@@ -660,7 +660,7 @@ var TechniqueDict = map[string]Technique{
660
660
Name : "CAPEC-35: Leverage Executable Code in Non-Executable Files" ,
661
661
},
662
662
"CAPEC-36" : {
663
- Name : "CAPEC-36: Using Unpublished Interfaces" ,
663
+ Name : "CAPEC-36: Using Unpublished Interfaces or Functionality " ,
664
664
},
665
665
"CAPEC-37" : {
666
666
Name : "CAPEC-37: Retrieve Embedded Sensitive Data" ,
@@ -831,7 +831,7 @@ var TechniqueDict = map[string]Technique{
831
831
Name : "CAPEC-442: Infected Software" ,
832
832
},
833
833
"CAPEC-443" : {
834
- Name : "CAPEC-443: Malicious Logic Inserted Into Product Software by Authorized Developer" ,
834
+ Name : "CAPEC-443: Malicious Logic Inserted Into Product by Authorized Developer" ,
835
835
},
836
836
"CAPEC-444" : {
837
837
Name : "CAPEC-444: Development Alteration" ,
@@ -840,7 +840,7 @@ var TechniqueDict = map[string]Technique{
840
840
Name : "CAPEC-445: Malicious Logic Insertion into Product Software via Configuration Management Manipulation" ,
841
841
},
842
842
"CAPEC-446" : {
843
- Name : "CAPEC-446: Malicious Logic Insertion into Product Software via Inclusion of 3rd Party Component Dependency " ,
843
+ Name : "CAPEC-446: Malicious Logic Insertion into Product via Inclusion of Third- Party Component" ,
844
844
},
845
845
"CAPEC-447" : {
846
846
Name : "CAPEC-447: Design Alteration" ,
@@ -1382,9 +1382,6 @@ var TechniqueDict = map[string]Technique{
1382
1382
"CAPEC-628" : {
1383
1383
Name : "CAPEC-628: Carry-Off GPS Attack" ,
1384
1384
},
1385
- "CAPEC-629" : {
1386
- Name : "CAPEC-629: Unauthorized Use of Device Resources" ,
1387
- },
1388
1385
"CAPEC-63" : {
1389
1386
Name : "CAPEC-63: Cross-Site Scripting (XSS)" ,
1390
1387
},
@@ -1464,7 +1461,7 @@ var TechniqueDict = map[string]Technique{
1464
1461
Name : "CAPEC-652: Use of Known Kerberos Credentials" ,
1465
1462
},
1466
1463
"CAPEC-653" : {
1467
- Name : "CAPEC-653: Use of Known Windows Credentials" ,
1464
+ Name : "CAPEC-653: Use of Known Operating System Credentials" ,
1468
1465
},
1469
1466
"CAPEC-654" : {
1470
1467
Name : "CAPEC-654: Credential Prompt Impersonation" ,
@@ -1553,9 +1550,39 @@ var TechniqueDict = map[string]Technique{
1553
1550
"CAPEC-681" : {
1554
1551
Name : "CAPEC-681: Exploitation of Improperly Controlled Hardware Security Identifiers" ,
1555
1552
},
1553
+ "CAPEC-682" : {
1554
+ Name : "CAPEC-682: Exploitation of Firmware or ROM Code with Unpatchable Vulnerabilities" ,
1555
+ },
1556
1556
"CAPEC-69" : {
1557
1557
Name : "CAPEC-69: Target Programs with Elevated Privileges" ,
1558
1558
},
1559
+ "CAPEC-690" : {
1560
+ Name : "CAPEC-690: Metadata Spoofing" ,
1561
+ },
1562
+ "CAPEC-691" : {
1563
+ Name : "CAPEC-691: Spoof Open-Source Software Metadata" ,
1564
+ },
1565
+ "CAPEC-692" : {
1566
+ Name : "CAPEC-692: Spoof Version Control System Commit Metadata" ,
1567
+ },
1568
+ "CAPEC-693" : {
1569
+ Name : "CAPEC-693: StarJacking" ,
1570
+ },
1571
+ "CAPEC-694" : {
1572
+ Name : "CAPEC-694: System Location Discovery" ,
1573
+ },
1574
+ "CAPEC-695" : {
1575
+ Name : "CAPEC-695: Repo Jacking" ,
1576
+ },
1577
+ "CAPEC-696" : {
1578
+ Name : "CAPEC-696: Load Value Injection" ,
1579
+ },
1580
+ "CAPEC-697" : {
1581
+ Name : "CAPEC-697: DHCP Spoofing" ,
1582
+ },
1583
+ "CAPEC-698" : {
1584
+ Name : "CAPEC-698: Install Malicious Extension" ,
