Research Article

An Automatic Assessment Method of Cyber Threat Intelligence Combined with ATT&CK Matrix

Table 7

Top 10 most frequently used ATT&CK techniques and occurrences.

Attack technique id and nameOccurrences in the reports

T1129 Shared Modules872
T1027 Software Packing831
T1082 System Information Discovery527
T1053 Scheduled Task469
T1057 Process Discovery391
T1040 Network Sniffing322
T1547 Registry Run Keys/Startup Folder255
T1012 Query Registry240
T1143 Hidden Window192
T1055 Process Injection184