Class: Google::Cloud::SecurityCenter::V1::MitreAttack

Inherits:
Object
  • Object
show all
Extended by:
Protobuf::MessageExts::ClassMethods
Includes:
Protobuf::MessageExts
Defined in:
proto_docs/google/cloud/securitycenter/v1/mitre_attack.rb

Overview

MITRE ATT&CK tactics and techniques related to this finding. See: https://attack.mitre.org

Defined Under Namespace

Modules: Tactic, Technique

Instance Attribute Summary collapse

Instance Attribute Details

#additional_tactics::Array<::Google::Cloud::SecurityCenter::V1::MitreAttack::Tactic>

Returns Additional MITRE ATT&CK tactics related to this finding, if any.

Returns:



47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
# File 'proto_docs/google/cloud/securitycenter/v1/mitre_attack.rb', line 47

class MitreAttack
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # MITRE ATT&CK tactics that can be referenced by SCC findings.
  # See: https://attack.mitre.org/tactics/enterprise/
  module Tactic
    # Unspecified value.
    TACTIC_UNSPECIFIED = 0

    # TA0043
    RECONNAISSANCE = 1

    # TA0042
    RESOURCE_DEVELOPMENT = 2

    # TA0001
    INITIAL_ACCESS = 5

    # TA0002
    EXECUTION = 3

    # TA0003
    PERSISTENCE = 6

    # TA0004
    PRIVILEGE_ESCALATION = 8

    # TA0005
    DEFENSE_EVASION = 7

    # TA0006
    CREDENTIAL_ACCESS = 9

    # TA0007
    DISCOVERY = 10

    # TA0008
    LATERAL_MOVEMENT = 11

    # TA0009
    COLLECTION = 12

    # TA0011
    COMMAND_AND_CONTROL = 4

    # TA0010
    EXFILTRATION = 13

    # TA0040
    IMPACT = 14
  end

  # MITRE ATT&CK techniques that can be referenced by SCC findings.
  # See: https://attack.mitre.org/techniques/enterprise/
  # Next ID: 65
  module Technique
    # Unspecified value.
    TECHNIQUE_UNSPECIFIED = 0

