add galaxy icon to mitre-cti tools & regenerate galaxies

pull/102/head
Deborah Servili 2017-10-26 10:28:05 +02:00
parent fa8c4ec839
commit 3a41799542
15 changed files with 6214 additions and 5728 deletions

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -1,407 +1,433 @@
{ {
"values": [ "name": "Tool",
{ "authors": [
"value": "at", "MITRE"
"description": "at is used to schedule tasks on a system to run at a specified date or time.[[Citation: TechNet At]]\n\nAliases: at, at.exe", ],
"meta": { "type": "mitre-tool",
"uuid": "0c8465c0-d0b4-4670-992e-4eee8d7ff952", "description": "Name of ATT&CK software",
"refs": [ "source": "https://github.com/mitre/cti",
"https://attack.mitre.org/wiki/Software/S0110", "version": 4,
"https://technet.microsoft.com/en-us/library/bb490866.aspx" "values": [
], {
"synonyms": [ "meta": {
"at", "refs": [
"at.exe" "https://attack.mitre.org/wiki/Software/S0110",
] "https://technet.microsoft.com/en-us/library/bb490866.aspx"
} ],
}, "synonyms": [
{ "at",
"value": "route", "at.exe"
"description": "route can be used to find or change information within the local system IP routing table.[[Citation: TechNet Route]]\n\nAliases: route, route.exe", ],
"meta": { "uuid": "0c8465c0-d0b4-4670-992e-4eee8d7ff952"
"uuid": "c11ac61d-50f4-444f-85d8-6f006067f0de", },
"refs": [ "value": "at",
"https://attack.mitre.org/wiki/Software/S0103", "description": "at is used to schedule tasks on a system to run at a specified date or time.[[Citation: TechNet At]]\n\nAliases: at, at.exe"
"https://technet.microsoft.com/en-us/library/bb490991.aspx" },
], {
"synonyms": [ "meta": {
"route", "refs": [
"route.exe" "https://attack.mitre.org/wiki/Software/S0103",
] "https://technet.microsoft.com/en-us/library/bb490991.aspx"
} ],
}, "synonyms": [
{ "route",
"value": "Tasklist", "route.exe"
"description": "The Tasklist utility displays a list of applications and services with their Process IDs (PID) for all tasks running on either a local or a remote computer. It is packaged with Windows operating systems and can be executed from the command-line interface.[[Citation: Microsoft Tasklist]]", ],
"meta": { "uuid": "c11ac61d-50f4-444f-85d8-6f006067f0de"
"refs": [ },
"https://attack.mitre.org/wiki/Software/S0057", "value": "route",
"https://technet.microsoft.com/en-us/library/bb491010.aspx" "description": "route can be used to find or change information within the local system IP routing table.[[Citation: TechNet Route]]\n\nAliases: route, route.exe"
], },
"uuid": "2e45723a-31da-4a7e-aaa6-e01998a6788f" {
} "meta": {
}, "refs": [
{ "https://attack.mitre.org/wiki/Software/S0057",
"value": "Windows Credential Editor", "https://technet.microsoft.com/en-us/library/bb491010.aspx"
"description": "Windows Credential Editor is a password dumping tool.[[Citation: Amplia WCE]]\n\nAliases: Windows Credential Editor, WCE", ],
"meta": { "uuid": "2e45723a-31da-4a7e-aaa6-e01998a6788f"
"uuid": "242f3da3-4425-4d11-8f5c-b842886da966", },
"refs": [ "value": "Tasklist",
"https://attack.mitre.org/wiki/Software/S0005", "description": "The Tasklist utility displays a list of applications and services with their Process IDs (PID) for all tasks running on either a local or a remote computer. It is packaged with Windows operating systems and can be executed from the command-line interface.[[Citation: Microsoft Tasklist]]"
"http://www.ampliasecurity.com/research/wcefaq.html" },
], {
"synonyms": [ "meta": {
"Windows Credential Editor", "refs": [
"WCE" "https://attack.mitre.org/wiki/Software/S0005",
] "http://www.ampliasecurity.com/research/wcefaq.html"
} ],
}, "synonyms": [
{ "Windows Credential Editor",
"value": "schtasks", "WCE"
"description": "schtasks is used to schedule execution of programs or scripts on a Windows system to run at a specific date and time.[[Citation: TechNet Schtasks]]\n\nAliases: schtasks, schtasks.exe", ],
"meta": { "uuid": "242f3da3-4425-4d11-8f5c-b842886da966"
"uuid": "c9703cd3-141c-43a0-a926-380082be5d04", },
"refs": [ "value": "Windows Credential Editor",
"https://attack.mitre.org/wiki/Software/S0111", "description": "Windows Credential Editor is a password dumping tool.[[Citation: Amplia WCE]]\n\nAliases: Windows Credential Editor, WCE"
