Summiting the Pyramid v2.0.0
Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. This project is created and maintained by the MITRE Center for Threat-Informed Defense in futherance of our mission to advance the state of the art and the state of the practice in threat-informed defense globally.
Important
What’s New In V2:
In version 2.0, we updated and improved the project in the following ways!
Exploring how detection accuracy and robustness relate to each other to create balanced analytics. See: What is a Robust Detection?
Introducing Detection Decomposition Diagrams (D3), a new way to visualize and identify observables which are accurate and resistant to adversary evasion. Checkout some D3 examples here.
New Summiting scoring models! We updated our host-based model to include host-based network events, and created a new network traffic model.
- Overview
- Introduction
- Definitions
- Model Mapping Pages
- Level 5: Core to Sub-Technique or Technique
- Level 4: Core to Some Implementations of (Sub-)Technique
- Level 3: Core to Pre-Existing Tools or Inside Boundary
- Level 2: Core to Adversary-Brought Tool or Outside Boundary
- Level 1: Ephemeral Values
- Column A: Application
- Column U: User-Mode
- Column K: Kernel-Mode
- Column P: Payload Visibility
- Column P: Header Visibility
- Observables Quick Search
- Combining Observables
- Example Mappings
- How to Score Resistance to Adversary Evasion Over Time
- Analytics Repository
- Suspicious ADFind
- Scheduled Task/Job
- Service Registry Permissions Weakness Check
- Potential Access Token Abuse
- Executable (EXE) File Download from a WebDAV Server
- Link (LNK) File Download Containing a WebDAV UNC Hyperlink
- Remote Registry Management Using Reg Utility
- File Creation Date Changed to Another Year
- Zeek DCE-RPC MITRE BZAR Execution
- Components of a Robust Detection
- How to Build a Robust Detection
- Detection Decomposition Diagram (D3)
- Future Work
- Acknowledgements
- Changelog
Notice
© 2023, 2024 MITRE Engenuity. Approved for public release. Document number(s) CT0078, CT0128.
Licensed under the Apache License, Version 2.0 (the “License”); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an “AS IS” BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.
This project makes use of ATT&CK®: ATT&CK Terms of Use