1585
+ },
1559
1586
"CAPEC-7" : {
1560
1587
Name : "CAPEC-7: Blind SQL Injection" ,
1561
1588
},
@@ -1596,7 +1623,7 @@ var TechniqueDict = map[string]Technique{
1596
1623
Name : "CAPEC-80: Using UTF-8 Encoding to Bypass Validation Logic" ,
1597
1624
},
1598
1625
"CAPEC-81" : {
1599
- Name : "CAPEC-81: Web Logs Tampering" ,
1626
+ Name : "CAPEC-81: Web Server Logs Tampering" ,
1600
1627
},
1601
1628
"CAPEC-83" : {
1602
1629
Name : "CAPEC-83: XPath Injection" ,
@@ -1814,6 +1841,18 @@ var TechniqueDict = map[string]Technique{
1814
1841
Name : "TA0005: Defense Evasion => T1027.006: HTML Smuggling" ,
1815
1842
Platforms : []string {"Linux" , "Windows" , "macOS" },
1816
1843
},
1844
+ "T1027.007" : {
1845
+ Name : "TA0005: Defense Evasion => T1027.007: Dynamic API Resolution" ,
1846
+ Platforms : []string {"Windows" },
1847
+ },
1848
+ "T1027.008" : {
1849
+ Name : "TA0005: Defense Evasion => T1027.008: Stripped Payloads" ,
1850
+ Platforms : []string {"Linux" , "Windows" , "macOS" },
1851
+ },
1852
+ "T1027.009" : {
1853
+ Name : "TA0005: Defense Evasion => T1027.009: Embedded Payloads" ,
1854
+ Platforms : []string {"Linux" , "Windows" , "macOS" },
1855
+ },
1817
1856
"T1029" : {
1818
1857
Name : "TA0010: Exfiltration => T1029: Scheduled Transfer" ,
1819
1858
Platforms : []string {"Linux" , "Windows" , "macOS" },
@@ -2087,8 +2126,8 @@ var TechniqueDict = map[string]Technique{
2087
2126
Platforms : []string {"Azure AD" , "Google Workspace" , "IaaS" , "Office 365" , "SaaS" },
2088
2127
},
2089
2128
"T1070" : {
2090
- Name : "TA0005: Defense Evasion => T1070: Indicator Removal on Host " ,
2091
- Platforms : []string {"Containers" , "Linux" , "Network" , "Windows" , "macOS" },
2129
+ Name : "TA0005: Defense Evasion => T1070: Indicator Removal" ,
2130
+ Platforms : []string {"Containers" , "Google Workspace" , " Linux" , "Network" , "Office 365 " , "Windows" , "macOS" },
2092
2131
},
2093
2132
"T1070.001" : {
2094
2133
Name : "TA0005: Defense Evasion => T1070.001: Clear Windows Event Logs" ,
@@ -2114,6 +2153,18 @@ var TechniqueDict = map[string]Technique{
2114
2153
Name : "TA0005: Defense Evasion => T1070.006: Timestomp" ,
2115
2154
Platforms : []string {"Linux" , "Windows" , "macOS" },
2116
2155
},
2156
+ "T1070.007" : {
2157
+ Name : "TA0005: Defense Evasion => T1070.007: Clear Network Connection History and Configurations" ,
2158
+ Platforms : []string {"Linux" , "Network" , "Windows" , "macOS" },
2159
+ },
2160
+ "T1070.008" : {
2161
+ Name : "TA0005: Defense Evasion => T1070.008: Clear Mailbox Data" ,
2162
+ Platforms : []string {"Google Workspace" , "Linux" , "Office 365" , "Windows" , "macOS" },
2163
+ },
2164
+ "T1070.009" : {
2165
+ Name : "TA0005: Defense Evasion => T1070.009: Clear Persistence" ,
2166
+ Platforms : []string {"Linux" , "Windows" , "macOS" },
2167
+ },
2117
2168
"T1071" : {
2118
2169
Name : "TA0011: Command and Control => T1071: Application Layer Protocol" ,
2119
2170
Platforms : []string {"Linux" , "Windows" , "macOS" },
@@ -2152,7 +2203,7 @@ var TechniqueDict = map[string]Technique{
2152
2203
},
2153
2204
"T1078" : {
2154
2205
Name : "TA0001: Initial Access, TA0003: Persistence, TA0004: Privilege Escalation, TA0005: Defense Evasion => T1078: Valid Accounts" ,
2155
- Platforms : []string {"Azure AD" , "Containers" , "Google Workspace" , "IaaS" , "Linux" , "Office 365" , "SaaS" , "Windows" , "macOS" },