"https://technet.microsoft.com/en-us/library/bb490996.aspx" },
], {
"synonyms": [ "meta": {
"schtasks", "refs": [
"schtasks.exe" "https://attack.mitre.org/wiki/Software/S0111",
] "https://technet.microsoft.com/en-us/library/bb490996.aspx"
} ],
}, "synonyms": [
{ "schtasks",
"value": "UACMe", "schtasks.exe"
"description": "UACMe is an open source assessment tool that contains many methods for bypassing Windows User Account Control on multiple versions of the operating system.[[Citation: Github UACMe]]", ],
"meta": { "uuid": "c9703cd3-141c-43a0-a926-380082be5d04"
"refs": [ },
"https://attack.mitre.org/wiki/Software/S0116", "value": "schtasks",
"https://github.com/hfiref0x/UACME" "description": "schtasks is used to schedule execution of programs or scripts on a Windows system to run at a specific date and time.[[Citation: TechNet Schtasks]]\n\nAliases: schtasks, schtasks.exe"
], },
"uuid": "102c3898-85e0-43ee-ae28-62a0a3ed9507" {
} "meta": {
}, "refs": [
{ "https://attack.mitre.org/wiki/Software/S0116",
"value": "ifconfig", "https://github.com/hfiref0x/UACME"
"description": "ifconfig is a Unix-based utility used to gather information about and interact with the TCP/IP settings on a system.[[Citation: Wikipedia Ifconfig]]", ],
"meta": { "uuid": "102c3898-85e0-43ee-ae28-62a0a3ed9507"
"refs": [ },
"https://attack.mitre.org/wiki/Software/S0101", "value": "UACMe",
"https://en.wikipedia.org/wiki/Ifconfig" "description": "UACMe is an open source assessment tool that contains many methods for bypassing Windows User Account Control on multiple versions of the operating system.[[Citation: Github UACMe]]"
], },
"uuid": "362dc67f-4e85-4562-9dac-1b6b7f3ec4b5" {
} "meta": {
}, "refs": [
{ "https://attack.mitre.org/wiki/Software/S0101",
"value": "Mimikatz", "https://en.wikipedia.org/wiki/Ifconfig"
"description": "Mimikatz is a credential dumper capable of obtaining plaintext Windows account logins and passwords, along with many other features that make it useful for testing the security of networks.[[Citation: Deply Mimikatz]][[Citation: Adsecurity Mimikatz Guide]]", ],
"meta": { "uuid": "362dc67f-4e85-4562-9dac-1b6b7f3ec4b5"
"refs": [ },
"https://attack.mitre.org/wiki/Software/S0002", "value": "ifconfig",
"https://adsecurity.org/?page%20id=1821", "description": "ifconfig is a Unix-based utility used to gather information about and interact with the TCP/IP settings on a system.[[Citation: Wikipedia Ifconfig]]"
"https://github.com/gentilkiwi/mimikatz" },
], {
"uuid": "afc079f3-c0ea-4096-b75d-3f05338b7f60" "meta": {
} "refs": [
}, "https://attack.mitre.org/wiki/Software/S0002",
{ "https://adsecurity.org/?page%20id=1821",
"value": "xCmd", "https://github.com/gentilkiwi/mimikatz"
"description": "xCmd is an open source tool that is similar to PsExec and allows the user to execute applications on remote systems.[[Citation: xCmd]]", ],
"meta": { "uuid": "afc079f3-c0ea-4096-b75d-3f05338b7f60"
"refs": [ },
"https://attack.mitre.org/wiki/Software/S0123", "value": "Mimikatz",
"https://ashwinrayaprolu.wordpress.com/2011/04/12/xcmd-an-alternative-to-psexec/" "description": "Mimikatz is a credential dumper capable of obtaining plaintext Windows account logins and passwords, along with many other features that make it useful for testing the security of networks.[[Citation: Deply Mimikatz]][[Citation: Adsecurity Mimikatz Guide]]"
], },
"uuid": "4fa49fc0-9162-4bdb-a37e-7aa3dcb6d38b" {
} "meta": {
}, "refs": [
{ "https://attack.mitre.org/wiki/Software/S0123",
"value": "Systeminfo", "https://ashwinrayaprolu.wordpress.com/2011/04/12/xcmd-an-alternative-to-psexec/"
"description": "Systeminfo is a Windows utility that can be used to gather detailed information about a computer.[[Citation: TechNet Systeminfo]]\n\nAliases: Systeminfo, systeminfo.exe", ],
"meta": { "uuid": "4fa49fc0-9162-4bdb-a37e-7aa3dcb6d38b"
"uuid": "7fcbc4e8-1989-441f-9ac5-e7b6ff5806f1", },
"refs": [ "value": "xCmd",
"https://attack.mitre.org/wiki/Software/S0096", "description": "xCmd is an open source tool that is similar to PsExec and allows the user to execute applications on remote systems.[[Citation: xCmd]]"
