Trusted Design

TA0003 - Persistence

戦術「Persistence」に関連する攻撃手法(Technique)の一覧です。

Technique ID Name Description
T1004 Winlogon Helper DLL Winlogon.exe is a Windows component responsible for actions at logon/logoff as well as the secure attention sequence (SA…
T1013 Port Monitors A port monitor can be set through the (Citation: AddMonitor) API call to set a DLL to be loaded at startup. (Citation: …
T1015 Accessibility Features Windows contains accessibility features that may be launched with a key combination before a user has logged in (for exa…
T1019 System Firmware The BIOS (Basic Input/Output System) and The Unified Extensible Firmware Interface (UEFI) or Extensible Firmware Interfa…
T1023 Shortcut Modification Shortcuts or symbolic links are ways of referencing other files or programs that will be opened or executed when the sho…
T1031 Modify Existing Service Windows service configuration information, including the file path to the service's executable or recovery programs/comm…
T1034 Path Interception **This technique has been deprecated. Please use [Path Interception by PATH Environment Variable](https://attack.mitre.o…
T1037 Boot or Logon Initialization Scripts Adversaries may use scripts automatically executed at boot or logon initialization to establish persistence.(Citation: M…
T1037.001 Logon Script (Windows) Adversaries may use Windows logon scripts automatically executed at logon initialization to establish persistence. Windo…
T1037.002 Login Hook Adversaries may use a Login Hook to establish persistence executed upon user logon. A login hook is a plist file that po…
T1037.003 Network Logon Script Adversaries may use network logon scripts automatically executed at logon initialization to establish persistence. Netwo…
T1037.004 RC Scripts Adversaries may establish persistence by modifying RC scripts, which are executed during a Unix-like system’s startup. T…
T1037.005 Startup Items Adversaries may use startup items automatically executed at boot initialization to establish persistence. Startup items …
T1038 DLL Search Order Hijacking Windows systems use a common method to look for required DLLs to load into a program. (Citation: Microsoft DLL Search) A…
T1042 Change Default File Association When a file is opened, the default program used to open the file (also called the file association or handler) is checke…
T1044 File System Permissions Weakness Processes may automatically execute specific binaries as part of their functionality or to perform other actions. If the…
T1050 New Service When operating systems boot up, they can start programs or applications called services that perform background system f…
T1058 Service Registry Permissions Weakness Windows stores local service configuration information in the Registry under <code>HKLM\SYSTEM\CurrentControlSet\Service…
T1060 Registry Run Keys / Startup Folder Adversaries may achieve persistence by adding a program to a startup folder or referencing it with a Registry run key. A…
T1062 Hypervisor **This technique has been deprecated and should no longer be used.** A type-1 hypervisor is a software layer that sits …
T1067 Bootkit A bootkit is a malware variant that modifies the boot sectors of a hard drive, including the Master Boot Record (MBR) an…
T1084 Windows Management Instrumentation Event Subscription Windows Management Instrumentation (WMI) can be used to install event filters, providers, consumers, and bindings that e…
T1098 Account Manipulation Adversaries may manipulate accounts to maintain and/or elevate access to victim systems. Account manipulation may consis…
T1098.001 Additional Cloud Credentials Adversaries may add adversary-controlled credentials to a cloud account to maintain persistent access to victim accounts…
T1098.002 Additional Email Delegate Permissions Adversaries may grant additional permission levels to maintain persistent access to an adversary-controlled email accoun…
T1098.003 Additional Cloud Roles An adversary may add additional roles or permissions to an adversary-controlled cloud account to maintain persistent acc…
T1098.004 SSH Authorized Keys Adversaries may modify the SSH <code>authorized_keys</code> file to maintain persistence on a victim host. Linux distrib…
T1098.005 Device Registration Adversaries may register a device to an adversary-controlled account. Devices may be registered in a multifactor authent…
T1098.006 Additional Container Cluster Roles An adversary may add additional roles or permissions to an adversary-controlled user or service account to maintain pers…
T1098.007 Additional Local or Domain Groups An adversary may add additional local or domain groups to an adversary-controlled account to maintain persistent access …
T1100 Web Shell A Web shell is a Web script that is placed on an openly accessible Web server to allow an adversary to use the Web serve…
T1101 Security Support Provider Windows Security Support Provider (SSP) DLLs are loaded into the Local Security Authority (LSA) process at system start.…
T1103 AppInit DLLs Dynamic-link libraries (DLLs) that are specified in the AppInit_DLLs value in the Registry keys <code>HKEY_LOCAL_MACHINE…
T1128 Netsh Helper DLL Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configura…