2206
+ Platforms : []string {"Azure AD" , "Containers" , "Google Workspace" , "IaaS" , "Linux" , "Network" , " Office 365" , "SaaS" , "Windows" , "macOS" },
2156
2207
},
2157
2208
"T1078.001" : {
2158
2209
Name : "TA0001: Initial Access, TA0003: Persistence, TA0004: Privilege Escalation, TA0005: Defense Evasion => T1078.001: Default Accounts" ,
@@ -2504,7 +2555,7 @@ var TechniqueDict = map[string]Technique{
2504
2555
},
2505
2556
"T1199" : {
2506
2557
Name : "TA0001: Initial Access => T1199: Trusted Relationship" ,
2507
- Platforms : []string {"IaaS" , "Linux" , "SaaS" , "Windows" , "macOS" },
2558
+ Platforms : []string {"IaaS" , "Linux" , "Office 365" , " SaaS" , "Windows" , "macOS" },
2508
2559
},
2509
2560
"T1200" : {
2510
2561
Name : "TA0001: Initial Access => T1200: Hardware Additions" ,
@@ -2546,6 +2597,10 @@ var TechniqueDict = map[string]Technique{
2546
2597
Name : "TA0003: Persistence, TA0005: Defense Evasion, TA0011: Command and Control => T1205.001: Port Knocking" ,
2547
2598
Platforms : []string {"Linux" , "Network" , "Windows" , "macOS" },
2548
2599
},
2600
+ "T1205.002" : {
2601
+ Name : "TA0003: Persistence, TA0005: Defense Evasion, TA0011: Command and Control => T1205.002: Socket Filters" ,
2602
+ Platforms : []string {"Linux" , "Windows" , "macOS" },
2603
+ },
2549
2604
"T1207" : {
2550
2605
Name : "TA0005: Defense Evasion => T1207: Rogue Domain Controller" ,
2551
2606
Platforms : []string {"Windows" },
@@ -2780,7 +2835,7 @@ var TechniqueDict = map[string]Technique{
2780
2835
},
2781
2836
"T1505" : {
2782
2837
Name : "TA0003: Persistence => T1505: Server Software Component" ,
2783
- Platforms : []string {"Linux" , "Windows" , "macOS" },
2838
+ Platforms : []string {"Linux" , "Network" , " Windows" , "macOS" },
2784
2839
},
2785
2840
"T1505.001" : {
2786
2841
Name : "TA0003: Persistence => T1505.001: SQL Stored Procedures" ,
@@ -2792,7 +2847,7 @@ var TechniqueDict = map[string]Technique{
2792
2847
},
2793
2848
"T1505.003" : {
2794
2849
Name : "TA0003: Persistence => T1505.003: Web Shell" ,
2795
- Platforms : []string {"Linux" , "Windows" , "macOS" },
2850
+ Platforms : []string {"Linux" , "Network" , " Windows" , "macOS" },
2796
2851
},
2797
2852
"T1505.004" : {
2798
2853
Name : "TA0003: Persistence => T1505.004: IIS Components" ,
@@ -2827,8 +2882,8 @@ var TechniqueDict = map[string]Technique{
2827
2882
Platforms : []string {"Linux" , "Network" , "Windows" , "macOS" },
2828
2883
},
2829
2884
"T1530" : {
2830
- Name : "TA0009: Collection => T1530: Data from Cloud Storage Object " ,
2831
- Platforms : []string {"IaaS" },
2885
+ Name : "TA0009: Collection => T1530: Data from Cloud Storage" ,
2886
+ Platforms : []string {"IaaS" , "SaaS" },
2832
2887
},
2833
2888
"T1531" : {
2834
2889
Name : "TA0040: Impact => T1531: Account Access Removal" ,
@@ -2900,7 +2955,7 @@ var TechniqueDict = map[string]Technique{
2900
2955
},
2901
2956
"T1546" : {
2902
2957
Name : "TA0003: Persistence, TA0004: Privilege Escalation => T1546: Event Triggered Execution" ,
2903
- Platforms : []string {"Linux" , "Windows" , "macOS" },
2958
+ Platforms : []string {"IaaS" , " Linux" , "Office 365" , "SaaS " , "Windows" , "macOS" },
2904
2959
},
2905
2960
"T1546.001" : {
2906
2961
