System Owner or User Discovery (9a0d8ca0-2385-4020-b6c6-cb6153ca56f3)
Adversaries may use the information from System Owner/User Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
System Owner or User Discovery (9a0d8ca0-2385-4020-b6c6-cb6153ca56f3) | Sigma-Rules | System Owner/User Discovery - T1033 (03d7999c-1f4c-42cc-8373-e7690d318104) | Attack Pattern | 1 |