Module: Google::Cloud::SecurityCenter::V2::MitreAttack::Technique

Defined in:
proto_docs/google/cloud/securitycenter/v2/mitre_attack.rb

Overview

MITRE ATT&CK techniques that can be referenced by Security Command Center findings. See: https://attack.mitre.org/techniques/enterprise/

Constant Summary collapse

TECHNIQUE_UNSPECIFIED =

Unspecified value.

0
DATA_OBFUSCATION =

T1001

70
DATA_OBFUSCATION_STEGANOGRAPHY =

T1001.002

71
OS_CREDENTIAL_DUMPING =

T1003

114
OS_CREDENTIAL_DUMPING_PROC_FILESYSTEM =

T1003.007

115
OS_CREDENTIAL_DUMPING_ETC_PASSWORD_AND_ETC_SHADOW =

T1003.008

122
DATA_FROM_LOCAL_SYSTEM =

T1005

117
AUTOMATED_EXFILTRATION =

T1020

68
OBFUSCATED_FILES_OR_INFO =

T1027

72
STEGANOGRAPHY =

T1027.003

73
COMPILE_AFTER_DELIVERY =

T1027.004

74
COMMAND_OBFUSCATION =

T1027.010

75
SCHEDULED_TRANSFER =

T1029

120
SYSTEM_OWNER_USER_DISCOVERY =

T1033

118
MASQUERADING =

T1036

49
MATCH_LEGITIMATE_NAME_OR_LOCATION =

T1036.005

50
BOOT_OR_LOGON_INITIALIZATION_SCRIPTS =

T1037

37
STARTUP_ITEMS =

T1037.005

38
NETWORK_SERVICE_DISCOVERY =

T1046

32
SCHEDULED_TASK_JOB =

T1053

89
SCHEDULED_TASK_JOB_CRON =

T1053.003

119
CONTAINER_ORCHESTRATION_JOB =

T1053.007

90
PROCESS_INJECTION =

T1055

93
INPUT_CAPTURE =

T1056

103
INPUT_CAPTURE_KEYLOGGING =

T1056.001

104
PROCESS_DISCOVERY =

T1057

56
COMMAND_AND_SCRIPTING_INTERPRETER =

T1059

6
UNIX_SHELL =

T1059.004

7
PYTHON =

T1059.006

59
EXPLOITATION_FOR_PRIVILEGE_ESCALATION =

T1068

63
PERMISSION_GROUPS_DISCOVERY =

T1069

18
CLOUD_GROUPS =

T1069.003

19
INDICATOR_REMOVAL =

T1070

123
INDICATOR_REMOVAL_CLEAR_LINUX_OR_MAC_SYSTEM_LOGS =

T1070.002

124
INDICATOR_REMOVAL_CLEAR_COMMAND_HISTORY =

T1070.003

125
INDICATOR_REMOVAL_FILE_DELETION =

T1070.004

64
INDICATOR_REMOVAL_TIMESTOMP =

T1070.006

128
INDICATOR_REMOVAL_CLEAR_MAILBOX_DATA =

T1070.008

126
APPLICATION_LAYER_PROTOCOL =

T1071

45
DNS =

T1071.004

46
SOFTWARE_DEPLOYMENT_TOOLS =

T1072

47
VALID_ACCOUNTS =

T1078

14
DEFAULT_ACCOUNTS =

T1078.001

35
LOCAL_ACCOUNTS =

T1078.003

15
CLOUD_ACCOUNTS =

T1078.004

16
FILE_AND_DIRECTORY_DISCOVERY =

T1083

121
ACCOUNT_DISCOVERY_LOCAL_ACCOUNT =

T1087.001

116
PROXY =

T1090

9
EXTERNAL_PROXY =

T1090.002

10
MULTI_HOP_PROXY =

T1090.003

11
ACCOUNT_MANIPULATION =

T1098

22
ADDITIONAL_CLOUD_CREDENTIALS =

T1098.001

40
ADDITIONAL_CLOUD_ROLES =

T1098.003

67
SSH_AUTHORIZED_KEYS =

T1098.004

23
ADDITIONAL_CONTAINER_CLUSTER_ROLES =

T1098.006

58
MULTI_STAGE_CHANNELS =

T1104

76
INGRESS_TOOL_TRANSFER =

T1105

3
NATIVE_API =

T1106

4
BRUTE_FORCE =

T1110

44
AUTOMATED_COLLECTION =

T1119

94
SHARED_MODULES =

T1129

5
DATA_ENCODING =

T1132

77
STANDARD_ENCODING =

T1132.001

78
ACCESS_TOKEN_MANIPULATION =

T1134

33
TOKEN_IMPERSONATION_OR_THEFT =

T1134.001

39
CREATE_ACCOUNT =

T1136

79
LOCAL_ACCOUNT =

T1136.001

80
DEOBFUSCATE_DECODE_FILES_OR_INFO =