    # T1036
    MASQUERADING = 49

    # T1036.005
    MATCH_LEGITIMATE_NAME_OR_LOCATION = 50

    # T1037
    BOOT_OR_LOGON_INITIALIZATION_SCRIPTS = 37

    # T1037.005
    STARTUP_ITEMS = 38

    # T1046
    NETWORK_SERVICE_DISCOVERY = 32

    # T1057
    PROCESS_DISCOVERY = 56

    # T1059
    COMMAND_AND_SCRIPTING_INTERPRETER = 6

    # T1059.004
    UNIX_SHELL = 7

    # T1059.006
    PYTHON = 59

    # T1068
    EXPLOITATION_FOR_PRIVILEGE_ESCALATION = 63

    # T1069
    PERMISSION_GROUPS_DISCOVERY = 18

    # T1069.003
    CLOUD_GROUPS = 19

    # T1070.004
    INDICATOR_REMOVAL_FILE_DELETION = 64

    # T1071
    APPLICATION_LAYER_PROTOCOL = 45

    # T1071.004
    DNS = 46

    # T1072
    SOFTWARE_DEPLOYMENT_TOOLS = 47

    # T1078
    VALID_ACCOUNTS = 14

    # T1078.001
    DEFAULT_ACCOUNTS = 35

    # T1078.003
    LOCAL_ACCOUNTS = 15

    # T1078.004
    CLOUD_ACCOUNTS = 16

    # T1090
    PROXY = 9

    # T1090.002
    EXTERNAL_PROXY = 10

    # T1090.003
    MULTI_HOP_PROXY = 11

    # T1098
    ACCOUNT_MANIPULATION = 22

    # T1098.001
    ADDITIONAL_CLOUD_CREDENTIALS = 40

    # T1098.004
    SSH_AUTHORIZED_KEYS = 23

    # T1098.006
    ADDITIONAL_CONTAINER_CLUSTER_ROLES = 58

    # T1105
    INGRESS_TOOL_TRANSFER = 3

    # T1106
    NATIVE_API = 4

    # T1110
    BRUTE_FORCE = 44

    # T1129
    SHARED_MODULES = 5

    # T1134
    ACCESS_TOKEN_MANIPULATION = 33

    # T1134.001
    TOKEN_IMPERSONATION_OR_THEFT = 39

    # T1190
    EXPLOIT_PUBLIC_FACING_APPLICATION = 27

    # T1484
    DOMAIN_POLICY_MODIFICATION = 30

    # T1485
    DATA_DESTRUCTION = 29

    # T1489
    SERVICE_STOP = 52

    # T1490
    INHIBIT_SYSTEM_RECOVERY = 36

    # T1496
    RESOURCE_HIJACKING = 8

    # T1498
    NETWORK_DENIAL_OF_SERVICE = 17

    # T1526
    CLOUD_SERVICE_DISCOVERY = 48

    # T1528
    STEAL_APPLICATION_ACCESS_TOKEN = 42

    # T1531
    ACCOUNT_ACCESS_REMOVAL = 51

    # T1539
    STEAL_WEB_SESSION_COOKIE = 25

    # T1543
    CREATE_OR_MODIFY_SYSTEM_PROCESS = 24

    # T1548
    ABUSE_ELEVATION_CONTROL_MECHANISM = 34

    # T1552
    UNSECURED_CREDENTIALS = 13

    # T1556
    MODIFY_AUTHENTICATION_PROCESS = 28

    # T1562
    IMPAIR_DEFENSES = 31

    # T1562.001
    DISABLE_OR_MODIFY_TOOLS = 55

    # T1567
    EXFILTRATION_OVER_WEB_SERVICE = 20

    # T1567.002
    EXFILTRATION_TO_CLOUD_STORAGE = 21

    # T1568
    DYNAMIC_RESOLUTION = 12

    # T1570
    LATERAL_TOOL_TRANSFER = 41

    # T1578
    MODIFY_CLOUD_COMPUTE_INFRASTRUCTURE = 26

    # T1578.001
    CREATE_SNAPSHOT = 54

    # T1580
    CLOUD_INFRASTRUCTURE_DISCOVERY = 53

    # T1588
    OBTAIN_CAPABILITIES = 43

    # T1595
    ACTIVE_SCANNING = 1

    # T1595.001
    SCANNING_IP_BLOCKS = 2

    # T1609
    CONTAINER_ADMINISTRATION_COMMAND = 60

    # T1611
    ESCAPE_TO_HOST = 61

    # T1613
    CONTAINER_AND_RESOURCE_DISCOVERY = 57

    # T1649
    STEAL_OR_FORGE_AUTHENTICATION_CERTIFICATES = 62
  end
end

#additional_techniques::Array<::Google::Cloud::SecurityCenter::V1::MitreAttack::Technique>

Returns Additional MITRE ATT&CK techniques related to this finding, if any, along with any of their respective parent techniques.

Returns:



47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
# File 'proto_docs/google/cloud/securitycenter/v1/mitre_attack.rb', line 47

class MitreAttack
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # MITRE ATT&CK tactics that can be referenced by SCC findings.
  # See: https://attack.mitre.org/tactics/enterprise/
  module Tactic
    # Unspecified value.
    TACTIC_UNSPECIFIED = 0

    # TA0043
    RECONNAISSANCE = 1

    # TA0042
    RESOURCE_DEVELOPMENT = 2

    # TA0001
    INITIAL_ACCESS = 5

    # TA0002
    EXECUTION = 3

    # TA0003
    PERSISTENCE = 6

    # TA0004
    PRIVILEGE_ESCALATION = 8

    # TA0005
    DEFENSE_EVASION = 7

    # TA0006
    CREDENTIAL_ACCESS = 9

    # TA0007
    DISCOVERY = 10

    # TA0008
    LATERAL_MOVEMENT = 11

    # TA0009
    COLLECTION = 12

    # TA0011
    COMMAND_AND_CONTROL = 4

    # TA0010
    EXFILTRATION = 13

    # TA0040
    IMPACT = 14
  end

  # MITRE ATT&CK techniques that can be referenced by SCC findings.
  # See: https://attack.mitre.org/techniques/enterprise/
  # Next ID: 65
  module Technique
    # Unspecified value.
    TECHNIQUE_UNSPECIFIED = 0

