MITRE ATT&CK®
Corelight’s coverage includes comprehensive approaches to uncover over 80 techniques, with exceptional visibility into adversary methods used for Defense Evasion, Credential Access, Discovery, and Command and Control.
Visit our interactive MITRE ATT&CK navigator.
Corelight excels at spotting C2, Discovery, and more:
Initial access
Defense evasion
Credential access
Discovery
Lateral movement
C2
Initial Access |
Defense Evasion |
Credential Access |
Discovery |
Lateral Movement |
C2 |
|---|---|---|---|---|---|
|
Drive-by Compromise |
Exploitation for Defense Evasion
|
Brute Force
|
Account Discovery
|
Exploitation of Remote Services
|
Application Layer Protocol
|
|
Exploit Public-Facing Application |
Hijack Execution Flow
|
Credentials from Password Stores
|
Domain Trust Discovery
|
Lateral Tool Transfer
|
Data Encoding
|
|
External Remote Services |
Indicator Removal on Host
|
Forced Authentication
|
File and Directory Discovery
|
Remote Service Session Hijacking
|
Dynamic Resolution
|
|
Phishing |
Masquerading
|
Man-in-the-Middle
|
Network Service Scanning
|
Remote Services
|
Encrypted Channel
|
|
Valid Accounts
|
Modify Authentication Process
|
Modify Authentication Processes
|
Network Share Discovery
|
|
Fallback Channels
|
|
|
Modify Registry
|
OS Credential Dumping
|
Password Policy Discovery
|
|
Ingress Tool Transfer
|
|
|
Process Injection
|
Steal or Forge Kerberos Tickets
|
Permission Groups Discovery
|
|
Non-Application Layer Protocol
|
|
|
Rogue Domain Controller
|
|
Remote System Discovery |
|
Non-Standard Port
|
|
|
Subvert Trust Controls
|
|
System Information Discovery |
|
Protocol Tunneling
|
|
|
Valid Accounts
|
|
System Location Discovery |
|
Proxy
|
|
|
|
|
System Network Configuration Discovery |
|
Web Service
|
|
|
|
|
System Network Connections Discovery |
|
|
|
|
|
|
System Time Discovery
|
|
|
Additional coverage
Reconnaissance
- Active Scanning
- Gather Victim Network Information
- Search Open Technical Databases
- Search Open Websites/Domains
Execution
- Command and Scripting Interpreter
- Inter-Process Communication
- Scheduled Task/Job
- System Services
- User Execution
- Windows Management Instrumentation
Persistence
- Boot or Logon Autostart Execution
- Create or Modify System Process
- Event Triggered Execution
- External Remote Services
- Hijack Execution Flow
- Modify Authentication Process
- Office Application Startup
- Scheduled Task/Job
- Valid Accounts
Privilege Escalation
- Boot or Logon Autostart Execution
- Create or Modify System Process
- Event Triggered Execution
- External Remote Services
- Hijack Execution Flow
- Process Injection
- Scheduled Task/Job
- Valid Accounts
Collection
- Archive Collected Data
- Data from Local System
- Data from Network Shared Drive
- Data Staged
- Man-in-the-Middle
Exfiltration
- Automated Exfiltration
- Data Transfer Size Limits
- Exfiltration Over Alternative Protocol
- Exfiltration Over C2 Channel
- Exfiltration Over Web Service
- Transfer Data to Cloud Account
Impact
- Endpoint Denial of Service
- Resource Hijacking
Corelight’s MITRE ATT&CK approach
Corelight drives broad coverage across the MITRE ATT&CK TTPs using an approach focused on visibility and explainable, evidence-based analytics. The foundation of this approach is Zeek® network telemetry, data that captures activity across a broad set of network protocols and fuels advanced analytics. With these analytics, Corelight provides machine learning models, behavioral alerts, and Suricata-based IDS and SIEM rules to detect the relevant ATT&CK tactics, techniques, and procedures. Corelight’s Open NDR Platform allows you to build your own detection content or use community contributions such as MITRE’s BZAR package.