T1140

95
EXPLOIT_PUBLIC_FACING_APPLICATION =

T1190

27
SUPPLY_CHAIN_COMPROMISE =

T1195

129
COMPROMISE_SOFTWARE_DEPENDENCIES_AND_DEVELOPMENT_TOOLS =

T1195.001

130
EXPLOITATION_FOR_CLIENT_EXECUTION =

T1203

134
USER_EXECUTION =

T1204

69
LINUX_AND_MAC_FILE_AND_DIRECTORY_PERMISSIONS_MODIFICATION =

T1222.002

135
DOMAIN_POLICY_MODIFICATION =

T1484

30
DATA_DESTRUCTION =

T1485

29
DATA_ENCRYPTED_FOR_IMPACT =

T1486

132
SERVICE_STOP =

T1489

52
INHIBIT_SYSTEM_RECOVERY =

T1490

36
FIRMWARE_CORRUPTION =

T1495

81
RESOURCE_HIJACKING =

T1496

8
NETWORK_DENIAL_OF_SERVICE =

T1498

17
CLOUD_SERVICE_DISCOVERY =

T1526

48
STEAL_APPLICATION_ACCESS_TOKEN =

T1528

42
ACCOUNT_ACCESS_REMOVAL =

T1531

51
TRANSFER_DATA_TO_CLOUD_ACCOUNT =

T1537

91
25
CREATE_OR_MODIFY_SYSTEM_PROCESS =

T1543

24
EVENT_TRIGGERED_EXECUTION =

T1546

65
BOOT_OR_LOGON_AUTOSTART_EXECUTION =

T1547

82
KERNEL_MODULES_AND_EXTENSIONS =

T1547.006

83
SHORTCUT_MODIFICATION =

T1547.009

127
ABUSE_ELEVATION_CONTROL_MECHANISM =

T1548

34
ABUSE_ELEVATION_CONTROL_MECHANISM_SETUID_AND_SETGID =

T1548.001

136
ABUSE_ELEVATION_CONTROL_MECHANISM_SUDO_AND_SUDO_CACHING =

T1548.003

109
UNSECURED_CREDENTIALS =

T1552

13
CREDENTIALS_IN_FILES =

T1552.001

105
BASH_HISTORY =

T1552.003

96
PRIVATE_KEYS =

T1552.004

97
SUBVERT_TRUST_CONTROL =

T1553

106
INSTALL_ROOT_CERTIFICATE =

T1553.004

107
COMPROMISE_HOST_SOFTWARE_BINARY =

T1554

84
CREDENTIALS_FROM_PASSWORD_STORES =

T1555

98
MODIFY_AUTHENTICATION_PROCESS =

T1556

28
PLUGGABLE_AUTHENTICATION_MODULES =

T1556.003

108
MULTI_FACTOR_AUTHENTICATION =

T1556.006

137
IMPAIR_DEFENSES =

T1562

31
DISABLE_OR_MODIFY_TOOLS =

T1562.001

55
INDICATOR_BLOCKING =

T1562.006

110
DISABLE_OR_MODIFY_LINUX_AUDIT_SYSTEM =

T1562.012

111
HIDE_ARTIFACTS =

T1564

85
HIDDEN_FILES_AND_DIRECTORIES =

T1564.001

86
HIDDEN_USERS =

T1564.002

87
EXFILTRATION_OVER_WEB_SERVICE =

T1567

20
EXFILTRATION_TO_CLOUD_STORAGE =

T1567.002

21
DYNAMIC_RESOLUTION =

T1568

12
LATERAL_TOOL_TRANSFER =

T1570

41
HIJACK_EXECUTION_FLOW =

T1574

112
HIJACK_EXECUTION_FLOW_DYNAMIC_LINKER_HIJACKING =

T1574.006

113
MODIFY_CLOUD_COMPUTE_INFRASTRUCTURE =

T1578

26
CREATE_SNAPSHOT =

T1578.001

54
CLOUD_INFRASTRUCTURE_DISCOVERY =

T1580

53
DEVELOP_CAPABILITIES =

T1587

99
DEVELOP_CAPABILITIES_MALWARE =

T1587.001

100
OBTAIN_CAPABILITIES =

T1588

43
OBTAIN_CAPABILITIES_MALWARE =

T1588.001

101
OBTAIN_CAPABILITIES_VULNERABILITIES =

T1588.006

133
ACTIVE_SCANNING =

T1595

1
SCANNING_IP_BLOCKS =

T1595.001

2
STAGE_CAPABILITIES =

T1608

88
UPLOAD_MALWARE =

T1608.001

102
CONTAINER_ADMINISTRATION_COMMAND =

T1609

60
DEPLOY_CONTAINER =

T1610

66
ESCAPE_TO_HOST =

T1611

61
CONTAINER_AND_RESOURCE_DISCOVERY =

T1613

57
REFLECTIVE_CODE_LOADING =

T1620

92
STEAL_OR_FORGE_AUTHENTICATION_CERTIFICATES =

T1649

62
FINANCIAL_THEFT =

T1657

131