    # T1036
    MASQUERADING = 49

    # T1036.005
    MATCH_LEGITIMATE_NAME_OR_LOCATION = 50

    # T1037
    BOOT_OR_LOGON_INITIALIZATION_SCRIPTS = 37

    # T1037.005
    STARTUP_ITEMS = 38

    # T1046
    NETWORK_SERVICE_DISCOVERY = 32

    # T1057
    PROCESS_DISCOVERY = 56

    # T1059
    COMMAND_AND_SCRIPTING_INTERPRETER = 6

    # T1059.004
    UNIX_SHELL = 7

    # T1059.006
    PYTHON = 59

    # T1068
    EXPLOITATION_FOR_PRIVILEGE_ESCALATION = 63

    # T1069
    PERMISSION_GROUPS_DISCOVERY = 18

    # T1069.003
    CLOUD_GROUPS = 19

    # T1070.004
    INDICATOR_REMOVAL_FILE_DELETION = 64

    # T1071
    APPLICATION_LAYER_PROTOCOL = 45

    # T1071.004
    DNS = 46

    # T1072
    SOFTWARE_DEPLOYMENT_TOOLS = 47

    # T1078
    VALID_ACCOUNTS = 14

    # T1078.001
    DEFAULT_ACCOUNTS = 35

    # T1078.003
    LOCAL_ACCOUNTS = 15

    # T1078.004
    CLOUD_ACCOUNTS = 16

    # T1090
    PROXY = 9

    # T1090.002
    EXTERNAL_PROXY = 10

    # T1090.003
    MULTI_HOP_PROXY = 11

    # T1098
    ACCOUNT_MANIPULATION = 22

    # T1098.001
    ADDITIONAL_CLOUD_CREDENTIALS = 40

    # T1098.004
    SSH_AUTHORIZED_KEYS = 23

    # T1098.006
    ADDITIONAL_CONTAINER_CLUSTER_ROLES = 58

    # T1105
    INGRESS_TOOL_TRANSFER = 3

    # T1106
    NATIVE_API = 4

    # T1110
    BRUTE_FORCE = 44

    # T1129
    SHARED_MODULES = 5

    # T1134
    ACCESS_TOKEN_MANIPULATION = 33

    # T1134.001
    TOKEN_IMPERSONATION_OR_THEFT = 39

    # T1190
    EXPLOIT_PUBLIC_FACING_APPLICATION = 27

    # T1484
    DOMAIN_POLICY_MODIFICATION = 30

    # T1485
    DATA_DESTRUCTION = 29

    # T1489
    SERVICE_STOP = 52

    # T1490
    INHIBIT_SYSTEM_RECOVERY = 36

    # T1496
    RESOURCE_HIJACKING = 8

    # T1498
    NETWORK_DENIAL_OF_SERVICE = 17

    # T1526
    CLOUD_SERVICE_DISCOVERY = 48

    # T1528
    STEAL_APPLICATION_ACCESS_TOKEN = 42

    # T1531
    ACCOUNT_ACCESS_REMOVAL = 51

    # T1539
    STEAL_WEB_SESSION_COOKIE = 25

    # T1543
    CREATE_OR_MODIFY_SYSTEM_PROCESS = 24

    # T1548
    ABUSE_ELEVATION_CONTROL_MECHANISM = 34

    # T1552
    UNSECURED_CREDENTIALS = 13

    # T1556
    MODIFY_AUTHENTICATION_PROCESS = 28

    # T1562
    IMPAIR_DEFENSES = 31

    # T1562.001
    DISABLE_OR_MODIFY_TOOLS = 55

    # T1567
    EXFILTRATION_OVER_WEB_SERVICE = 20

    # T1567.002
    EXFILTRATION_TO_CLOUD_STORAGE = 21

    # T1568
    DYNAMIC_RESOLUTION = 12

    # T1570
    LATERAL_TOOL_TRANSFER = 41

    # T1578
    MODIFY_CLOUD_COMPUTE_INFRASTRUCTURE = 26

    # T1578.001
    CREATE_SNAPSHOT = 54

    # T1580
    CLOUD_INFRASTRUCTURE_DISCOVERY = 53

    # T1588
    OBTAIN_CAPABILITIES = 43

    # T1595
    ACTIVE_SCANNING = 1

    # T1595.001
    SCANNING_IP_BLOCKS = 2

    # T1609
    CONTAINER_ADMINISTRATION_COMMAND = 60

    # T1611
    ESCAPE_TO_HOST = 61

    # T1613
    CONTAINER_AND_RESOURCE_DISCOVERY = 57

    # T1649
    STEAL_OR_FORGE_AUTHENTICATION_CERTIFICATES = 62
  end
end

#primary_tactic::Google::Cloud::SecurityCenter::V1::MitreAttack::Tactic

Returns The MITRE ATT&CK tactic most closely represented by this finding, if any.

Returns:



47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
# File 'proto_docs/google/cloud/securitycenter/v1/mitre_attack.rb', line 47

class MitreAttack
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # MITRE ATT&CK tactics that can be referenced by SCC findings.
  # See: https://attack.mitre.org/tactics/enterprise/
  module Tactic
    # Unspecified value.
    TACTIC_UNSPECIFIED = 0

    # TA0043
    RECONNAISSANCE = 1

    # TA0042
    RESOURCE_DEVELOPMENT = 2

    # TA0001
    INITIAL_ACCESS = 5

    # TA0002
    EXECUTION = 3

    # TA0003
    PERSISTENCE = 6

    # TA0004
    PRIVILEGE_ESCALATION = 8

    # TA0005
    DEFENSE_EVASION = 7

    # TA0006
    CREDENTIAL_ACCESS = 9

    # TA0007
    DISCOVERY = 10

    # TA0008
    LATERAL_MOVEMENT = 11

    # TA0009
    COLLECTION = 12

    # TA0011
    COMMAND_AND_CONTROL = 4

    # TA0010
    EXFILTRATION = 13

    # TA0040
    IMPACT = 14
  end

  # MITRE ATT&CK techniques that can be referenced by SCC findings.
  # See: https://attack.mitre.org/techniques/enterprise/
  # Next ID: 65
  module Technique
    # Unspecified value.
    TECHNIQUE_UNSPECIFIED = 0

