diff --git a/docs/content/reference/mitre_techniques.md b/docs/content/reference/mitre_techniques.md index 5ec684fc6..9e528449e 100644 --- a/docs/content/reference/mitre_techniques.md +++ b/docs/content/reference/mitre_techniques.md @@ -1,3 +1,23 @@ +--- +title: "MITRE ATT&CK" +date: 2020-09-24T08:18:37+03:00 +draft: false +pre: ' & ' +weight: 10 +--- + +{{% notice info %}} +Check out [the documentation for the MITRE ATT&CK report as well](../../usage/reports/mitre). +{{% /notice %}} + +The Monkey maps its actions to the [MITRE ATT&CK](https://attack.mitre.org/) knowledge base and based on this, + provides a report detailing the techniques it used and recommended mitigations. + The idea is to help you simulate an APT attack on your network and mitigate real attack paths intelligently. + + In the following table we provide the list of all the ATT&CK techniques the Monkey provides info about, + categorized by tactic. You can follow any of the links to learn more about a specific technique or tactic. + + | TACTIC | TECHNIQUES | |--- |--- | | [Execution](https://attack.mitre.org/tactics/TA0002/) | [Command-line Interface](https://attack.mitre.org/techniques/T1059/) | @@ -7,7 +27,7 @@ | | [Scripting](https://attack.mitre.org/techniques/T1064/) | | | [Service Execution](https://attack.mitre.org/techniques/T1035/) | | | [Trap](https://attack.mitre.org/techniques/T1154/) | -| [Persistence](https://attack.mitre.org/tactics/TA0003/) | [`.bash_profile` & `.bashrc`](https://attack.mitre.org/techniques/T1156/) | +| [Persistence](https://attack.mitre.org/tactics/TA0003/) | [.bash_profile & .bashrc](https://attack.mitre.org/techniques/T1156/) | | | [Create Account](https://attack.mitre.org/techniques/T1136/) | | | [Hidden Files & Directories](https://attack.mitre.org/techniques/T1158/) | | | [Local Job Scheduling](https://attack.mitre.org/techniques/T1168/) | @@ -36,4 +56,3 @@ | | [Uncommonly Used Port](https://attack.mitre.org/techniques/T1065/) | | | [Multi-hop Proxy](https://attack.mitre.org/techniques/T1188/) | | [Exfiltration](https://attack.mitre.org/tactics/TA0010/) | [Exfiltration Over Command And Control Channel](https://attack.mitre.org/techniques/T1041/)| -| | | diff --git a/docs/content/usage/reports/mitre.md b/docs/content/usage/reports/mitre.md index db700c4e9..77cd4ac82 100644 --- a/docs/content/usage/reports/mitre.md +++ b/docs/content/usage/reports/mitre.md @@ -5,7 +5,7 @@ draft: false --- {{% notice info %}} -Check out [the documentation for the other reports as well](../). +Check out [the documentation for the other reports](../) and [the documentation for supported ATT&CK techniques as well](../../../reference/mitre_techniques). {{% /notice %}} The Monkey maps its actions to the [MITRE ATT&CK](https://attack.mitre.org/) knowledge base: It provides a new report with the utilized techniques and recommended mitigations, to help you simulate an APT attack on your network and mitigate real attack paths intelligently.