Skip to content

Commit a32550b

Browse files
authored
Merge pull request #77 from mitre/attck-v17
update ATT&CK mapping to v17
2 parents 8ea6ab5 + 0e64fb6 commit a32550b

9 files changed

+21
-21
lines changed

data/abilities/command-and-control/1837b43e-4fff-46b2-a604-a602f7540469.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@
33
description: A Blue Python agent that executes elasticsearch queries.
44
tactic: command-and-control
55
technique:
6-
attack_id: T1071
7-
name: Standard Application Layer Protocol
6+
attack_id: T1071.001
7+
name: "Application Layer Protocol: Web Protocols"
88
platforms:
99
darwin:
1010
sh:

data/abilities/detection/1226f8ec-e2e5-4311-88e7-378c0e5cc7ce.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@
55
description: Finds suspicious URLs in received mail
66
tactic: detection
77
technique:
8-
attack_id: x
9-
name: x
8+
attack_id: T1566.002
9+
name: "Phishing: Spearphishing Link"
1010
repeatable: True
1111
platforms:
1212
linux:

data/abilities/detection/1b4aa8d5-ba97-4b9b-92a3-eaaaffbfdf0a.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@
33
description: Compare open ports against a known baseline
44
tactic: detection
55
technique:
6-
attack_id: T1065
7-
name: Uncommonly Used Port
6+
attack_id: T1571
7+
name: Non-Standard Port
88
repeatable: True
99
platforms:
1010
windows:

data/abilities/detection/8bc73098-54d1-4f69-abd5-271e3e2da5df.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@
44
description: Checks to see if a new (unauthorized) scheduled task has been added
55
tactic: detection
66
technique:
7-
attack_id: x
8-
name: x
7+
attack_id: T1053.005
8+
name: "Scheduled Task/Job: Scheduled Task"
99
repeatable: True
1010
platforms:
1111
windows:

data/abilities/detection/ee54384f-cfbc-4228-9dc1-cc5632307afb.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@
44
description: Checks to see if a new (unauthorized) cron job has been added
55
tactic: detection
66
technique:
7-
attack_id: x
8-
name: x
7+
attack_id: T1053.003
8+
name: "Scheduled Task/Job: Cron"
99
repeatable: True
1010
platforms:
1111
linux:

data/abilities/elastic_hunting/4b283acc-45c0-4de8-b0ac-ac0699e5ab95.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@
44
description: Search for Sysmon Event 1 powershell records with "ExecutionPolicy" and "Bypass"
55
tactic: hunt
66
technique:
7-
attack_id: x
8-
name: x
7+
attack_id: T1059.001
8+
name: "Command and Scripting Interpreter: PowerShell"
99
platforms:
1010
windows:
1111
elasticsearch: &cmd

data/abilities/response/32e563bb-ba06-4bcc-b817-fc2c434c0b66.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@
44
description: Removes newly added cron jobs
55
tactic: response
66
technique:
7-
attack_id: x
8-
name: x
7+
attack_id: T1053.003
8+
name: "Scheduled Task/Job: Cron"
99
platforms:
1010
linux:
1111
sh:
@@ -35,4 +35,4 @@
3535
edge: has_new_cronjob
3636
target: host.new.cronjob
3737
- plugins.stockpile.app.requirements.paw_provenance:
38-
- source: host.new.cronjob
38+
- source: host.new.cronjob

data/abilities/response/cb85039a-6196-4262-883b-0beeb804b83d.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@
44
privilege: Elevated
55
tactic: response
66
technique:
7-
attack_id: T1065
8-
name: Uncommonly Used Port
7+
attack_id: T1571
8+
name: Non-Standard Port
99
platforms:
1010
windows:
1111
psh, pwsh:
@@ -19,4 +19,4 @@
1919
- plugins.response.app.requirements.basic:
2020
- source: remote.port.unauthorized
2121
edge: has_pid
22-
target: host.pid.unauthorized
22+
target: host.pid.unauthorized

data/abilities/response/debd322d-2100-45f7-8832-29ef7c56786d.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@
44
privilege: Elevated
55
tactic: response
66
technique:
7-
attack_id: T1065
8-
name: Uncommonly Used Port
7+
attack_id: T1571
8+
name: Non-Standard Port
99
platforms:
1010
windows:
1111
psh, pwsh:
@@ -19,4 +19,4 @@
1919
- plugins.response.app.requirements.basic:
2020
- source: host.port.unauthorized
2121
edge: has_pid
22-
target: host.pid.unauthorized
22+
target: host.pid.unauthorized

0 commit comments

Comments
 (0)