Name : "TA0003: Persistence, TA0004: Privilege Escalation => T1546.001: Change Default File Association" ,
@@ -2962,6 +3017,10 @@ var TechniqueDict = map[string]Technique{
2962
3017
Name : "TA0003: Persistence, TA0004: Privilege Escalation => T1546.015: Component Object Model Hijacking" ,
2963
3018
Platforms : []string {"Windows" },
2964
3019
},
3020
+ "T1546.016" : {
3021
+ Name : "TA0003: Persistence, TA0004: Privilege Escalation => T1546.016: Installer Packages" ,
3022
+ Platforms : []string {"Linux" , "Windows" , "macOS" },
3023
+ },
2965
3024
"T1547" : {
2966
3025
Name : "TA0003: Persistence, TA0004: Privilege Escalation => T1547: Boot or Logon Autostart Execution" ,
2967
3026
Platforms : []string {"Linux" , "Windows" , "macOS" },
@@ -3048,7 +3107,7 @@ var TechniqueDict = map[string]Technique{
3048
3107
},
3049
3108
"T1550.001" : {
3050
3109
Name : "TA0005: Defense Evasion, TA0008: Lateral Movement => T1550.001: Application Access Token" ,
3051
- Platforms : []string {"Containers" , "Google Workspace" , "Office 365" , "SaaS" },
3110
+ Platforms : []string {"Azure AD" , " Containers" , "Google Workspace" , "IaaS " , "Office 365" , "SaaS" },
3052
3111
},
3053
3112
"T1550.002" : {
3054
3113
Name : "TA0005: Defense Evasion, TA0008: Lateral Movement => T1550.002: Pass the Hash" ,
@@ -3152,7 +3211,7 @@ var TechniqueDict = map[string]Technique{
3152
3211
},
3153
3212
"T1556" : {
3154
3213
Name : "TA0003: Persistence, TA0005: Defense Evasion, TA0006: Credential Access => T1556: Modify Authentication Process" ,
3155
- Platforms : []string {"Linux" , "Network" , "Windows" , "macOS" },
3214
+ Platforms : []string {"Azure AD" , "Google Workspace" , "IaaS" , " Linux" , "Network" , "Office 365" , "SaaS " , "Windows" , "macOS" },
3156
3215
},
3157
3216
"T1556.001" : {
3158
3217
Name : "TA0003: Persistence, TA0005: Defense Evasion, TA0006: Credential Access => T1556.001: Domain Controller Authentication" ,
@@ -3174,9 +3233,17 @@ var TechniqueDict = map[string]Technique{
3174
3233
Name : "TA0003: Persistence, TA0005: Defense Evasion, TA0006: Credential Access => T1556.005: Reversible Encryption" ,
3175
3234
Platforms : []string {"Windows" },
3176
3235
},
3236
+ "T1556.006" : {
3237
+ Name : "TA0003: Persistence, TA0005: Defense Evasion, TA0006: Credential Access => T1556.006: Multi-Factor Authentication" ,
3238
+ Platforms : []string {"Azure AD" , "Google Workspace" , "IaaS" , "Linux" , "Office 365" , "SaaS" , "Windows" , "macOS" },
3239
+ },
3240
+ "T1556.007" : {
3241
+ Name : "TA0003: Persistence, TA0005: Defense Evasion, TA0006: Credential Access => T1556.007: Hybrid Identity" ,
3242
+ Platforms : []string {"Azure AD" , "Google Workspace" , "IaaS" , "Office 365" , "SaaS" , "Windows" },
3243
+ },
3177
3244
"T1557" : {
3178
3245
Name : "TA0006: Credential Access, TA0009: Collection => T1557: Adversary-in-the-Middle" ,
3179
- Platforms : []string {"Linux" , "Windows" , "macOS" },
3246
+ Platforms : []string {"Linux" , "Network" , " Windows" , "macOS" },
3180
3247
},
3181
3248
"T1557.001" : {
3182
3249
Name : "TA0006: Credential Access, TA0009: Collection => T1557.001: LLMNR/NBT-NS Poisoning and SMB Relay" ,
@@ -3550,6 +3617,10 @@ var TechniqueDict = map[string]Technique{
3550
3617
Name : "TA0042: Resource Development => T1583.006: Web Services" ,
3551
3618
Platforms : []string {"PRE" },
3552
3619
