GET /api/techniques/394/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 394,
    "key": "wmi-event-subscriptions",
    "unprotect_id": "U1353",
    "name": "WMI Event Subscriptions",
    "description": "Adversaries may leverage WMI event subscriptions to evade detection by triggering malicious actions only under specific conditions that are unlikely to occur in a sandboxed environment. For instance, a threat actor might configure an event subscription to monitor file system, network, or logon activity, ensuring that their second-stage payload is only downloaded and executed when a particular event suggests real user activity, thereby bypassing automated analysis",
    "windows": "",
    "linux": "",
    "macos": "",
    "resources": "https://attack.mitre.org/techniques/T1546\r\nhttps://github.com/1d8/offsec/tree/main/persistence/windows/wmi-event-subscription",
    "creation_date": "2025-04-02T07:50:20.849022Z",
    "tags": "",
    "modification_date": "2025-04-02T07:50:20.849064Z",
    "category": [
        1
    ],
    "rules": [],
    "attachments": [],
    "featured_api": [],
    "contributors": [
        41
    ]
}