    # T1036
    MASQUERADING = 49

    # T1036.005
    MATCH_LEGITIMATE_NAME_OR_LOCATION = 50

    # T1037
    BOOT_OR_LOGON_INITIALIZATION_SCRIPTS = 37

    # T1037.005
    STARTUP_ITEMS = 38

    # T1046
    NETWORK_SERVICE_DISCOVERY = 32

    # T1057
    PROCESS_DISCOVERY = 56

    # T1059
    COMMAND_AND_SCRIPTING_INTERPRETER = 6

    # T1059.004
    UNIX_SHELL = 7

    # T1059.006
    PYTHON = 59

    # T1068
    EXPLOITATION_FOR_PRIVILEGE_ESCALATION = 63

    # T1069
    PERMISSION_GROUPS_DISCOVERY = 18

    # T1069.003
    CLOUD_GROUPS = 19

    # T1070.004
    INDICATOR_REMOVAL_FILE_DELETION = 64

    # T1071
    APPLICATION_LAYER_PROTOCOL = 45

    # T1071.004
    DNS = 46

    # T1072
    SOFTWARE_DEPLOYMENT_TOOLS = 47

    # T1078
    VALID_ACCOUNTS = 14

    # T1078.001
    DEFAULT_ACCOUNTS = 35

    # T1078.003
    LOCAL_ACCOUNTS = 15

    # T1078.004
    CLOUD_ACCOUNTS = 16

    # T1090
    PROXY = 9

    # T1090.002
    EXTERNAL_PROXY = 10

    # T1090.003
    MULTI_HOP_PROXY = 11

    # T1098
    ACCOUNT_MANIPULATION = 22

    # T1098.001
    ADDITIONAL_CLOUD_CREDENTIALS = 40

    # T1098.004
    SSH_AUTHORIZED_KEYS = 23

    # T1098.006
    ADDITIONAL_CONTAINER_CLUSTER_ROLES = 58

    # T1105
    INGRESS_TOOL_TRANSFER = 3

    # T1106
    NATIVE_API = 4

    # T1110
    BRUTE_FORCE = 44

    # T1129
    SHARED_MODULES = 5

    # T1134
    ACCESS_TOKEN_MANIPULATION = 33

    # T1134.001
    TOKEN_IMPERSONATION_OR_THEFT = 39

    # T1190
    EXPLOIT_PUBLIC_FACING_APPLICATION = 27

    # T1484
    DOMAIN_POLICY_MODIFICATION = 30

    # T1485
    DATA_DESTRUCTION = 29

    # T1489
    SERVICE_STOP = 52

    # T1490
    INHIBIT_SYSTEM_RECOVERY = 36

    # T1496
    RESOURCE_HIJACKING = 8

    # T1498
    NETWORK_DENIAL_OF_SERVICE = 17

    # T1526
    CLOUD_SERVICE_DISCOVERY = 48

    # T1528
    STEAL_APPLICATION_ACCESS_TOKEN = 42

    # T1531
    ACCOUNT_ACCESS_REMOVAL = 51

    # T1539
    STEAL_WEB_SESSION_COOKIE = 25

    # T1543
    CREATE_OR_MODIFY_SYSTEM_PROCESS = 24

    # T1548
    ABUSE_ELEVATION_CONTROL_MECHANISM = 34

    # T1552
    UNSECURED_CREDENTIALS = 13

    # T1556
    MODIFY_AUTHENTICATION_PROCESS = 28

    # T1562
    IMPAIR_DEFENSES = 31

    # T1562.001
    DISABLE_OR_MODIFY_TOOLS = 55

    # T1567
    EXFILTRATION_OVER_WEB_SERVICE = 20

    # T1567.002
    EXFILTRATION_TO_CLOUD_STORAGE = 21

    # T1568
    DYNAMIC_RESOLUTION = 12

    # T1570
    LATERAL_TOOL_TRANSFER = 41

    # T1578
    MODIFY_CLOUD_COMPUTE_INFRASTRUCTURE = 26

    # T1578.001
    CREATE_SNAPSHOT = 54

    # T1580
    CLOUD_INFRASTRUCTURE_DISCOVERY = 53

    # T1588
    OBTAIN_CAPABILITIES = 43

    # T1595
    ACTIVE_SCANNING = 1

    # T1595.001
    SCANNING_IP_BLOCKS = 2

    # T1609
    CONTAINER_ADMINISTRATION_COMMAND = 60

    # T1611
    ESCAPE_TO_HOST = 61

    # T1613
    CONTAINER_AND_RESOURCE_DISCOVERY = 57

    # T1649
    STEAL_OR_FORGE_AUTHENTICATION_CERTIFICATES = 62
  end
end

#primary_techniques::Array<::Google::Cloud::SecurityCenter::V1::MitreAttack::Technique>

Returns The MITRE ATT&CK technique most closely represented by this finding, if any. primary_techniques is a repeated field because there are multiple levels of MITRE ATT&CK techniques. If the technique most closely represented by this finding is a sub-technique (e.g. SCANNING_IP_BLOCKS), both the sub-technique and its parent technique(s) will be listed (e.g. SCANNING_IP_BLOCKS, ACTIVE_SCANNING).

Returns:

  • (::Array<::Google::Cloud::SecurityCenter::V1::MitreAttack::Technique>)

    The MITRE ATT&CK technique most closely represented by this finding, if any. primary_techniques is a repeated field because there are multiple levels of MITRE ATT&CK techniques. If the technique most closely represented by this finding is a sub-technique (e.g. SCANNING_IP_BLOCKS), both the sub-technique and its parent technique(s) will be listed (e.g. SCANNING_IP_BLOCKS, ACTIVE_SCANNING).



