
Explore what sets RedLegg apart with our Cyber Threat Intelligence Team's in-depth analysis of Silk Typhoon. Learn what to look for and the MITRE ATT&CK techniques.
| TABLE OF CONTENTS | |
| EXECUTIVE SUMMARY | 4 |
| TACTIC: INITIAL ACCESS – TA0001 | 5 |
| OBSERVABLES TABLE | 5 |
| MITRE ATT&CK TECHNIQUES | 5 |
| DETECTION CAPABILITIES | 5 |
| TACTIC: EXECUTION – TA0002 | 5 |
| OBSERVABLES TABLE | 6 |
| MITRE ATT&CK TECHNIQUES | 6 |
| DETECTION CAPABILITIES | 6 |
| TACTIC: PERSISTENCE – TA0003 | 6 |
| OBSERVABLES TABLE | 6 |
| MITRE ATT&CK TECHNIQUES | 6 |
| DETECTION CAPABILITIES | 6 |
| TACTIC: PRIVILEGE ESCALATION – TA0004 | 7 |
| MITRE ATT&CK TECHNIQUES | 6 |
| TACTIC: DEFENSE EVASION – TA0005 | 8 |
| OBSERVABLES TABLE | 8 |
| MITRE ATT&CK TECHNIQUES | 8 |
| DETECTION CAPABILITIES | 8 |
| TACTIC: CREDENTIAL ACCESS – TA0006 | 9 |
| OBSERVABLES TABLE | 9 |
| MITRE ATT&CK TECHNIQUES | 9 |
| DETECTION CAPABILITIES | 9 |
| TACTIC: DISCOVERY – TA0007 | 10 |
| OBSERVABLES TABLE | 10 |
| MITRE ATT&CK TECHNIQUES | 10 |
| DETECTION CAPABILITIES | 11 |
| TACTIC: LATERAL MOVEMENT – TA0008 | 11 |
| DETECTION CAPABILITIES | 11 |
| TACTIC: COLLECTION – TA0009 | 11 |
| OBSERVABLES TABLE | 11 |
| MITRE ATT&CK TECHNIQUES | 11 |
| DETECTION CAPABILITIES | 12 |
| TACTIC: COMMAND AND CONTROL – TA0011 | 12 |
| MITRE ATT&CK TECHNIQUES | 12 |
| DETECTION CAPABILITIES | 12 |
| TACTIC: EXFILTRATION– TA0010 | 14 |
| MITRE ATT&CK TECHNIQUES | 14 |
| TACTIC: IMPACT– TA0040 | 14 |
| OBSERVABLES TABLE | 14 |
| MITRE ATT&CK TECHNIQUES | 14 |
| DETECTION CAPABILITIES | 14 |
| REFERENCES | 15 |