Esc
Indicator Removal - T1070
(ATT&CK® Technique)
Definition
Adversaries may delete or modify artifacts generated within systems to remove evidence of their presence or hinder defenses. Various artifacts may be created by an adversary or something that can be attributed to an adversary’s actions. Typically these artifacts are used as defensive indicators related to monitored events, such as strings from downloaded files, logs that are generated from user actions, and other data analyzed by defenders. Location, format, and type of artifact (such as command or login history) are often specific to each platform.
D3FEND Inferred Relationships
Browse the D3FEND knowledge graph by clicking on the nodes below.