Document toolboxDocument toolbox

Mitre alert packs T1600-1699

[ 1 T1606 ] [ 2 T1608 ] [ 3 T1614 ] [ 4 T1619 ] [ 5 T1628 ]

T1606

Forge Web Credentials

Purpose

Adversaries may forge credential materials that can be used to gain access to web applications or Internet services. Web applications and services often use session cookies, tokens, or other materials to authenticate and authorize user access.

This differs from Steal Web Session Cookie, Steal Application Access Token, and other similar behaviors in that the credentials are new and forged by the adversary, rather than stolen or intercepted from legitimate users. The generation of web credentials often requires secret values, such as passwords, Private Keys, or other cryptographic seed values, acquired for temporal access by taking advantage of features such as the AssumeRole and GetFederationToken APIs in AWS.

Once forged, adversaries may use these web credentials to access resources (Use Alternate Authentication Material), which may bypass multi-factor and other authentication protection mechanisms.

Included alerts

  1. SecOpsAwsUpdateSAMLProvider

  2. SecOpsAWSSamlAccess

Prerequisites

DATA SOURCES

LOOKUPS

T1608

Stage Capabilities

Purpose

Adversaries may upload, install, or otherwise set up capabilities that can be used during targeting by staging them on an infrastructure under their control.

These capabilities might be developed (Develop Capabilities) or obtained (Obtain Capabilities) and might be staged on infrastructure that was previously purchased/rented by the adversary (Acquire Infrastructure) or was otherwise compromised by them (Compromise Infrastructure).

Capabilities may also be staged on web services, such as GitHub or Pastebin, or on Platform-as-a-Service (PaaS) offerings that enable users to easily provision applications.

Included alerts

  1. SecOpsEDRCylanceScoreUnsafe

Prerequisites

DATA SOURCES

LOOKUPS

T1614

System Location Discovery

Purpose

Adversaries may gather information in an attempt to calculate the geographical location of a victim host, which might be used it during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.

They may use various system checks, such as time zone, keyboard layout, and/or language settings. Windows API functions such as GetLocaleInfoW can also be used to determine this. In cloud environments, an instance's availability zone may also be discovered by accessing the instance metadata service from the instance.

Adversaries may also attempt to infer the location of a victim host using IP addressing, such as via online geolocation IP-lookup services.

Included alerts

  1. SecOpsWinSysTimeDiscovery

Prerequisites

DATA SOURCES

LOOKUPS

T1619

Cloud Storage Object Discovery

Purpose

Adversaries may enumerate objects in cloud storage infrastructure and use it during automated discovery to shape follow-on behaviors, including requesting all or specific objects from cloud storage. Similar to File and Directory Discovery on a local host, after identifying available storage services (Cloud Infrastructure Discovery) adversaries may access the contents/objects stored in cloud infrastructure.

Cloud service providers offer APIs allowing users to enumerate objects stored within cloud storage. Examples include ListObjectsV2 in AWS and List Blobs in Azure.

Included alerts

  1. SecOpsAwsDbSnapshotCreated

Prerequisites

DATA SOURCES

LOOKUPS

T1628

Hide Artifacts

Purpose

Adversaries may attempt to hide artifacts associated with their behaviors to evade detection. Operating systems may have features to hide various artifacts, such as important system files and administrative task execution, to avoid disrupting user work environments and prevent users from changing files or features on the system. Adversaries may abuse these features to hide artifacts such as files, directories, user accounts, or other system activity to evade detection.

Adversaries may also attempt to hide artifacts associated with malicious behavior by creating computing regions that are isolated from common security instrumentation, such as through the use of virtualization technology.

Included alerts

  1. SecOpsLinuxHiddenFilesCreated

  2. SecOpsWinRegistryModificationGlobalFolderOptions

  3. SecOpsWinFsutilDeleteChangeJournal

Prerequisites

DATA SOURCES

LOOKUPS