{ "type": "bundle", "id": "bundle--6eb77e7b-d8d4-4e91-9dfb-0206a378e19b", "spec_version": "2.0", "objects": [ { "modified": "2023-03-17T15:14:31.276Z", "name": "Remote System Information Discovery", "description": "An adversary may attempt to get detailed information about remote systems and their peripherals, such as make/model, role, and configuration. Adversaries may use information from Remote System Information Discovery to aid in targeting and shaping follow-on behaviors. For example, the system's operational role and model information can dictate whether it is a relevant target for the adversary's operational objectives. In addition, the system's configuration may be used to scope subsequent technique usage. \n\nRequests for system information are typically implemented using automation and management protocols and are often automatically requested by vendor software during normal operation. This information may be used to tailor management actions, such as program download and system or module firmware. An adversary may leverage this same information by issuing calls directly to the system's API.", "kill_chain_phases": [ { "kill_chain_name": "mitre-ics-attack", "phase_name": "discovery" } ], "x_mitre_deprecated": false, "x_mitre_detection": "", "x_mitre_domains": [ "ics-attack" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ "Field Controller/RTU/PLC/IED", "Safety Instrumented System/Protection Relay" ], "x_mitre_version": "1.1", "x_mitre_data_sources": [ "File: File Access", "Network Traffic: Network Traffic Content", "Process: Process Creation", "Network Traffic: Network Traffic Flow" ], "type": "attack-pattern", "id": "attack-pattern--2fedbe69-581f-447d-8a78-32ee7db939a9", "created": "2021-04-13T12:45:26.506Z", "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", "revoked": false, "external_references": [ { "source_name": "mitre-attack", "url": "https://attack.mitre.org/techniques/T0888", "external_id": "T0888" } ], "object_marking_refs": [ "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" ], "x_mitre_attack_spec_version": "3.1.0", "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" } ] }