mitre_attack.proto 4.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211
  1. // Copyright 2022 Google LLC
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. syntax = "proto3";
  15. package google.cloud.securitycenter.v1;
  16. option csharp_namespace = "Google.Cloud.SecurityCenter.V1";
  17. option go_package = "google.golang.org/genproto/googleapis/cloud/securitycenter/v1;securitycenter";
  18. option java_multiple_files = true;
  19. option java_outer_classname = "MitreAttackProto";
  20. option java_package = "com.google.cloud.securitycenter.v1";
  21. option php_namespace = "Google\\Cloud\\SecurityCenter\\V1";
  22. option ruby_package = "Google::Cloud::SecurityCenter::V1";
  23. // MITRE ATT&CK tactics and techniques related to this finding.
  24. // See: https://attack.mitre.org
  25. message MitreAttack {
  26. // MITRE ATT&CK tactics that can be referenced by SCC findings.
  27. // See: https://attack.mitre.org/tactics/enterprise/
  28. enum Tactic {
  29. // Unspecified value.
  30. TACTIC_UNSPECIFIED = 0;
  31. // TA0043
  32. RECONNAISSANCE = 1;
  33. // TA0042
  34. RESOURCE_DEVELOPMENT = 2;
  35. // TA0001
  36. INITIAL_ACCESS = 5;
  37. // TA0002
  38. EXECUTION = 3;
  39. // TA0003
  40. PERSISTENCE = 6;
  41. // TA0004
  42. PRIVILEGE_ESCALATION = 8;
  43. // TA0005
  44. DEFENSE_EVASION = 7;
  45. // TA0006
  46. CREDENTIAL_ACCESS = 9;
  47. // TA0007
  48. DISCOVERY = 10;
  49. // TA0008
  50. LATERAL_MOVEMENT = 11;
  51. // TA0009
  52. COLLECTION = 12;
  53. // TA0011
  54. COMMAND_AND_CONTROL = 4;
  55. // TA0010
  56. EXFILTRATION = 13;
  57. // TA0040
  58. IMPACT = 14;
  59. }
  60. // MITRE ATT&CK techniques that can be referenced by SCC findings.
  61. // See: https://attack.mitre.org/techniques/enterprise/
  62. enum Technique {
  63. // Unspecified value.
  64. TECHNIQUE_UNSPECIFIED = 0;
  65. // T1595
  66. ACTIVE_SCANNING = 1;
  67. // T1595.001
  68. SCANNING_IP_BLOCKS = 2;
  69. // T1105
  70. INGRESS_TOOL_TRANSFER = 3;
  71. // T1106
  72. NATIVE_API = 4;
  73. // T1129
  74. SHARED_MODULES = 5;
  75. // T1059
  76. COMMAND_AND_SCRIPTING_INTERPRETER = 6;
  77. // T1059.004
  78. UNIX_SHELL = 7;
  79. // T1496
  80. RESOURCE_HIJACKING = 8;
  81. // T1090
  82. PROXY = 9;
  83. // T1090.002
  84. EXTERNAL_PROXY = 10;
  85. // T1090.003
  86. MULTI_HOP_PROXY = 11;
  87. // T1568
  88. DYNAMIC_RESOLUTION = 12;
  89. // T1552
  90. UNSECURED_CREDENTIALS = 13;
  91. // T1078
  92. VALID_ACCOUNTS = 14;
  93. // T1078.003
  94. LOCAL_ACCOUNTS = 15;
  95. // T1078.004
  96. CLOUD_ACCOUNTS = 16;
  97. // T1498
  98. NETWORK_DENIAL_OF_SERVICE = 17;
  99. // T1069
  100. PERMISSION_GROUPS_DISCOVERY = 18;
  101. // T1069.003
  102. CLOUD_GROUPS = 19;
  103. // T1567
  104. EXFILTRATION_OVER_WEB_SERVICE = 20;
  105. // T1567.002
  106. EXFILTRATION_TO_CLOUD_STORAGE = 21;
  107. // T1098
  108. ACCOUNT_MANIPULATION = 22;
  109. // T1098.004
  110. SSH_AUTHORIZED_KEYS = 23;
  111. // T1543
  112. CREATE_OR_MODIFY_SYSTEM_PROCESS = 24;
  113. // T1539
  114. STEAL_WEB_SESSION_COOKIE = 25;
  115. // T1578
  116. MODIFY_CLOUD_COMPUTE_INFRASTRUCTURE = 26;
  117. // T1190
  118. EXPLOIT_PUBLIC_FACING_APPLICATION = 27;
  119. // T1556
  120. MODIFY_AUTHENTICATION_PROCESS = 28;
  121. // T1485
  122. DATA_DESTRUCTION = 29;
  123. // T1484
  124. DOMAIN_POLICY_MODIFICATION = 30;
  125. // T1562
  126. IMPAIR_DEFENSES = 31;
  127. // T1046
  128. NETWORK_SERVICE_DISCOVERY = 32;
  129. // T1134
  130. ACCESS_TOKEN_MANIPULATION = 33;
  131. // T1548
  132. ABUSE_ELEVATION_CONTROL_MECHANISM = 34;
  133. // T1078.001
  134. DEFAULT_ACCOUNTS = 35;
  135. }
  136. // The MITRE ATT&CK tactic most closely represented by this finding, if any.
  137. Tactic primary_tactic = 1;
  138. // The MITRE ATT&CK technique most closely represented by this finding, if
  139. // any. primary_techniques is a repeated field because there are multiple
  140. // levels of MITRE ATT&CK techniques. If the technique most closely
  141. // represented by this finding is a sub-technique (e.g. `SCANNING_IP_BLOCKS`),
  142. // both the sub-technique and its parent technique(s) will be listed (e.g.
  143. // `SCANNING_IP_BLOCKS`, `ACTIVE_SCANNING`).
  144. repeated Technique primary_techniques = 2;
  145. // Additional MITRE ATT&CK tactics related to this finding, if any.
  146. repeated Tactic additional_tactics = 3;
  147. // Additional MITRE ATT&CK techniques related to this finding, if any, along
  148. // with any of their respective parent techniques.
  149. repeated Technique additional_techniques = 4;
  150. // The MITRE ATT&CK version referenced by the above fields. E.g. "8".
  151. string version = 5;
  152. }