47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
# File 'proto_docs/google/cloud/securitycenter/v1/mitre_attack.rb', line 47

class MitreAttack
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # MITRE ATT&CK tactics that can be referenced by SCC findings.
  # See: https://attack.mitre.org/tactics/enterprise/
  module Tactic
    # Unspecified value.
    TACTIC_UNSPECIFIED = 0

    # TA0043
    RECONNAISSANCE = 1

    # TA0042
    RESOURCE_DEVELOPMENT = 2

    # TA0001
    INITIAL_ACCESS = 5

    # TA0002
    EXECUTION = 3

    # TA0003
    PERSISTENCE = 6

    # TA0004
    PRIVILEGE_ESCALATION = 8

    # TA0005
    DEFENSE_EVASION = 7

    # TA0006
    CREDENTIAL_ACCESS = 9

    # TA0007
    DISCOVERY = 10

    # TA0008
    LATERAL_MOVEMENT = 11

    # TA0009
    COLLECTION = 12

    # TA0011
    COMMAND_AND_CONTROL = 4

    # TA0010
    EXFILTRATION = 13

    # TA0040
    IMPACT = 14
  end

  # MITRE ATT&CK techniques that can be referenced by SCC findings.
  # See: https://attack.mitre.org/techniques/enterprise/
  # Next ID: 65
  module Technique
    # Unspecified value.
    TECHNIQUE_UNSPECIFIED = 0

