• Home
  • Attack
  • Dataset
  • Contact Us
        • T1-24–01–S–N–CL
        • T2-24–01–S–N–CL
        • T3-24–01–S–N–CL
        • T4-24–01–S–E–M
        • T5-24–01–S–E–LM
        • T6-24–01–S–E–FH
        • T7-24–01–M–NE–CLM
        • T8-24–01–M–NE–CFHL
        • T9-24–01–M–NE–CLM
        • T1-24–02–S–N–CIKM
        • T2-24–02–S–N–CL
        • T3-24–02–S–N–CL
        • T4-24-02-S-E-M
        • T5-24-02-S-E-DL
        • T6-24-02-S-E-DEGN
        • T7-24-02-M-NE-CDEGLN
        • T8-24-02-M-NE-CDL
        • T9-24-02-M-NE-CLH
  • Attack
  • T9 Attack is plans to reveal and share 9 scenarios twice a year. (Number of attack scenarios may change)

    The attacks created a single attack scenario (One Layer) based on MITER ATT&CK TTPs. and attack code is divided into 9, and the first T9 is the 9th attack made that year, and is organized as follows in order of the year it was created.

    For example, if the example above “T9-23-01-S-N-A” is Path Traversal Attack, the attack tool that performs Path Traversal Attack will be ready in the Attacker environment and web server for Path Traversal Attack and system that can collect attack log will be established in Victim environment.

  • * T9-23–01–S–N–A
    : 23 (year)
    : 01 (between 1~N, if the data is the first data released in 2023, the number will be 1)
    : S (S: Single Attack, M: Multi Attack)
    : N (N: Network, E: EndPoint , NE: Network/EndPoint)
    : A (Based on 14 MITRE ATT&CK tactics, the first tactic(Reconnaissance) lettered A and the last tactic (Impact) lettered N. Can be repeated)

  • [Alphabet match with 14 tatics]
    A B C D E F G
    Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion
    H I J K L M N
    Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact

  • We configured a separate environment to perform the attack. The environment was configured to be vulnerable using Virtual Machines and Docker, and a scenario was created to attack the vulnerability.
    We collect logs generated from attack packets and EndPoint, and share the logs and attack environment.
  •  

  • 2024 02

  • ※ Click on the attack name to see a description and scenario for the attack
    • 2024 02
    • T1-24–02–S–N–CIKM
    • T2-24–02–S–N–CL
    • T3-24–02–S–N–CL
    • T4-24-02-S-E-M
    • T5-24-02-S-E-DL
    • T6-24-02-S-E-DEGN
    • T7-24-02-M-NE-CDEGLN
    • T8-24-02-M-NE-CDL
    • T9-24-02-M-NE-CLH
  •  

  • 2024 01

  • ※ Click on the attack name to see a description and scenario for the attack
    • 2024 01
    • T1-24–01–S–N–CL
    • T2-24–01–S–N–CL
    • T3-24–01–S–N–CL
    • T4-24–01–S–E–M
    • T5-24–01–S–E–LM
    • T6-24–01–S–E–FH
    • T7-24–01–M–NE–CLM
    • T8-24–01–M–NE–CFHL
    • T9-24–01–M–NE–CLM
  • Copyright(C) 2024, KAIST Cyber Security Reserch Center. All Rights Reserved.