Home >
Enterprise >
Participants >
Cybereason >
System Network Connections Discovery (T1049)
|
|
Carbanak+FIN7 |
||
The technique was not in scope. |
APT29 |
||
The technique was not in scope. |
APT3 |
||||||
Step | ATT&CK Pattern |
|
||||
4.C.1
|
Tactic Discovery (TA0007) |
|
||||
12.E.1.12
|
Tactic Discovery (TA0007) |
|
||||
13.B.1
|
Tactic Discovery (TA0007) |
|
||||
13.B.2
|
Tactic Discovery (TA0007) |
|
Procedure
Empire: WinEnum module included enumeration of established network connections
Footnotes
- The telemetry behind each enrichment is separately available in the capability. This is counted as a separate detection because the functionality was showed to MITRE throughout the evaluation, though a screenshot was not taken in this instance.


Procedure
Empire: 'net use' via PowerShell
Footnotes
- For most alerts in the user interface, the telemetry behind it is separately available in the capability. This is counted as a separate detection because the functionality was showed to MITRE throughout the evaluation, though a screenshot was not taken in this instance.


[2]


Procedure
Empire: 'netstat -ano' via PowerShell
Footnotes
- The telemetry behind each enrichment is separately available in the capability. This is counted as a separate detection because the functionality was showed to MITRE throughout the evaluation, though a screenshot was not taken in this instance.

