| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
APT18 establishes persistence via the |
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell |
APT18 uses cmd.exe to execute commands on the victim’s machine.[4][3] |
| Enterprise | T1133 | 外部远程服务 |
APT18 actors leverage legitimate credentials to log into external remote services.[5] |
|
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols | |
| .004 | 应用层协议: DNS | |||
| Enterprise | T1083 | 文件和目录发现 |
APT18 can list files information for specific directories.[4] |
|
| Enterprise | T1078 | 有效账户 |
APT18 actors leverage legitimate credentials to log into external remote services.[5] |
|
| Enterprise | T1027 | .013 | 混淆文件或信息: Encrypted/Encoded File | |
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
APT18 actors deleted tools and batch files from victim systems.[1] |
| Enterprise | T1082 | 系统信息发现 |
APT18 can collect system information from the victim’s machine.[4] |
|
| Enterprise | T1105 | 输入工具传输 | ||
| Enterprise | T1053 | .002 | 预定任务/作业: At |
APT18 actors used the native at Windows task scheduler tool to use scheduled tasks for execution on a victim network.[1] |