"https://technet.microsoft.com/en-us/library/bb491007.aspx" },
], {
"synonyms": [ "meta": {
"Systeminfo", "refs": [
"systeminfo.exe" "https://attack.mitre.org/wiki/Software/S0096",
] "https://technet.microsoft.com/en-us/library/bb491007.aspx"
} ],
}, "synonyms": [
{ "systeminfo.exe",
"value": "netsh", "Systeminfo"
"description": "netsh is a scripting utility used to interact with networking components on local or remote systems.[[Citation: TechNet Netsh]]\n\nAliases: netsh, netsh.exe", ],
"meta": { "uuid": "7fcbc4e8-1989-441f-9ac5-e7b6ff5806f1"
"uuid": "5a63f900-5e7e-4928-a746-dd4558e1df71", },
"refs": [ "value": "Systeminfo",
"https://attack.mitre.org/wiki/Software/S0108", "description": "Systeminfo is a Windows utility that can be used to gather detailed information about a computer.[[Citation: TechNet Systeminfo]]\n\nAliases: systeminfo.exe, Systeminfo"
"https://technet.microsoft.com/library/bb490939.aspx" },
], {
"synonyms": [ "meta": {
"netsh", "refs": [
"netsh.exe" "https://attack.mitre.org/wiki/Software/S0108",
] "https://technet.microsoft.com/library/bb490939.aspx"
} ],
}, "synonyms": [
{ "netsh",
"value": "dsquery", "netsh.exe"
"description": "dsquery is a command-line utility that can be used to query Active Directory for information from a system within a domain.[[Citation: TechNet Dsquery]] It is typically installed only on Windows Server versions but can be installed on non-server variants through the Microsoft-provided Remote Server Administration Tools bundle.\n\nAliases: dsquery, dsquery.exe", ],
"meta": { "uuid": "5a63f900-5e7e-4928-a746-dd4558e1df71"
"uuid": "38952eac-cb1b-4a71-bad2-ee8223a1c8fe", },
"refs": [ "value": "netsh",
"https://attack.mitre.org/wiki/Software/S0105", "description": "netsh is a scripting utility used to interact with networking components on local or remote systems.[[Citation: TechNet Netsh]]\n\nAliases: netsh, netsh.exe"
"https://technet.microsoft.com/en-us/library/cc732952.aspx" },
], {
"synonyms": [ "meta": {
"dsquery", "refs": [
"dsquery.exe" "https://attack.mitre.org/wiki/Software/S0105",
] "https://technet.microsoft.com/en-us/library/cc732952.aspx"
} ],
}, "synonyms": [
{ "dsquery",
"value": "gsecdump", "dsquery.exe"
"description": "gsecdump is a publicly-available credential dumper used to obtain password hashes and LSA secrets from Windows operating systems.[[Citation: TrueSec Gsecdump]]", ],
"meta": { "uuid": "38952eac-cb1b-4a71-bad2-ee8223a1c8fe"
"refs": [ },
"https://attack.mitre.org/wiki/Software/S0008", "value": "dsquery",
"http://www.truesec.com/Tools/Tool/gsecdump%20v2.0b5" "description": "dsquery is a command-line utility that can be used to query Active Directory for information from a system within a domain.[[Citation: TechNet Dsquery]] It is typically installed only on Windows Server versions but can be installed on non-server variants through the Microsoft-provided Remote Server Administration Tools bundle.\n\nAliases: dsquery, dsquery.exe"
], },
"uuid": "b07c2c47-fefb-4d7c-a69e-6a3296171f54" {
} "meta": {
}, "refs": [
{ "https://attack.mitre.org/wiki/Software/S0008",
"value": "Ping", "http://www.truesec.com/Tools/Tool/gsecdump%20v2.0b5"
"description": "Ping is an operating system utility commonly used to troubleshoot and verify network connections.[[Citation: TechNet Ping]]\n\nAliases: Ping, ping.exe", ],
"meta": { "uuid": "b07c2c47-fefb-4d7c-a69e-6a3296171f54"
"uuid": "b77b563c-34bb-4fb8-86a3-3694338f7b47", },
"refs": [ "value": "gsecdump",
"https://attack.mitre.org/wiki/Software/S0097", "description": "gsecdump is a publicly-available credential dumper used to obtain password hashes and LSA secrets from Windows operating systems.[[Citation: TrueSec Gsecdump]]"
"https://technet.microsoft.com/en-us/library/bb490968.aspx" },
], {
"synonyms": [ "meta": {
"Ping", "refs": [
"ping.exe" "https://attack.mitre.org/wiki/Software/S0097",
] "https://technet.microsoft.com/en-us/library/bb490968.aspx"
} ],
}, "synonyms": [
{ "ping.exe",
"value": "Fgdump", "Ping"
"description": "Fgdump is a Windows password hash dumper.[[Citation: Mandiant APT1]]", ],
