Default Profile - MITRE ATT&CK Profile
The MITRE ATT&CK Profile contains 39 MITRE ATT&CK rules and can be added to intents. It is not editable by the user but it can be cloned. The cloned profile is editable. MITRE ATT&CK Profile includes the following rules:
-
Suspicious MS Office behavior
-
T1015 - Accessibility features 1
-
T1015 - Accessibility features 2
-
T1085 - rundll32
-
T1118 - InstallUtil
-
T1121 - Regsvcs/Regasm
-
T1127 - Trusted Developer Utilities - msbuild.exe
-
T1127 - Trusted Developer Utilities - rcsi.exe
-
T1127 - Trusted Developer Utilities - tracker.exe
-
T1128 - Netsh Helper Dll
-
T1136 - Create Account
-
T1138 - Application Shimming
-
T1180 - Screensaver
-
T1191 - CMSTP
-
T1202 - Indirect Command Execution - forfiles.exe
-
T1202 - Indirect Command Execution - pcalua.exe
-
T1216 - Signed Script Proxy Execution - pubprn.vbs
-
T1218 - Signed Binary Proxy Execution - msiexec.exe
-
T1218 - Signed Binary Proxy Execution - odbcconf.exe
-
T1218 - Signed Binary Proxy Execution - Register-CimProvider
-
T1220 - XSL Script Processing - msxsl.exe
-
T1220 - XSL Script Processing - wmic
-
T1223 - Compiled HTML Files
-
T1003 - Credential Dumping - Lsass
-
T1140 - Deobfuscate/Decode Files or Information
-
T1076 - Remote Desktop Protocol
-
T1197 - BITS Jobs - Powershell
-
T1170 - MSHTA
-
T1158 - Hidden Files and Directories
-
T1114 - Email Collection
-
T1070 - Indicator Removal on Host - Event Log
-
T1070 - Indicator Removal on Host - USN
-
T1053 - Scheduled Task
-
T1003 - Credential Dumping - Vaultcmd
-
T1003 - Credential Dumping - Registry
-
T1201 - Password Policy Discovery 1
-
T1081 - Credentials in Files - Linux
-
T1081 - Credentials in Files - Windows
-
T1089 - Disabling Security Tools