<<< Hide Navigation Hide TOC >>>
Recon Information for Export with Command Prompt (aa2efee7-34dd-446e-8a37-40790a66efd7)
Once established within a system or network, an adversary may use automated techniques for collecting internal data.
Cluster A![]() |
Galaxy A![]() |
Cluster B![]() |
Galaxy B![]() |
Level![]() |
---|---|---|---|---|
Recon Information for Export with Command Prompt (aa2efee7-34dd-446e-8a37-40790a66efd7) | Sigma-Rules | Automated Collection - T1119 (30208d3e-0d6b-43c8-883e-44462a514619) | Attack Pattern | 1 |