Research Article

GroupTracer: Automatic Attacker TTP Profile Extraction and Group Cluster in Internet of Things

Table 1

Some examples of mapping from commands to TTP profiles.

CommandTechniqueTactic

1st knowledge base
show running-configCredential dumpingCredential access
show startup-configCredential dumpingCredential access

2nd knowledge base
ftpgetRemote file copyLateral movement
wgetRemote file copyLateral movement
curlRemote file copyLateral movement
rcpRemote file copyLateral movement
copyRemote file copyLateral movement
show archive configCredentials in filesCredential access
show historyInput captureCollection
show loggingInput captureCollection
tarData compressedExfiltration
zipData compressedExfiltration
rarData compressedExfiltration
shutdownSystem shutdown/rebootImpact
rebootSystem shutdown/rebootImpact
delFile deletionDefense evasion
rmFile deletionDefense evasion
adduserCreate accountPersistence
usermodAccount manipulationPersistence
groupaddAccount manipulationPersistence
dirFile and directory discoveryDiscovery
lsFile and directory discoveryDiscovery
cdFile and directory discoveryDiscovery
echoData from local systemCollection
catData from local systemCollection
moreData from local systemCollection
pwdData from local systemCollection
whoamiData from local systemCollection