T1131 Authentication Package Windows Authentication Package DLLs are loaded by the Local Security Authority (LSA) process at system start. They provi…
T1133 External Remote Services Adversaries may leverage external-facing remote services to initially access and/or persist within a network. Remote ser…
T1136 Create Account Adversaries may create an account to maintain access to victim systems.(Citation: Symantec WastedLocker June 2020) With …
T1136.001 Local Account Adversaries may create a local account to maintain access to victim systems. Local accounts are those configured by an o…
T1136.002 Domain Account Adversaries may create a domain account to maintain access to victim systems. Domain accounts are those managed by Activ…
T1136.003 Cloud Account Adversaries may create a cloud account to maintain access to victim systems. With a sufficient level of access, such acc…
T1137 Office Application Startup Adversaries may leverage Microsoft Office-based applications for persistence between startups. Microsoft Office is a fai…
T1137.001 Office Template Macros Adversaries may abuse Microsoft Office templates to obtain persistence on a compromised system. Microsoft Office contain…
T1137.002 Office Test Adversaries may abuse the Microsoft Office "Office Test" Registry key to obtain persistence on a compromised system. An …
T1137.003 Outlook Forms Adversaries may abuse Microsoft Outlook forms to obtain persistence on a compromised system. Outlook forms are used as t…
T1137.004 Outlook Home Page Adversaries may abuse Microsoft Outlook's Home Page feature to obtain persistence on a compromised system. Outlook Home …
T1137.005 Outlook Rules Adversaries may abuse Microsoft Outlook rules to obtain persistence on a compromised system. Outlook rules allow a user …
T1137.006 Add-ins Adversaries may abuse Microsoft Office add-ins to obtain persistence on a compromised system. Office add-ins can be used…
T1138 Application Shimming The Microsoft Windows Application Compatibility Infrastructure/Framework (Application Shim) was created to allow for bac…
T1156 Malicious Shell Modification Adversaries may establish persistence through executing malicious commands triggered by a user’s shell. User shells exec…
T1157 Dylib Hijacking macOS and OS X use a common method to look for required dynamic libraries (dylib) to load into a program based on search…
T1159 Launch Agent Per Apple’s developer documentation, when a user logs in, a per-user launchd process is started which loads the paramete…
T1160 Launch Daemon Per Apple’s developer documentation, when macOS and OS X boot up, launchd is run to finish system initialization. This p…
T1161 LC_LOAD_DYLIB Addition Mach-O binaries have a series of headers that are used to perform certain operations when a binary is loaded. The LC_LOA…
T1162 Login Item MacOS provides the option to list specific applications to run when a user logs in. These applications run under the log…
T1163 Rc.common During the boot process, macOS executes <code>source /etc/rc.common</code>, which is a shell script containing various u…
T1164 Re-opened Applications Starting in Mac OS X 10.7 (Lion), users can specify certain applications to be re-opened when a user reboots their machi…
T1165 Startup Items Per Apple’s documentation, startup items execute during the final phase of the boot process and contain shell scripts or…
T1168 Local Job Scheduling On Linux and macOS systems, multiple methods are supported for creating pre-scheduled and periodic background jobs: cron…
T1176 Software Extensions Adversaries may abuse software extensions to establish persistent access to victim systems. Software extensions are modu…
T1176.001 Browser Extensions Adversaries may abuse internet browser extensions to establish persistent access to victim systems. Browser extensions o…
T1176.002 IDE Extensions Adversaries may abuse an integrated development environment (IDE) extension to establish persistent access to victim sys…
T1179 Hooking Windows processes often leverage application programming interface (API) functions to perform tasks that require reusabl…
T1180 Screensaver Screensavers are programs that execute after a configurable time of user inactivity and consist of Portable Executable (…
T1182 AppCert DLLs Dynamic-link libraries (DLLs) that are specified in the AppCertDLLs Registry key under <code>HKEY_LOCAL_MACHINE\System\C…
T1209 Time Providers The Windows Time service (W32Time) enables time synchronization across and within domains. (Citation: Microsoft W32Time …
T1215 Kernel Modules and Extensions Loadable Kernel Modules (or LKMs) are pieces of code that can be loaded and unloaded into the kernel upon demand. They e…
T1501 Systemd Service Systemd services can be used to establish persistence on a Linux system. The systemd service manager is commonly used fo…
T1504 PowerShell Profile Adversaries may gain persistence and elevate privileges in certain situations by abusing [PowerShell](https://attack.mit…
T1505 Server Software Component Adversaries may abuse legitimate extensible development features of servers to establish persistent access to systems. E…
