands that will be executed upon receiving interr…
T1155 AppleScript macOS and OS X applications send AppleEvent messages to each other for interprocess communications (IPC). These messages…
T1173 Dynamic Data Exchange Windows Dynamic Data Exchange (DDE) is a client-server protocol for one-time and/or continuous inter-process communicati…
T1177 LSASS Driver The Windows security subsystem is a set of components that manage and enforce the security policy for a computer or doma…
T1203 Exploitation for Client Execution Adversaries may exploit software vulnerabilities in client applications to execute code. Vulnerabilities can exist in so…
T1204 User Execution An adversary may rely upon specific actions by a user in order to gain execution. Users may be subjected to social engin…
T1204.001 Malicious Link An adversary may rely upon a user clicking a malicious link in order to gain execution. Users may be subjected to social…
T1204.002 Malicious File An adversary may rely upon a user opening a malicious file in order to gain execution. Users may be subjected to social …
T1204.003 Malicious Image Adversaries may rely on a user running a malicious image to facilitate execution. Amazon Web Services (AWS) Amazon Machi…
T1204.004 Malicious Copy and Paste An adversary may rely upon a user copying and pasting code in order to gain execution. Users may be subjected to social …
T1204.005 Malicious Library Adversaries may rely on a user installing a malicious library to facilitate execution. Threat actors may [Upload Malware…
T1559 Inter-Process Communication Adversaries may abuse inter-process communication (IPC) mechanisms for local code or command execution. IPC is typically…
T1559.001 Component Object Model Adversaries may use the Windows Component Object Model (COM) for local code execution. COM is an inter-process communica…
T1559.002 Dynamic Data Exchange Adversaries may use Windows Dynamic Data Exchange (DDE) to execute arbitrary commands. DDE is a client-server protocol f…
T1559.003 XPC Services Adversaries can provide malicious content to an XPC service daemon for local code execution. macOS uses XPC services for…
T1569 System Services Adversaries may abuse system services or daemons to execute commands or programs. Adversaries can execute malicious cont…
T1569.001 Launchctl Adversaries may abuse launchctl to execute commands or programs. Launchctl interfaces with launchd, the service manageme…
T1569.002 Service Execution Adversaries may abuse the Windows service control manager to execute malicious commands or payloads. The Windows service…
T1569.003 Systemctl Adversaries may abuse systemctl to execute commands or programs. Systemctl is the primary interface for systemd, the Lin…
T1609 Container Administration Command Adversaries may abuse a container administration service to execute commands within a container. A container administrat…
T1610 Deploy Container Adversaries may deploy a container into an environment to facilitate execution or evade defenses. In some cases, adversa…
T1648 Serverless Execution Adversaries may abuse serverless computing, integration, and automation services to execute arbitrary code in cloud envi…
T1651 Cloud Administration Command Adversaries may abuse cloud management services to execute commands within virtual machines. Resources such as AWS Syste…
T1674 Input Injection Adversaries may simulate keystrokes on a victim’s computer by various means to perform any type of action on behalf of t…
T1675 ESXi Administration Command Adversaries may abuse ESXi administration services to execute commands on guest machines hosted within an ESXi virtual e…
T1677 Poisoned Pipeline Execution Adversaries may manipulate continuous integration / continuous development (CI/CD) processes by injecting malicious code…