Home >
Enterprise >
Participants >
FireEye >
System Owner/User Discovery (T1033)
|
|
Carbanak+FIN7 |
||||||
Step | ATT&CK Pattern |
|
||||
7.B.1
|
Tactic Discovery (TA0007) |
|
||||
13.A.5
|
Tactic Discovery (TA0007) |
|
APT29 |
||||||
Step | ATT&CK Pattern |
|
||||
4.C.2
|
Tactic Discovery (TA0007) |
|
||||
11.A.6
|
Tactic Discovery (TA0007) |
|
||||
13.C.1
|
Tactic Discovery (TA0007) |
|
||||
15.A.1
|
Tactic Discovery (TA0007) |
|
||||
16.B.1
|
Tactic Discovery (TA0007) |
|
APT3 |
||||||
Step | ATT&CK Pattern |
|
||||
2.B.1
|
Tactic Discovery (TA0007) |
|
||||
12.B.1
|
Tactic Discovery (TA0007) |
|
||||
12.E.1.1
|
Tactic Discovery (TA0007) |
|
||||
20.B.1
|
Tactic Discovery (TA0007) |
|
Procedure
Cobalt Strike: 'echo' via cmd to enumerate specific environment variables
Footnotes
- Managed Defense Reports are reports provided by FireEye's managed detection and response (MDR) service. FireEye provided reports to MITRE after the completion of the evaluation to mimic what they would produce in a real incident.


[2]


[3]


Procedure
Empire: 'whoami -all -fo list' via PowerShell
Footnotes
- Managed Defense Reports are reports provided by FireEye's managed detection and response (MDR) service. FireEye provided reports to MITRE after the completion of the evaluation to mimic what they would produce in a real incident.


[2]

