Trusted Design

Technique 一覧

Technique ID 名称 概要 戦術
T1204.002 Malicious File An adversary may rely upon a user opening a malicious file in order to gain execution. Users may be subjected to social … execution
T1204.003 Malicious Image Adversaries may rely on a user running a malicious image to facilitate execution. Amazon Web Services (AWS) Amazon Machi… execution
T1204.005 Malicious Library Adversaries may rely on a user installing a malicious library to facilitate execution. Threat actors may [Upload Malware… execution
T1204.001 Malicious Link An adversary may rely upon a user clicking a malicious link in order to gain execution. Users may be subjected to social… execution
T1156 Malicious Shell Modification Adversaries may establish persistence through executing malicious commands triggered by a user’s shell. User shells exec… persistence
T1583.008 Malvertising Adversaries may purchase online advertisements that can be abused to distribute malware to victims. Ads can be purchased… resource-development
T1587.001 Malware Adversaries may develop malware and malware components that can be used during targeting. Building malicious software ca… resource-development
T1588.001 Malware Adversaries may buy, steal, or download malware that can be used during targeting. Malicious software can include payloa… resource-development
T1553.005 Mark-of-the-Web Bypass Adversaries may abuse specific file formats to subvert Mark-of-the-Web (MOTW) controls. In Windows, when files are downl… defense-evasion
T1036.010 Masquerade Account Name Adversaries may match or approximate the names of legitimate accounts to make newly created ones appear benign. This wil… defense-evasion
T1036.008 Masquerade File Type Adversaries may masquerade malicious payloads as legitimate files through changes to the payload's formatting, including… defense-evasion
T1036.004 Masquerade Task or Service Adversaries may attempt to manipulate the name of a task or service to make it appear legitimate or benign. Tasks/servic… defense-evasion
T1036 Masquerading Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/… defense-evasion
T1036.005 Match Legitimate Resource Name or Location Adversaries may match or approximate the name or location of legitimate files, Registry keys, or other resources when na… defense-evasion
T1218.013 Mavinject Adversaries may abuse mavinject.exe to proxy execution of malicious code. Mavinject.exe is the Microsoft Application Vir… defense-evasion
T1213.005 Messaging Applications Adversaries may leverage chat and messaging applications, such as Microsoft Teams, Google Chat, and Slack, to mine valua… collection
T1556 Modify Authentication Process Adversaries may modify authentication mechanisms and processes to access user credentials or enable otherwise unwarrante… credential-access
T1578.005 Modify Cloud Compute Configurations Adversaries may modify settings that directly affect the size, locations, and resources available to cloud compute infra… defense-evasion
T1578 Modify Cloud Compute Infrastructure An adversary may attempt to modify a cloud account's compute service infrastructure to evade defenses. A modification to… defense-evasion
T1666 Modify Cloud Resource Hierarchy Adversaries may attempt to modify hierarchical structures in infrastructure-as-a-service (IaaS) environments in order to… defense-evasion
T1031 Modify Existing Service Windows service configuration information, including the file path to the service's executable or recovery programs/comm… persistence
T1112 Modify Registry Adversaries may interact with the Windows Registry as part of a variety of other techniques to aid in defense evasion, p… defense-evasion
T1601 Modify System Image Adversaries may make changes to the operating system of embedded network devices to weaken defenses and provide new capa… defense-evasion
T1218.005 Mshta Adversaries may abuse mshta.exe to proxy execution of malicious .hta files and Javascript or VBScript through a trusted … defense-evasion
T1170 Mshta Mshta.exe is a utility that executes Microsoft HTML Applications (HTA). HTA files have the file extension <code>.hta</co… defense-evasion
T1218.007 Msiexec Adversaries may abuse msiexec.exe to proxy execution of malicious payloads. Msiexec.exe is the command-line utility for … defense-evasion
T1556.006 Multi-Factor Authentication Adversaries may disable or modify multi-factor authentication (MFA) mechanisms to enable persistent access to compromise… credential-access
T1111 Multi-Factor Authentication Interception Adversaries may target multi-factor authentication (MFA) mechanisms, (i.e., smart cards, token generators, etc.) to gain… credential-access
T1621 Multi-Factor Authentication Request Generation Adversaries may attempt to bypass multi-factor authentication (MFA) mechanisms and gain access to accounts by generating… credential-access
T1104 Multi-Stage Channels Adversaries may create multiple stages for command and control that are employed under different conditions or for certa… command-and-control
T1188 Multi-hop Proxy To disguise the source of malicious traffic, adversaries may chain together multiple proxies. Typically, a defender will… command-and-control
T1090.003 Multi-hop Proxy Adversaries may chain together multiple proxies to disguise the source of malicious traffic. Typically, a defender will … command-and-control
T1026 Multiband Communication **This technique has been deprecated and should no longer be used.** Some adversaries may split communications between … command-and-control
T1079 Multilayer Encryption An adversary performs C2 communications using multiple layers of encryption, typically (but not exclusively) tunneling a… command-and-control
T1480.002 Mutual Exclusion Adversaries may constrain execution or actions based on the presence of a mutex associated with malware. A mutex is a lo… defense-evasion
T1003.003 NTDS Adversaries may attempt to access or create a copy of the Active Directory domain database in order to steal credential … credential-access
T1564.004 NTFS File Attributes Adversaries may use NTFS file attributes to hide their malicious data in order to evade detection. Every New Technology … defense-evasion
T1096 NTFS File Attributes Every New Technology File System (NTFS) formatted partition contains a Master File Table (MFT) that maintains a record f… defense-evasion
T1106 Native API Adversaries may interact with the native OS application programming interface (API) to execute behaviors. Native APIs pr… execution
T1128 Netsh Helper DLL Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configura… persistence
T1546.007 Netsh Helper DLL Adversaries may establish persistence by executing malicious content triggered by Netsh Helper DLLs. Netsh.exe (also ref… privilege-escalation
T1599.001 Network Address Translation Traversal Adversaries may bridge network boundaries by modifying a network device’s Network Address Translation (NAT) configuratio… defense-evasion
T1599 Network Boundary Bridging Adversaries may bridge network boundaries by compromising perimeter network devices or internal devices responsible for … defense-evasion
T1498 Network Denial of Service Adversaries may perform Network Denial of Service (DoS) attacks to degrade or block the availability of targeted resourc… impact
T1556.004 Network Device Authentication Adversaries may use [Patch System Image](https://attack.mitre.org/techniques/T1601/001) to hard code a password in the o… credential-access
T1059.008 Network Device CLI Adversaries may abuse scripting or built-in command line interpreters (CLI) on network devices to execute malicious comm… execution
T1602.002 Network Device Configuration Dump Adversaries may access network configuration files to collect sensitive data about the device and the network. The netwo… collection
T1584.008 Network Devices Adversaries may compromise third-party network devices that can be used during targeting. Network devices, such as small… resource-development
T1037.003 Network Logon Script Adversaries may use network logon scripts automatically executed at logon initialization to establish persistence. Netwo… persistence
T1556.008 Network Provider DLL Adversaries may register malicious network provider dynamic link libraries (DLLs) to capture cleartext user credentials … credential-access