    # T1036
    MASQUERADING = 49

    # T1036.005
    MATCH_LEGITIMATE_NAME_OR_LOCATION = 50

    # T1037
    BOOT_OR_LOGON_INITIALIZATION_SCRIPTS = 37

    # T1037.005
    STARTUP_ITEMS = 38

    # T1046
    NETWORK_SERVICE_DISCOVERY = 32

    # T1057
    PROCESS_DISCOVERY = 56

    # T1059
    COMMAND_AND_SCRIPTING_INTERPRETER = 6

    # T1059.004
    UNIX_SHELL = 7

    # T1059.006
    PYTHON = 59

    # T1068
    EXPLOITATION_FOR_PRIVILEGE_ESCALATION = 63

    # T1069
    PERMISSION_GROUPS_DISCOVERY = 18

    # T1069.003
    CLOUD_GROUPS = 19

    # T1070.004
    INDICATOR_REMOVAL_FILE_DELETION = 64

    # T1071
    APPLICATION_LAYER_PROTOCOL = 45

    # T1071.004
    DNS = 46

    # T1072
    SOFTWARE_DEPLOYMENT_TOOLS = 47

    # T1078
    VALID_ACCOUNTS = 14

    # T1078.001
    DEFAULT_ACCOUNTS = 35

    # T1078.003
    LOCAL_ACCOUNTS = 15

    # T1078.004
    CLOUD_ACCOUNTS = 16

    # T1090
    PROXY = 9

    # T1090.002
    EXTERNAL_PROXY = 10

    # T1090.003
    MULTI_HOP_PROXY = 11

    # T1098
    ACCOUNT_MANIPULATION = 22

    # T1098.001
    ADDITIONAL_CLOUD_CREDENTIALS = 40

    # T1098.004
    SSH_AUTHORIZED_KEYS = 23

    # T1098.006
    ADDITIONAL_CONTAINER_CLUSTER_ROLES = 58

    # T1105
    INGRESS_TOOL_TRANSFER = 3

    # T1106
    NATIVE_API = 4

    # T1110
    BRUTE_FORCE = 44

    # T1129
    SHARED_MODULES = 5

    # T1134
    ACCESS_TOKEN_MANIPULATION = 33

    # T1134.001
    TOKEN_IMPERSONATION_OR_THEFT = 39

    # T1190
    EXPLOIT_PUBLIC_FACING_APPLICATION = 27

    # T1484
    DOMAIN_POLICY_MODIFICATION = 30

    # T1485
    DATA_DESTRUCTION = 29

    # T1489
    SERVICE_STOP = 52

    # T1490
    INHIBIT_SYSTEM_RECOVERY = 36

    # T1496
    RESOURCE_HIJACKING = 8

    # T1498
    NETWORK_DENIAL_OF_SERVICE = 17

    # T1526
    CLOUD_SERVICE_DISCOVERY = 48

    # T1528
    STEAL_APPLICATION_ACCESS_TOKEN = 42

    # T1531
    ACCOUNT_ACCESS_REMOVAL = 51

    # T1539
    STEAL_WEB_SESSION_COOKIE = 25

    # T1543
    CREATE_OR_MODIFY_SYSTEM_PROCESS = 24

    # T1548
    ABUSE_ELEVATION_CONTROL_MECHANISM = 34

    # T1552
    UNSECURED_CREDENTIALS = 13

    # T1556
    MODIFY_AUTHENTICATION_PROCESS = 28