"meta": { "uuid": "b77b563c-34bb-4fb8-86a3-3694338f7b47"
"refs": [ },
"https://attack.mitre.org/wiki/Software/S0120", "value": "Ping",
"https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf" "description": "Ping is an operating system utility commonly used to troubleshoot and verify network connections.[[Citation: TechNet Ping]]\n\nAliases: ping.exe, Ping"
], },
"uuid": "4f45dfeb-fe51-4df0-8db3-edf7dd0513fe" {
} "meta": {
}, "refs": [
{ "https://attack.mitre.org/wiki/Software/S0120",
"value": "Lslsass", "https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf"
"description": "Lslsass is a publicly-available tool that can dump active logon session password hashes from the lsass process.[[Citation: Mandiant APT1]]", ],
"meta": { "uuid": "4f45dfeb-fe51-4df0-8db3-edf7dd0513fe"
"refs": [ },
"https://attack.mitre.org/wiki/Software/S0121", "value": "Fgdump",
"https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf" "description": "Fgdump is a Windows password hash dumper.[[Citation: Mandiant APT1]]"
], },
"uuid": "2fab555f-7664-4623-b4e0-1675ae38190b" {
} "meta": {
}, "refs": [
{ "https://attack.mitre.org/wiki/Software/S0121",
"value": "Pass-The-Hash Toolkit", "https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf"
"description": "Pass-The-Hash Toolkit is a toolkit that allows an adversary to \"pass\" a password hash (without knowing the original password) to log in to systems.[[Citation: Mandiant APT1]]", ],
"meta": { "uuid": "2fab555f-7664-4623-b4e0-1675ae38190b"
"refs": [ },
"https://attack.mitre.org/wiki/Software/S0122", "value": "Lslsass",
"https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf" "description": "Lslsass is a publicly-available tool that can dump active logon session password hashes from the lsass process.[[Citation: Mandiant APT1]]"
], },
"uuid": "a52edc76-328d-4596-85e7-d56ef5a9eb69" {
} "meta": {
}, "refs": [
{ "https://attack.mitre.org/wiki/Software/S0122",
"value": "FTP", "https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf"
"description": "FTP is a utility commonly available with operating systems to transfer information over the File Transfer Protocol (FTP). Adversaries can use it to transfer other tools onto a system or to exfiltrate data.[[Citation: Wikipedia FTP]]\n\nAliases: FTP, ftp.exe", ],
"meta": { "uuid": "a52edc76-328d-4596-85e7-d56ef5a9eb69"
"uuid": "cf23bf4a-e003-4116-bbae-1ea6c558d565", },
"refs": [ "value": "Pass-The-Hash Toolkit",
"https://attack.mitre.org/wiki/Software/S0095", "description": "Pass-The-Hash Toolkit is a toolkit that allows an adversary to \"pass\" a password hash (without knowing the original password) to log in to systems.[[Citation: Mandiant APT1]]"
"https://en.wikipedia.org/wiki/File%20Transfer%20Protocol" },
], {
"synonyms": [ "meta": {
"FTP", "refs": [
"ftp.exe" "https://attack.mitre.org/wiki/Software/S0095",
] "https://en.wikipedia.org/wiki/File%20Transfer%20Protocol"
} ],
}, "synonyms": [
{ "FTP",
"value": "ipconfig", "ftp.exe"
"description": "ipconfig is a Windows utility that can be used to find information about a system's TCP/IP, DNS, DHCP, and adapter configuration.[[Citation: TechNet Ipconfig]]\n\nAliases: ipconfig, ipconfig.exe", ],
"meta": { "uuid": "cf23bf4a-e003-4116-bbae-1ea6c558d565"
"uuid": "294e2560-bd48-44b2-9da2-833b5588ad11", },
"refs": [ "value": "FTP",
"https://attack.mitre.org/wiki/Software/S0100", "description": "FTP is a utility commonly available with operating systems to transfer information over the File Transfer Protocol (FTP). Adversaries can use it to transfer other tools onto a system or to exfiltrate data.[[Citation: Wikipedia FTP]]\n\nAliases: FTP, ftp.exe"
"https://technet.microsoft.com/en-us/library/bb490921.aspx" },
], {
"synonyms": [ "meta": {
"ipconfig", "refs": [
"ipconfig.exe" "https://attack.mitre.org/wiki/Software/S0100",
] "https://technet.microsoft.com/en-us/library/bb490921.aspx"
} ],
}, "synonyms": [
{ "ipconfig",
"value": "nbtstat", "ipconfig.exe"
"description": "nbtstat is a utility used to troubleshoot NetBIOS name resolution.[[Citation: TechNet Nbtstat]]\n\nAliases: nbtstat, nbtstat.exe", ],
