{ "name": "RDFSNIFFER", "version": "2.1", "domain": "mitre-enterprise", "description": "", "filters": { "stages": [ "act" ], "platforms": [ "windows", "linux", "mac" ] }, "sorting": 0, "viewMode": 0, "hideDisabled": false, "techniques": [ { "techniqueID": "T1106", "tactic": "execution", "color": "#e60d0d", "comment": "RDFSNIFFER hooks several Win32 API functions intended to enable it to tamper with NCR Aloha Command Center Client sessions or hijack elements of its user-interface", "enabled": true, "metadata": [] }, { "techniqueID": "T1107", "tactic": "defense-evasion", "color": "#e60d0d", "comment": "RDFSNIFFER has the capability of deleting local files", "enabled": true, "metadata": [] }, { "techniqueID": "T1179", "tactic": "persistence", "color": "#e60d0d", "comment": "RDFSNIFFER hooks several Win32 API functions intended to enable it to tamper with NCR Aloha Command Center Client sessions or hijack elements of its user-interface", "enabled": true, "metadata": [] }, { "techniqueID": "T1179", "tactic": "privilege-escalation", "color": "#e60d0d", "comment": "RDFSNIFFER hooks several Win32 API functions intended to enable it to tamper with NCR Aloha Command Center Client sessions or hijack elements of its user-interface", "enabled": true, "metadata": [] }, { "techniqueID": "T1179", "tactic": "credential-access", "color": "#e60d0d", "comment": "RDFSNIFFER hooks several Win32 API functions intended to enable it to tamper with NCR Aloha Command Center Client sessions or hijack elements of its user-interface", "enabled": true, "metadata": [] } ], "gradient": { "colors": [ "#ff6666", "#ffe766", "#8ec843" ], "minValue": 0, "maxValue": 100 }, "legendItems": [], "metadata": [], "showTacticRowBackground": false, "tacticRowBackground": "#dddddd", "selectTechniquesAcrossTactics": true }