T1505.001 SQL Stored Procedures Adversaries may abuse SQL stored procedures to establish persistent access to systems. SQL Stored Procedures are code th…
T1505.002 Transport Agent Adversaries may abuse Microsoft transport agents to establish persistent access to systems. Microsoft Exchange transport…
T1505.003 Web Shell Adversaries may backdoor web servers with web shells to establish persistent access to systems. A Web shell is a Web scr…
T1505.004 IIS Components Adversaries may install malicious components that run on Internet Information Services (IIS) web servers to establish pe…
T1505.005 Terminal Services DLL Adversaries may abuse components of Terminal Services to enable persistent access to systems. Microsoft Terminal Service…
T1505.006 vSphere Installation Bundles Adversaries may abuse vSphere Installation Bundles (VIBs) to establish persistent access to ESXi hypervisors. VIBs are c…
T1519 Emond Adversaries may use Event Monitor Daemon (emond) to establish persistence by scheduling malicious commands to run on pre…
T1525 Implant Internal Image Adversaries may implant cloud or container images with malicious code to establish persistence after gaining access to a…
T1543 Create or Modify System Process Adversaries may create or modify system-level processes to repeatedly execute malicious payloads as part of persistence.…
T1543.001 Launch Agent Adversaries may create or modify launch agents to repeatedly execute malicious payloads as part of persistence. When a u…
T1543.002 Systemd Service Adversaries may create or modify systemd services to repeatedly execute malicious payloads as part of persistence. Syste…
T1543.003 Windows Service Adversaries may create or modify Windows services to repeatedly execute malicious payloads as part of persistence. When …
T1543.004 Launch Daemon Adversaries may create or modify Launch Daemons to execute malicious payloads as part of persistence. Launch Daemons are…
T1543.005 Container Service Adversaries may create or modify container or container cluster management tools that run as daemons, agents, or service…
T1546.017 Udev Rules Adversaries may maintain persistence through executing malicious content triggered using udev rules. Udev is the Linux k…
T1546.018 Python Startup Hooks Adversaries may achieve persistence by leveraging Python’s startup mechanisms, including path configuration (`.pth`) fil…
T1547 Boot or Logon Autostart Execution Adversaries may configure system settings to automatically execute a program during system boot or logon to maintain per…
T1547.001 Registry Run Keys / Startup Folder Adversaries may achieve persistence by adding a program to a startup folder or referencing it with a Registry run key. A…
T1547.002 Authentication Package Adversaries may abuse authentication packages to execute DLLs when the system boots. Windows authentication package DLLs…
T1547.003 Time Providers Adversaries may abuse time providers to execute DLLs when the system boots. The Windows Time service (W32Time) enables t…
T1547.004 Winlogon Helper DLL Adversaries may abuse features of Winlogon to execute DLLs and/or executables when a user logs in. Winlogon.exe is a Win…
T1547.005 Security Support Provider Adversaries may abuse security support providers (SSPs) to execute DLLs when the system boots. Windows SSP DLLs are load…
T1547.006 Kernel Modules and Extensions Adversaries may modify the kernel to automatically execute programs on system boot. Loadable Kernel Modules (LKMs) are p…
T1547.007 Re-opened Applications Adversaries may modify plist files to automatically run an application when a user logs in. When a user logs out or rest…
T1547.008 LSASS Driver Adversaries may modify or add LSASS drivers to obtain persistence on compromised systems. The Windows security subsystem…
T1547.009 Shortcut Modification Adversaries may create or modify shortcuts that can execute a program during system boot or user login. Shortcuts or sym…
T1547.010 Port Monitors Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escal…
T1547.011 Plist Modification Adversaries can modify property list files (plist files) to execute their code as part of establishing persistence. Plis…
T1547.012 Print Processors Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalat…
T1547.013 XDG Autostart Entries Adversaries may add or modify XDG Autostart Entries to execute malicious programs or commands when a user’s desktop envi…
T1547.014 Active Setup Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine. Active Setup is a…
T1547.015 Login Items Adversaries may add login items to execute upon user login to gain persistence or escalate privileges. Login items are a…
T1554 Compromise Host Software Binary Adversaries may modify host software binaries to establish persistent access to systems. Software binaries/executables p…
T1653 Power Settings Adversaries may impair a system's ability to hibernate, reboot, or shut down in order to extend access to infected machi…
T1668 Exclusive Control Adversaries who successfully compromise a system may attempt to maintain persistence by “closing the door” behind them …
T1671 Cloud Application Integration Adversaries may achieve persistence by leveraging OAuth application integrations in a software-as-a-service environment.…