"meta": { "uuid": "294e2560-bd48-44b2-9da2-833b5588ad11"
"uuid": "b35068ec-107a-4266-bda8-eb7036267aea", },
"refs": [ "value": "ipconfig",
"https://attack.mitre.org/wiki/Software/S0102", "description": "ipconfig is a Windows utility that can be used to find information about a system's TCP/IP, DNS, DHCP, and adapter configuration.[[Citation: TechNet Ipconfig]]\n\nAliases: ipconfig, ipconfig.exe"
"https://technet.microsoft.com/en-us/library/cc940106.aspx" },
], {
"synonyms": [ "meta": {
"nbtstat", "refs": [
"nbtstat.exe" "https://attack.mitre.org/wiki/Software/S0160",
] "https://technet.microsoft.com/library/cc732443.aspx"
} ],
}, "synonyms": [
{ "certutil",
"value": "HTRAN", "certutil.exe"
"description": "HTRAN is a tool that proxies connections through intermediate hops and aids users in disguising their true geographical location. It can be used by adversaries to hide their location when interacting with the victim networks. [[Citation: Operation Quantum Entanglement]]\n\nAliases: HTRAN, HUC Packet Transmit Tool", ],
"meta": { "uuid": "3e205e84-9f90-4b4b-8896-c82189936a15"
"uuid": "d5e96a35-7b0b-4c6a-9533-d63ecbda563e", },
"refs": [ "value": "certutil",
"https://attack.mitre.org/wiki/Software/S0040", "description": "Certutil is a command-line utility that can be used to obtain certificate authority information and configure Certificate Services.[[Citation: TechNet Certutil]]\n\nAliases: certutil, certutil.exe"
"https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/wp-operation-quantum-entanglement.pdf" },
], {
"synonyms": [ "meta": {
"HTRAN", "refs": [
"HUC Packet Transmit Tool" "https://attack.mitre.org/wiki/Software/S0102",
] "https://technet.microsoft.com/en-us/library/cc940106.aspx"
} ],
}, "synonyms": [
{ "nbtstat",
"value": "netstat", "nbtstat.exe"
"description": "netstat is an operating system utility that displays active TCP connections, listening ports, and network statistics.[[Citation: TechNet Netstat]]\n\nAliases: netstat, netstat.exe", ],
"meta": { "uuid": "b35068ec-107a-4266-bda8-eb7036267aea"
"uuid": "4664b683-f578-434f-919b-1c1aad2a1111", },
"refs": [ "value": "nbtstat",
"https://attack.mitre.org/wiki/Software/S0104", "description": "nbtstat is a utility used to troubleshoot NetBIOS name resolution.[[Citation: TechNet Nbtstat]]\n\nAliases: nbtstat, nbtstat.exe"
"https://technet.microsoft.com/en-us/library/bb490947.aspx" },
], {
"synonyms": [ "meta": {
"netstat", "refs": [
"netstat.exe" "https://attack.mitre.org/wiki/Software/S0040",
] "https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/wp-operation-quantum-entanglement.pdf"
} ],
}, "synonyms": [
{ "HTRAN",
"value": "pwdump", "HUC Packet Transmit Tool"
"description": "pwdump is a credential dumper.[[Citation: Wikipedia pwdump]]", ],
"meta": { "uuid": "d5e96a35-7b0b-4c6a-9533-d63ecbda563e"
"refs": [ },
"https://attack.mitre.org/wiki/Software/S0006", "value": "HTRAN",
"https://en.wikipedia.org/wiki/Pwdump" "description": "HTRAN is a tool that proxies connections through intermediate hops and aids users in disguising their true geographical location. It can be used by adversaries to hide their location when interacting with the victim networks. [[Citation: Operation Quantum Entanglement]]\n\nAliases: HTRAN, HUC Packet Transmit Tool"
], },
"uuid": "9de2308e-7bed-43a3-8e58-f194b3586700" {
} "meta": {
}, "refs": [
{ "https://attack.mitre.org/wiki/Software/S0104",
"value": "Cachedump", "https://technet.microsoft.com/en-us/library/bb490947.aspx"
"description": "Cachedump is a publicly-available tool that program extracts cached password hashes from a systems registry.[[Citation: Mandiant APT1]]", ],
"meta": { "synonyms": [
"refs": [ "netstat",
"https://attack.mitre.org/wiki/Software/S0119", "netstat.exe"
"https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf" ],
], "uuid": "4664b683-f578-434f-919b-1c1aad2a1111"
"uuid": "c9cd7ec9-40b7-49db-80be-1399eddd9c52" },
} "value": "netstat",
}, "description": "netstat is an operating system utility that displays active TCP connections, listening ports, and network statistics.[[Citation: TechNet Netstat]]\n\nAliases: netstat, netstat.exe"
