Research Article
An Automatic Assessment Method of Cyber Threat Intelligence Combined with ATT&CK Matrix
Table 7
Top 10 most frequently used ATT&CK techniques and occurrences.
| Attack technique id and name | Occurrences in the reports |
| T1129 Shared Modules | 872 | T1027 Software Packing | 831 | T1082 System Information Discovery | 527 | T1053 Scheduled Task | 469 | T1057 Process Discovery | 391 | T1040 Network Sniffing | 322 | T1547 Registry Run Keys/Startup Folder | 255 | T1012 Query Registry | 240 | T1143 Hidden Window | 192 | T1055 Process Injection | 184 |
|
|