| Name | Description |
|---|---|
| James |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1005 | 从本地系统获取数据 | ||
| Enterprise | T1036 | 伪装 |
Milan has used an executable named |
|
| .007 | Double File Extension |
Milan has used an executable named |
||
| Enterprise | T1568 | .002 | 动态解析: Domain Generation Algorithms |
Milan can use hardcoded domains as an input for domain generation algorithms.[3] |
| Enterprise | T1572 | 协议隧道 |
Milan can use a custom protocol tunneled through DNS or HTTP.[2] |
|
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell |
Milan can use |
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols | |
| .004 | 应用层协议: DNS |
Milan has the ability to use DNS for C2 communications.[1][2][3] |
||
| Enterprise | T1074 | .001 | 数据分段: Local Data Staging |
Milan has saved files prior to upload from a compromised host to folders beginning with the characters |
| Enterprise | T1106 | 本机API | ||
| Enterprise | T1012 | 查询注册表 |
Milan can query |
|
| Enterprise | T1027 | .013 | 混淆文件或信息: Encrypted/Encoded File |
Milan can encode files containing information about the targeted system.[1][2] |
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
Milan can delete files via |
| Enterprise | T1082 | 系统信息发现 |
Milan can enumerate the targeted machine's name and GUID.[1][3] |
|
| Enterprise | T1033 | 系统所有者/用户发现 |
Milan can identify users registered to a targeted machine.[1] |
|
| Enterprise | T1016 | 系统网络配置发现 |
Milan can run |
|
| Enterprise | T1087 | .001 | 账号发现: Local Account |
Milan has run |
| Enterprise | T1105 | 输入工具传输 |
Milan has received files from C2 and stored them in log folders beginning with the character sequence |
|
| Enterprise | T1559 | .001 | 进程间通信: Component Object Model |
Milan can use a COM component to generate scheduled tasks.[1] |
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
Milan can establish persistence on a targeted host with scheduled tasks.[1][3] |