{ },
"value": "Net", {
"description": "The Net utility is a component of the Windows operating system. It is used in command-line operations for control of users, groups, services, and network connections.Net has a great deal of functionality,[[Citation: Savill 1999]] much of which is useful for an adversary, such as gathering system and network information for [[Discovery]], moving laterally through [[Windows admin shares]] using <code>net use</code> commands, and interacting with services.\n\nAliases: Net, net.exe", "meta": {
"meta": { "refs": [
"uuid": "03342581-f790-4f03-ba41-e82e67392e23", "https://attack.mitre.org/wiki/Software/S0006",
"refs": [ "https://en.wikipedia.org/wiki/Pwdump"
"https://attack.mitre.org/wiki/Software/S0039", ],
"https://msdn.microsoft.com/en-us/library/aa939914", "uuid": "9de2308e-7bed-43a3-8e58-f194b3586700"
"http://windowsitpro.com/windows/netexe-reference" },
], "value": "pwdump",
"synonyms": [ "description": "pwdump is a credential dumper.[[Citation: Wikipedia pwdump]]"
"Net", },
"net.exe" {
] "meta": {
} "refs": [
}, "https://attack.mitre.org/wiki/Software/S0119",
{ "https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf"
"value": "PsExec", ],
"description": "PsExec is a free Microsoft tool that can be used to execute a program on another computer. It is used by IT administrators and attackers.[[Citation: Russinovich Sysinternals]][[Citation: SANS PsExec]]", "uuid": "c9cd7ec9-40b7-49db-80be-1399eddd9c52"
"meta": { },
"refs": [ "value": "Cachedump",
"https://attack.mitre.org/wiki/Software/S0029", "description": "Cachedump is a publicly-available tool that program extracts cached password hashes from a system\u2019s registry.[[Citation: Mandiant APT1]]"
"https://technet.microsoft.com/en-us/sysinternals/bb897553.aspx", },
"https://digital-forensics.sans.org/blog/2012/12/17/protecting-privileged-domain-accounts-psexec-deep-dive" {
], "meta": {
"uuid": "ff6caf67-ea1f-4895-b80e-4bb0fc31c6db" "refs": [
} "https://attack.mitre.org/wiki/Software/S0039",
}, "https://msdn.microsoft.com/en-us/library/aa939914",
{ "http://windowsitpro.com/windows/netexe-reference"
"value": "Arp", ],
"description": "Arp displays information about a system's Address Resolution Protocol (ARP) cache.[[Citation: TechNet Arp]]\n\nAliases: Arp, arp.exe", "synonyms": [
"meta": { "Net",
"uuid": "30489451-5886-4c46-90c9-0dff9adc5252", "net.exe"
"refs": [ ],
"https://attack.mitre.org/wiki/Software/S0099", "uuid": "03342581-f790-4f03-ba41-e82e67392e23"
"https://technet.microsoft.com/en-us/library/bb490864.aspx" },
], "value": "Net",
"synonyms": [ "description": "The Net utility is a component of the Windows operating system. It is used in command-line operations for control of users, groups, services, and network connections.Net has a great deal of functionality,[[Citation: Savill 1999]] much of which is useful for an adversary, such as gathering system and network information for [[Discovery]], moving laterally through [[Windows admin shares]] using <code>net use</code> commands, and interacting with services.\n\nAliases: Net, net.exe"
"Arp", },
"arp.exe" {
] "meta": {
} "refs": [
}, "https://attack.mitre.org/wiki/Software/S0029",
{ "https://technet.microsoft.com/en-us/sysinternals/bb897553.aspx",
"value": "cmd", "https://digital-forensics.sans.org/blog/2012/12/17/protecting-privileged-domain-accounts-psexec-deep-dive"
"description": "cmd is the Windows command-line interpreter that can be used to interact with systems and execute other processes and utilities.[[Citation: TechNet Cmd]]\n\nCmd.exe contains native functionality to perform many operations to interact with the system, including listing files in a directory (e.g., <code>dir</code>[[Citation: TechNet Dir]]), deleting files (e.g., <code>del</code>[[Citation: TechNet Del]]), and copying files (e.g., <code>copy</code>[[Citation: TechNet Copy]]).\n\nAliases: cmd, cmd.exe", ],
"meta": { "uuid": "ff6caf67-ea1f-4895-b80e-4bb0fc31c6db"
"uuid": "bba595da-b73a-4354-aa6c-224d4de7cb4e", },
"refs": [ "value": "PsExec",
