| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1033 | 系统所有者/用户发现 | ||
| Enterprise | T1016 | 系统网络配置发现 | ||
| Enterprise | T1040 | 网络嗅探 | ||
| Enterprise | T1046 | 网络服务发现 | ||
| Enterprise | T1018 | 远程系统发现 | ||
| ID | Name | References |
|---|---|---|
| G0087 | APT39 | |
| G1030 | Agrius |
Agrius used NBTscan to scan victim networks for existing and accessible hosts.[5] |
| G0135 | BackdoorDiplomacy | |
| G0131 | Tonto Team | |
| G0093 | GALLIUM | |
| G0129 | Mustang Panda | |
| G1006 | Earth Lusca | |
| G0010 | Turla | |
| G0027 | Threat Group-3390 |