T1083 - File and Directory Discovery
Tattiche:
Discovery
Discovery
Piattaforme:
ESXi Linux macOS Network Devices +1
ESXi Linux macOS Network Devices +1
Rilevamento:
Not specified
Not specified
Description:
Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system. Adversaries may use the information from [File and Directory Discovery](https://attack.mitre.org/techniques/T1083) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.
Many command shell utilities can be used to obtain this information. Examples include <code>dir</code>, <code>tree</code>, <code>ls</code>, <code>find</code>, and <code>locate</code>.(Citation: Windows Commands JPCERT) Custom tools may also be used to gather file and directory information and interact with the [Native API](https://attack.mitre.org/techniques/T1106). Adversaries may also leverage a [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) on network devices to gather file and directory information (e.g. <code>dir</code>, <code>show flash</code>, and/or <code>nvram</code>).(Citation: US-CERT-TA18-106A)
Some files and directories may require elevated or specific user permissions to access.
Many command shell utilities can be used to obtain this information. Examples include <code>dir</code>, <code>tree</code>, <code>ls</code>, <code>find</code>, and <code>locate</code>.(Citation: Windows Commands JPCERT) Custom tools may also be used to gather file and directory information and interact with the [Native API](https://attack.mitre.org/techniques/T1106). Adversaries may also leverage a [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) on network devices to gather file and directory information (e.g. <code>dir</code>, <code>show flash</code>, and/or <code>nvram</code>).(Citation: US-CERT-TA18-106A)
Some files and directories may require elevated or specific user permissions to access.
Usato da Attori (20)
APT3
Nation-state
Nation-state
DarkHotel
Nation-state
Nation-state
APT18
Nation-state
Nation-state
APT28
Nation-state
Nation-state
Turla
Nation-state
Nation-state
Lazarus Group
Nation-state
Nation-state
Gamaredon Group
Unknown
Unknown
APT32
Nation-state
Nation-state
APT5
Unknown
Unknown
Kimsuky
Nation-state
Nation-state
Sowbug
Nation-state
Nation-state
MuddyWater
Nation-state
Nation-state
Dark Caracal
Unknown
Unknown
MUSTANG PANDA
Nation-state
Nation-state
APT39
Unknown
Unknown
APT41
Nation-state
Nation-state
Fox Kitten
Unknown
Unknown
TeamTNT
Unknown
Unknown
HAFNIUM
Unknown
Unknown
FIN13
Unknown
Unknown
Malware (20)
TrickBot other
PowerDuke other
BLINDINGCAN other
Ninja other
QuietSieve other
SynAck other
AcidRain other
Amadey other
Proxysvc other
Orz other
yty other
Backdoor.Oldrea other
Stuxnet other
AvosLocker other
POWRUNER other
COATHANGER other
Smoke Loader other
WindTail other
Misdat other
KEYMARBLE other
Metadata
| MITRE ID: | T1083 |
| STIX ID: | attack-pattern--7bc57495-ea59-... |
| Piattaforme: | ESXi, Linux, macOS, Network Devices, Windows |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 16:00 |