"https://attack.mitre.org/wiki/Software/S0106", "description": "PsExec is a free Microsoft tool that can be used to execute a program on another computer. It is used by IT administrators and attackers.[[Citation: Russinovich Sysinternals]][[Citation: SANS PsExec]]"
"https://technet.microsoft.com/en-us/library/bb490880.aspx", },
"https://technet.microsoft.com/en-us/library/bb490886.aspx", {
"https://technet.microsoft.com/en-us/library/cc771049.aspx", "meta": {
"https://technet.microsoft.com/en-us/library/cc755121.aspx" "refs": [
], "https://attack.mitre.org/wiki/Software/S0099",
"synonyms": [ "https://technet.microsoft.com/en-us/library/bb490864.aspx"
"cmd", ],
"cmd.exe" "synonyms": [
] "Arp",
} "arp.exe"
}, ],
{ "uuid": "30489451-5886-4c46-90c9-0dff9adc5252"
"value": "Reg", },
"description": "Reg is a Windows utility used to interact with the Windows Registry. It can be used at the command-line interface to query, add, modify, and remove information.Reg are known to be used by persistent threats.[[Citation: Windows Commands JPCERT]]\n\nAliases: Reg, reg.exe", "value": "Arp",
"meta": { "description": "Arp displays information about a system's Address Resolution Protocol (ARP) cache.[[Citation: TechNet Arp]]\n\nAliases: Arp, arp.exe"
"uuid": "cde2d700-9ed1-46cf-9bce-07364fe8b24f", },
"refs": [ {
"https://attack.mitre.org/wiki/Software/S0075", "meta": {
"https://technet.microsoft.com/en-us/library/cc732643.aspx", "refs": [
"http://blog.jpcert.or.jp/2016/01/windows-commands-abused-by-attackers.html" "https://attack.mitre.org/wiki/Software/S0106",
], "https://technet.microsoft.com/en-us/library/cc771049.aspx",
"synonyms": [ "https://technet.microsoft.com/en-us/library/cc755121.aspx",
"Reg", "https://technet.microsoft.com/en-us/library/bb490886.aspx",
"reg.exe" "https://technet.microsoft.com/en-us/library/bb490880.aspx"
] ],
} "synonyms": [
} "cmd",
], "cmd.exe"
"type": "mitre-tool", ],
"authors": [ "uuid": "bba595da-b73a-4354-aa6c-224d4de7cb4e"
"MITRE" },
], "value": "cmd",
"version": 2, "description": "cmd is the Windows command-line interpreter that can be used to interact with systems and execute other processes and utilities.[[Citation: TechNet Cmd]]\n\nCmd.exe contains native functionality to perform many operations to interact with the system, including listing files in a directory (e.g., <code>dir</code>[[Citation: TechNet Dir]]), deleting files (e.g., <code>del</code>[[Citation: TechNet Del]]), and copying files (e.g., <code>copy</code>[[Citation: TechNet Copy]]).\n\nAliases: cmd, cmd.exe"
"source": "https://github.com/mitre/cti", },
"name": "Tool", {
"description": "Name of ATT&CK software", "meta": {
"uuid": "d700dc5c-78f6-11e7-a476-5f748c8e4fe0" "refs": [
} "https://attack.mitre.org/wiki/Software/S0154",
"https://cobaltstrike.com/downloads/csmanual38.pdf"
],
"uuid": "3da22160-12d9-4d27-a99f-338e8de3844a"
},
"value": "Cobalt Strike",
"description": "Cobalt Strike is a commercial, full-featured, penetration testing tool which bills itself as \u201cadversary simulation software designed to execute targeted attacks and emulate the post-exploitation actions of advanced threat actors\u201d. Cobalt Strike\u2019s interactive post-exploit capabilities cover the full range of ATT&CK tactics, all executed within a single, integrated system.Cobalt Strike leverages the capabilities of other well-known tools such as Metasploit and Mimikatz.[[Citation: cobaltstrike manual]]\n\nThe list of techniques below focuses on Cobalt Strike\u2019s ATT&CK-relevant tactics."
},
{
"meta": {
"refs": [
"https://attack.mitre.org/wiki/Software/S0075",
"http://blog.jpcert.or.jp/2016/01/windows-commands-abused-by-attackers.html",
"https://technet.microsoft.com/en-us/library/cc732643.aspx"
],
"synonyms": [
"Reg",
"reg.exe"
],
"uuid": "cde2d700-9ed1-46cf-9bce-07364fe8b24f"
},
"value": "Reg",
"description": "Reg is a Windows utility used to interact with the Windows Registry. It can be used at the command-line interface to query, add, modify, and remove information.Reg are known to be used by persistent threats.[[Citation: Windows Commands JPCERT]]\n\nAliases: Reg, reg.exe"
}
],
"uuid": "d700dc5c-78f6-11e7-a476-5f748c8e4fe0"
}

