Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1572 | Protocol Tunneling |
Comments
This diagnostic statement protects adversaries from using tunneling to encapsulate a protocol within another protocol. Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1090.002 | External Proxy |
Comments
This diagnostic statement protects adversaries from infiltrating external proxies and taking over control of traffic between systems. Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1090.001 | Internal Proxy |
Comments
This diagnostic statement protects adversaries from infiltrating internal proxies and taking over control of traffic between systems. Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1090 | Proxy |
Comments
This diagnostic statement protects adversaries from redirecting network traffic between systems by infiltrating connection proxies. Traffic to known anonymity networks and C2 infrastructure can be blocked through the use of network allow and block lists.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1102.003 | One-Way Communication |
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware that can be used to mitigate malicious activity and identify adversaries that use web services to obfuscate domains or IP addresses over web service channel.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1102.002 | Bidirectional Communication |
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware that can be used to mitigate malicious activity and identify adversaries that use web services to obfuscate domains or IP addresses over web service channel.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1102.001 | Dead Drop Resolver |
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware that can be used to mitigate malicious activity and identify adversaries that use web services to obfuscate domains or IP addresses.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1102 | Web Service |
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate malicious activity and identify adversaries that can relay data from a compromised systems through websites, cloud service, or social media.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1204.003 | Malicious Image |
Comments
In order to protect users from being victims of social engineering attacks, network intrusion prevention techniques can be used to scan and block malicious images so those images can't lead to malicious code being executed.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1204.001 | Malicious Link |
Comments
In order to protect users from being victims of social engineering attacks, network intrusion prevention techniques can be used to scan and block malicious downloads and malicious activity.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1204 | User Execution |
Comments
In order to protect users from being victims of social engineering attacks, network intrusion prevention techniques can be used to scan and block malicious code from malicious downloads and malicious activity.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1566.001 | Spearphishing Attachment |
Comments
This diagnostic statement utilizes the tools such as network intrusion prevent systems to identify, scan and block malicious email attachments that can be clicked on by users in their emails. Also, anti-virus can be used to quarantine suspicious files.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1221 | Template Injection |
Comments
Network/Host intrusion prevention systems, antivirus, and detonation chambers can be employed to prevent documents from fetching and/or executing malicious payloads that adversaries can steal in document templates.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1566 | Phishing |
Comments
This diagnostic statement utilizes the tools such as network intrusion prevent systems to identify, scan and block malicious email or links that can be clicked on by users in their emails. Also, anti-virus can be used to quarantine suspicious files.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1048 | Exfiltration Over Alternative Protocol |
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some activity at the network level, specifically adversaries known to steal data and/or encrypt or obfuscate alternate channels.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1573.002 | Asymmetric Cryptography |
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some activity at the network level, specifically adversaries known to conceal C2 traffic with asymmetric encryption algorithms.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1573.001 | Symmetric Cryptography |
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some activity at the network level, specifically adversaries known to conceal C2 traffic with symmetric encryption algorithms.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1573 | Encrypted Channel |
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some obfuscation (command and control traffic) activity at the network level.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1568.002 | Domain Generation Algorithms |
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some obfuscation (command and control) activity at the network level.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1568 | Dynamic Resolution |
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some obfuscation (command and control) activity at the network level.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1030 | Data Transfer Size Limits |
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some obfuscation activity at the network level.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1001.003 | Protocol or Service Impersonation |
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some obfuscation activity at the network level.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1001.002 | Steganography |
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some obfuscation activity at the network level.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1001.001 | Junk Data |
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some obfuscation activity at the network level.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1001 | Data Obfuscation |
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some obfuscation command and control activity at the network level.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1132.002 | Non-Standard Encoding |
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1132.001 | Standard Encoding |
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1132 | Data Encoding |
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1071.005 | Publish/Subscribe Protocols |
Comments
This diagnostic statement protects against adversaries that may try to utilize different protocols to abuse packets produced from these protocols. Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1071.004 | DNS |
Comments
This diagnostic statement protects against adversaries that may try to utilize DNS protocol to abuse packets produced from these protocols. Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1071.003 | Mail Protocols |
Comments
This diagnostic statement protects against adversaries that may try to utilize different protocols, such as SMPT/S, POP3/S and IMAP, to abuse packets produced from these protocols. Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1071.002 | File Transfer Protocols |
Comments
This diagnostic statement protects against adversaries that may try to utilize different protocols, such as SMB, FTP, FTPS, and TFPT, to abuse packets produced from these protocols. Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1071.001 | Web Protocols |
Comments
This diagnostic statement protects against adversaries that may try to utilize different protocols, such as HTTPS and web socket, to blend in with existing traffic. Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1071 | Application Layer Protocol |
Comments
This diagnostic statement protects against adversaries that may try to utilize different protocols, such as web browsing, transferring files, email, from attacking at the OSI level. Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1557.004 | Evil Twin |
Comments
Implementing methods similar to Wireless Intrusion prevention systems (WIPS) can identify and prevent adversary in the middle activity
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1557.003 | DHCP Spoofing |
Comments
The use of network intrusion detection and prevention systems can identify and possibly bock traffic patterns, indicative of AiTM activity. If so, these patterns can be mitigated at the network level.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1557.002 | ARP Cache Poisoning |
Comments
The use of network intrusion detection and prevention systems can identify and possibly bock traffic patterns, indicative of AiTM activity. If so, these patterns can be mitigated at the network level, enabling to block adversaries from poisoning ARP caches.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1557.001 | LLMNR/NBT-NS Poisoning and SMB Relay |
Comments
The use of network intrusion detection and prevention systems can identify and possibly bock traffic patterns, indicative of AiTM activity. If so, these patterns can be mitigated at the network level.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1557 | Adversary-in-the-Middle |
Comments
The use of network intrusion detection and prevention systems can identify and possibly bock traffic patterns, indicative of AiTM activity. If so, these patterns can be mitigated at the network level.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1036.008 | Masquerade File Type |
Comments
Implementing methods similar to Host Intrusion prevention (HIPS) can identify and prevent execution of malicious files and its metadata manipulated by adversaries.
|
DE.CM-01.01 | Intrusion detection and prevention | Mitigates | T1036 | Masquerading |
Comments
Implementing methods similar to Host Intrusion prevention (HIPS) can identify and prevent execution of malicious files and its metadata manipulated by adversaries.
|