Updates - March 2020

The March 2020 update for ATT&CK contains the beta release of sub-techniques for the Enterprise ATT&CK content. The beta site will be separate from the main (and still official) ATT&CK content for a period of approximately 3 months to allow for feedback and for users to assess their transition plans to ATT&CK with sub-techniques.

In total, the sub-technique version of ATT&CK for Enterprise contains 156 techniques (reduced from 266) and 260 sub-techniques.

See the accompanying blog post for more details.

Techniques

Enterprise

View enterprise technique updates in the ATT&CK Navigator here.

New Techniques:

Technique changes:

Technique changes are largely due to new sub-techniques being added, name changes, or both.

Minor Technique changes:

Technique revocations:

Technique deprecations:

  • Component Object Model and Distributed COM - Deprecated and split into separate Component Object Model and Distributed Component Object Model sub-techniques. Existing Group/Software procedure examples were remapped appropriately
  • Graphical User Interface - Deprecated from ATT&CK because the behavior is redundant and implied by use of remote desktop tools like Remote Desktop Protocol. Existing Group/Software procedure examples were remapped appropriately
  • Hypervisor - Deprecated from ATT&CK due to lack of in the wild use
  • LC_MAIN Hijacking - Deprecated from ATT&CK due to lack of in the wild use
  • Multiband Communication - Deprecated from ATT&CK due to lack of in the wild use. Existing Group/Software procedure examples did not fit the core idea behind the technique
  • Path Interception - Deprecated and split into separate Unquoted Path, PATH Environment Variable, and Search Order Hijacking sub-techniques. Existing Group/Software procedure examples were remapped appropriately
  • Redundant Access - Deprecated from ATT&CK because the behavior is too high level and is sufficiently covered by Valid Accounts and External Remote Services. Existing Group/Software procedure examples were remapped appropriately
  • Scripting - Deprecated and split into separate Bash, VBScript, and Python sub-techniques of Command and Scripting Interpreter. Existing Group/Software procedure examples were remapped appropriately
  • Shared Webroot - Deprecated from ATT&CK due to lack of in the wild use
  • Source - Deprecated from ATT&CK due to lack of in the wild use

PRE-ATT&CK

New Techniques: No changes

Technique changes: No changes

Minor Technique changes: No changes

Technique revocations: No changes

Technique deprecations:

  • DNSCalc
  • Fast Flux DNS

Mobile

View mobile technique updates in the ATT&CK Navigator here.

New Techniques:

Technique changes:

Minor Technique changes:

Technique revocations: No changes

Technique deprecations: No changes

Software

Enterprise

New Software: No changes

Software changes:

Minor Software changes: No changes

Software revocations: No changes

Software deprecations: No changes

PRE-ATT&CK

New Software: No changes

Software changes: No changes

Minor Software changes: No changes

Software revocations: No changes

Software deprecations: No changes

Mobile

New Software:

Software changes:

Minor Software changes:

Software revocations: No changes

Software deprecations: No changes

Groups

Enterprise

New Groups:

Group changes:

Minor Group changes: No changes

Group revocations: No changes

Group deprecations: No changes

PRE-ATT&CK

New Groups: No changes

Group changes:

Minor Group changes: No changes

Group revocations: No changes

Group deprecations: No changes

Mobile

New Groups:

Group changes:

Minor Group changes: No changes

Group revocations: No changes

Group deprecations: No changes

Mitigations

Enterprise

New Mitigations: No changes

Mitigation changes:

Minor Mitigation changes: No changes

Mitigation revocations: No changes

Mitigation deprecations: No changes

Mitigation deletions:

These are old mitigations that are no longer in use.

  • Account Manipulation Mitigation
  • Command-Line Interface Mitigation
  • Connection Proxy Mitigation
  • Execution through API Mitigation
  • Exfiltration Over Alternative Protocol Mitigation
  • File Permissions Modification Mitigation
  • Input Capture Mitigation
  • Obfuscated Files or Information Mitigation
  • Office Application Startup Mitigation
  • Process Injection Mitigation
  • Remote Services Mitigation
  • Signed Binary Proxy Execution Mitigation
  • Standard Application Layer Protocol Mitigation
  • Trusted Developer Utilities Mitigation
  • Virtualization/Sandbox Evasion Mitigation
  • Windows Management Instrumentation Mitigation

PRE-ATT&CK

New Mitigations: No changes

Mitigation changes: No changes

Minor Mitigation changes: No changes

Mitigation revocations: No changes

Mitigation deprecations: No changes

Mobile

New Mitigations: No changes

Mitigation changes: No changes

Minor Mitigation changes: No changes

Mitigation revocations: No changes

Mitigation deprecations: No changes