View File

@ -1,7 +1,8 @@
{ {
"type": "mitre-attack-pattern", "description": "ATT&CK Tactic",
"uuid": "c4e851fa-775f-11e7-8163-b774922098cd", "uuid": "c4e851fa-775f-11e7-8163-b774922098cd",
"version": 4,
"type": "mitre-attack-pattern",
"name": "Attack Pattern", "name": "Attack Pattern",
"version": 3, "icon": "map"
"description": "ATT&CK Tactic"
} }

View File

@ -1,8 +1,8 @@
{ {
"uuid": "6fcb4472-6de4-11e7-b5f7-37771619e14e", "version": 5,
"name": "Course of Action", "icon": "chain",
"description": "ATT&CK Mitigation", "name": "Course of Action",
"type": "mitre-course-of-action", "description": "ATT&CK Mitigation",
"icon": "chain", "type": "mitre-course-of-action",
"version": 4 "uuid": "6fcb4472-6de4-11e7-b5f7-37771619e14e"
} }

View File

@ -1,8 +1,8 @@
{ {
"type": "mitre-intrusion-set", "uuid": "1023f364-7831-11e7-8318-43b5531983ab",
"uuid": "1023f364-7831-11e7-8318-43b5531983ab", "description": "Name of ATT&CK Group",
"description": "Name of ATT&CK Group", "version": 6,
"version": 5, "icon": "user-secret",
"icon": "user-secret", "type": "mitre-intrusion-set",
"name": "Intrusion Set" "name": "Intrusion Set"
} }

View File

@ -1,8 +1,8 @@
{ {
"version": 3, "type": "mitre-malware",
"uuid": "d752161c-78f6-11e7-a0ea-bfa79b407ce4", "version": 4,
"description": "Name of ATT&CK software", "name": "Malware",
"name": "Malware", "uuid": "d752161c-78f6-11e7-a0ea-bfa79b407ce4",
"icon": "optin-monster", "icon": "optin-monster",
"type": "mitre-malware" "description": "Name of ATT&CK software"
} }

View File

@ -1,8 +1,8 @@
{ {
"name": "Tool", "name": "Tool",
"type": "mitre-tool", "type": "mitre-tool",
"description": "Name of ATT&CK software", "description": "Name of ATT&CK software",
"uuid": "d5cbd1a2-78f6-11e7-a833-7b9bccca9649", "icon": "gavel",
"icon": "gavel", "version": 4,
"version": 3 "uuid": "d5cbd1a2-78f6-11e7-a833-7b9bccca9649"
} }

View File

@ -41,6 +41,7 @@ galaxy['type'] = "mitre-attack-pattern"
galaxy['description'] = "ATT&CK Tactic" galaxy['description'] = "ATT&CK Tactic"
galaxy['uuid' ] = "c4e851fa-775f-11e7-8163-b774922098cd" galaxy['uuid' ] = "c4e851fa-775f-11e7-8163-b774922098cd"
galaxy['version'] = args.version galaxy['version'] = args.version
galaxy['icon'] = "map"
cluster = {} cluster = {}
cluster['name'] = "Attack Pattern" cluster['name'] = "Attack Pattern"

View File

@ -33,6 +33,7 @@ galaxy['type'] = "mitre-course-of-action"
galaxy['description'] = "ATT&CK Mitigation" galaxy['description'] = "ATT&CK Mitigation"
galaxy['uuid' ] = "6fcb4472-6de4-11e7-b5f7-37771619e14e" galaxy['uuid' ] = "6fcb4472-6de4-11e7-b5f7-37771619e14e"
galaxy['version'] = args.version galaxy['version'] = args.version
galaxy['icon'] = "chain"
cluster = {} cluster = {}
cluster['name'] = "Course of Action" cluster['name'] = "Course of Action"

View File

@ -38,6 +38,7 @@ galaxy['type'] = "mitre-intrusion-set"
galaxy['description'] = "Name of ATT&CK Group" galaxy['description'] = "Name of ATT&CK Group"
galaxy['uuid' ] = "1023f364-7831-11e7-8318-43b5531983ab" galaxy['uuid' ] = "1023f364-7831-11e7-8318-43b5531983ab"
galaxy['version'] = args.version galaxy['version'] = args.version
galaxy['icon'] = "user-secret"
cluster = {} cluster = {}
cluster['name'] = "intrusion Set" cluster['name'] = "intrusion Set"

View File

@ -39,6 +39,7 @@ galaxy['type'] = "mitre-malware"
galaxy['description'] = "Name of ATT&CK software" galaxy['description'] = "Name of ATT&CK software"
galaxy['uuid' ] = "d752161c-78f6-11e7-a0ea-bfa79b407ce4" galaxy['uuid' ] = "d752161c-78f6-11e7-a0ea-bfa79b407ce4"
galaxy['version'] = args.version galaxy['version'] = args.version
galaxy['icon'] = "optin-monster"
cluster = {} cluster = {}
cluster['name'] = "Malware" cluster['name'] = "Malware"

View File

@ -39,6 +39,7 @@ galaxy['type'] = "mitre-tool"
galaxy['description'] = "Name of ATT&CK software" galaxy['description'] = "Name of ATT&CK software"
galaxy['uuid' ] = "d5cbd1a2-78f6-11e7-a833-7b9bccca9649" galaxy['uuid' ] = "d5cbd1a2-78f6-11e7-a833-7b9bccca9649"
galaxy['version'] = args.version galaxy['version'] = args.version
galaxy['icon'] = "gavel"
cluster = {} cluster = {}
cluster['name'] = "Tool" cluster['name'] = "Tool"