T1135 Network Share Discovery Mappings

Adversaries may look for folders and drives shared on remote systems as a means of identifying sources of information to gather as a precursor for Collection and to identify potential systems of interest for Lateral Movement. Networks often contain shared network drives and folders that enable users to access file directories on various systems across a network.

File sharing over a Windows network occurs over the SMB protocol. (Citation: Wikipedia Shared Resource) (Citation: TechNet Shared Folder) Net can be used to query a remote system for available shared drives using the <code>net view \remotesystem</code> command. It can also be used to query shared drives on the local system using <code>net share</code>.

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
CM-6 Configuration Settings Protects T1135 Network Share Discovery
CM-7 Least Functionality Protects T1135 Network Share Discovery
SI-4 System Monitoring Protects T1135 Network Share Discovery
azure_sentinel Azure Sentinel technique_scores T1135 Network Share Discovery
Comments
The Azure Sentinel Analytics "Powershell Empire cmdlets seen in command line" query can detect the use of Empire, which can perform port scans from an infected host, but does not address other procedures.
References