},
3620
+ "T1583.007" : {
3621
+ Name : "TA0042: Resource Development => T1583.007: Serverless" ,
3622
+ Platforms : []string {"PRE" },
3623
+ },
3553
3624
"T1584" : {
3554
3625
Name : "TA0042: Resource Development => T1584: Compromise Infrastructure" ,
3555
3626
Platforms : []string {"PRE" },
@@ -3578,6 +3649,10 @@ var TechniqueDict = map[string]Technique{
3578
3649
Name : "TA0042: Resource Development => T1584.006: Web Services" ,
3579
3650
Platforms : []string {"PRE" },
3580
3651
},
3652
+ "T1584.007" : {
3653
+ Name : "TA0042: Resource Development => T1584.007: Serverless" ,
3654
+ Platforms : []string {"PRE" },
3655
+ },
3581
3656
"T1585" : {
3582
3657
Name : "TA0042: Resource Development => T1585: Establish Accounts" ,
3583
3658
Platforms : []string {"PRE" },
@@ -3590,6 +3665,10 @@ var TechniqueDict = map[string]Technique{
3590
3665
Name : "TA0042: Resource Development => T1585.002: Email Accounts" ,
3591
3666
Platforms : []string {"PRE" },
3592
3667
},
3668
+ "T1585.003" : {
3669
+ Name : "TA0042: Resource Development => T1585.003: Cloud Accounts" ,
3670
+ Platforms : []string {"PRE" },
3671
+ },
3593
3672
"T1586" : {
3594
3673
Name : "TA0042: Resource Development => T1586: Compromise Accounts" ,
3595
3674
Platforms : []string {"PRE" },
@@ -3602,6 +3681,10 @@ var TechniqueDict = map[string]Technique{
3602
3681
Name : "TA0042: Resource Development => T1586.002: Email Accounts" ,
3603
3682
Platforms : []string {"PRE" },
3604
3683
},
3684
+ "T1586.003" : {
3685
+ Name : "TA0042: Resource Development => T1586.003: Cloud Accounts" ,
3686
+ Platforms : []string {"PRE" },
3687
+ },
3605
3688
"T1587" : {
3606
3689
Name : "TA0042: Resource Development => T1587: Develop Capabilities" ,
3607
3690
Platforms : []string {"PRE" },
@@ -3746,6 +3829,10 @@ var TechniqueDict = map[string]Technique{
3746
3829
Name : "TA0043: Reconnaissance => T1593.002: Search Engines" ,
3747
3830
Platforms : []string {"PRE" },
3748
3831
},
3832
+ "T1593.003" : {
3833
+ Name : "TA0043: Reconnaissance => T1593.003: Code Repositories" ,
3834
+ Platforms : []string {"PRE" },
3835
+ },
3749
3836
"T1594" : {
3750
3837
Name : "TA0043: Reconnaissance => T1594: Search Victim-Owned Websites" ,
3751
3838
Platforms : []string {"PRE" },
@@ -3898,6 +3985,10 @@ var TechniqueDict = map[string]Technique{
3898
3985
Name : "TA0042: Resource Development => T1608.005: Link Target" ,
3899
3986
Platforms : []string {"PRE" },
3900
3987
},
3988
+ "T1608.006" : {
3989
+ Name : "TA0042: Resource Development => T1608.006: SEO Poisoning" ,
3990
+ Platforms : []string {"PRE" },
3991
+ },
3901
3992
"T1609" : {
3902
3993
Name : "TA0002: Execution => T1609: Container Administration Command" ,
3903
3994
Platforms : []string {"Containers" },
@@ -3950,4 +4041,12 @@ var TechniqueDict = map[string]Technique{
3950
4041
Name : "TA0005: Defense Evasion => T1647: Plist File Modification" ,
3951
4042
Platforms : []string {"macOS" },
3952
4043
},
4044
+ "T1648" : {
4045
+ Name : "TA0002: Execution => T1648: Serverless Execution" ,
4046
+ Platforms : []string {"IaaS" , "Office 365" , "SaaS" },
4047
+ },
4048
+ "T1649" : {
4049
+ Name : "TA0006: Credential Access => T1649: Steal or Forge Authentication Certificates" ,
4050
+ Platforms : []string {"Azure AD" , "Linux" , "Windows" , "macOS" },
4051
+ },
3953
4052
}
0 commit comments