| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1018 | Remote System Discovery |
Arp can be used to display a host's ARP cache, which may include address resolutions for remote systems.[1][2] |
|
| Enterprise | T1016 | System Network Configuration Discovery |
Arp can be used to display ARP configuration information on the host.[1] |
|
| ID | Name | References |
|---|---|---|
| G0010 | Turla | |
| G1043 | BlackByte |
BlackByte used Arp to identify connected hosts in victim networks.[4] |
| G0050 | APT32 | |
| G0071 | Orangeworm | |
| G1054 | MirrorFace |
| ID | Name | Description |
|---|---|---|
| C0063 | 2025 Poland Wiper Attacks |
During the 2025 Poland Wiper Attacks, the adversaries used Arp to write to a file named outlog.txt, including: currently running processes, network connections, routing tables, ARP cache, and the contents of user directories.[9] |
| C0026 | C0026 | |
| C0060 | Operation AkaiRyū |
During Operation AkaiRyū, MirrorFace used Arp for discovery.[7] |