    # T1562
    IMPAIR_DEFENSES = 31

    # T1562.001
    DISABLE_OR_MODIFY_TOOLS = 55

    # T1567
    EXFILTRATION_OVER_WEB_SERVICE = 20

    # T1567.002
    EXFILTRATION_TO_CLOUD_STORAGE = 21

    # T1568
    DYNAMIC_RESOLUTION = 12

    # T1570
    LATERAL_TOOL_TRANSFER = 41

    # T1578
    MODIFY_CLOUD_COMPUTE_INFRASTRUCTURE = 26

    # T1578.001
    CREATE_SNAPSHOT = 54

    # T1580
    CLOUD_INFRASTRUCTURE_DISCOVERY = 53

    # T1588
    OBTAIN_CAPABILITIES = 43

    # T1595
    ACTIVE_SCANNING = 1

    # T1595.001
    SCANNING_IP_BLOCKS = 2

    # T1609
    CONTAINER_ADMINISTRATION_COMMAND = 60

    # T1611
    ESCAPE_TO_HOST = 61

    # T1613
    CONTAINER_AND_RESOURCE_DISCOVERY = 57

    # T1649
    STEAL_OR_FORGE_AUTHENTICATION_CERTIFICATES = 62
  end
end

#version::String

Returns The MITRE ATT&CK version referenced by the above fields. E.g. "8".

Returns:

  • (::String)

    The MITRE ATT&CK version referenced by the above fields. E.g. "8".



47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
# File 'proto_docs/google/cloud/securitycenter/v1/mitre_attack.rb', line 47

class MitreAttack
  include ::Google::Protobuf::MessageExts
  extend ::Google::Protobuf::MessageExts::ClassMethods

  # MITRE ATT&CK tactics that can be referenced by SCC findings.
  # See: https://attack.mitre.org/tactics/enterprise/
  module Tactic
    # Unspecified value.
    TACTIC_UNSPECIFIED = 0

    # TA0043
    RECONNAISSANCE = 1

    # TA0042
    RESOURCE_DEVELOPMENT = 2

    # TA0001
    INITIAL_ACCESS = 5

    # TA0002
    EXECUTION = 3

    # TA0003
    PERSISTENCE = 6

    # TA0004
    PRIVILEGE_ESCALATION = 8

    # TA0005
    DEFENSE_EVASION = 7

    # TA0006
    CREDENTIAL_ACCESS = 9

    # TA0007
    DISCOVERY = 10

    # TA0008
    LATERAL_MOVEMENT = 11

    # TA0009
    COLLECTION = 12

    # TA0011
    COMMAND_AND_CONTROL = 4

    # TA0010
    EXFILTRATION = 13

    # TA0040
    IMPACT = 14
  end

  # MITRE ATT&CK techniques that can be referenced by SCC findings.
  # See: https://attack.mitre.org/techniques/enterprise/
  # Next ID: 65
  module Technique
    # Unspecified value.
    TECHNIQUE_UNSPECIFIED = 0

    # T1036
    MASQUERADING = 49

    # T1036.005
    MATCH_LEGITIMATE_NAME_OR_LOCATION = 50

    # T1037
    BOOT_OR_LOGON_INITIALIZATION_SCRIPTS = 37

    # T1037.005
    STARTUP_ITEMS = 38

    # T1046
    NETWORK_SERVICE_DISCOVERY = 32

    # T1057
    PROCESS_DISCOVERY = 56

    # T1059
    COMMAND_AND_SCRIPTING_INTERPRETER = 6

    # T1059.004
    UNIX_SHELL = 7

    # T1059.006
    PYTHON = 59

    # T1068
    EXPLOITATION_FOR_PRIVILEGE_ESCALATION = 63

    # T1069
    PERMISSION_GROUPS_DISCOVERY = 18

    # T1069.003
    CLOUD_GROUPS = 19

    # T1070.004
    INDICATOR_REMOVAL_FILE_DELETION = 64

    # T1071
    APPLICATION_LAYER_PROTOCOL = 45

    # T1071.004
    DNS = 46

    # T1072
    SOFTWARE_DEPLOYMENT_TOOLS = 47

    # T1078
    VALID_ACCOUNTS = 14

    # T1078.001
    DEFAULT_ACCOUNTS = 35

    # T1078.003
    LOCAL_ACCOUNTS = 15

    # T1078.004
    CLOUD_ACCOUNTS = 16

    # T1090
    PROXY = 9

    # T1090.002
    EXTERNAL_PROXY = 10

    # T1090.003
    MULTI_HOP_PROXY = 11

    # T1098
    ACCOUNT_MANIPULATION = 22

    # T1098.001
    ADDITIONAL_CLOUD_CREDENTIALS = 40

    # T1098.004
    SSH_AUTHORIZED_KEYS = 23

    # T1098.006
    ADDITIONAL_CONTAINER_CLUSTER_ROLES = 58

    # T1105
    INGRESS_TOOL_TRANSFER = 3

    # T1106
    NATIVE_API = 4

    # T1110
    BRUTE_FORCE = 44

    # T1129
    SHARED_MODULES = 5

    # T1134
    ACCESS_TOKEN_MANIPULATION = 33

    # T1134.001
    TOKEN_IMPERSONATION_OR_THEFT = 39

    # T1190
    EXPLOIT_PUBLIC_FACING_APPLICATION = 27

    # T1484
    DOMAIN_POLICY_MODIFICATION = 30

    # T1485
    DATA_DESTRUCTION = 29

    # T1489
    SERVICE_STOP = 52

    # T1490
    INHIBIT_SYSTEM_RECOVERY = 36

    # T1496
    RESOURCE_HIJACKING = 8

    # T1498
    NETWORK_DENIAL_OF_SERVICE = 17

    # T1526
    CLOUD_SERVICE_DISCOVERY = 48

    # T1528
    STEAL_APPLICATION_ACCESS_TOKEN = 42

    # T1531
    ACCOUNT_ACCESS_REMOVAL = 51

    # T1539
    STEAL_WEB_SESSION_COOKIE = 25

    # T1543
    CREATE_OR_MODIFY_SYSTEM_PROCESS = 24

    # T1548
    ABUSE_ELEVATION_CONTROL_MECHANISM = 34

    # T1552
    UNSECURED_CREDENTIALS = 13

    # T1556
    MODIFY_AUTHENTICATION_PROCESS = 28

    # T1562
    IMPAIR_DEFENSES = 31

    # T1562.001
    DISABLE_OR_MODIFY_TOOLS = 55

    # T1567
    EXFILTRATION_OVER_WEB_SERVICE = 20

    # T1567.002
    EXFILTRATION_TO_CLOUD_STORAGE = 21

    # T1568
    DYNAMIC_RESOLUTION = 12

    # T1570
    LATERAL_TOOL_TRANSFER = 41

    # T1578
    MODIFY_CLOUD_COMPUTE_INFRASTRUCTURE = 26

    # T1578.001
    CREATE_SNAPSHOT = 54

    # T1580
    CLOUD_INFRASTRUCTURE_DISCOVERY = 53

    # T1588
    OBTAIN_CAPABILITIES = 43

    # T1595
    ACTIVE_SCANNING = 1

    # T1595.001
    SCANNING_IP_BLOCKS = 2

    # T1609
    CONTAINER_ADMINISTRATION_COMMAND = 60

    # T1611
    ESCAPE_TO_HOST = 61

    # T1613
    CONTAINER_AND_RESOURCE_DISCOVERY = 57

    # T1649
    STEAL_OR_FORGE_AUTHENTICATION_CERTIFICATES = 62
  end
end