value
stringlengths
25
18k
subtecnique
int64
0
1
answer
stringclasses
2 values
id
stringlengths
5
9
name
stringlengths
3
102
Adversaries may undermine security controls that will either warn users of untrusted activity or prevent execution of untrusted programs. Operating systems and security products may contain mechanisms to identify programs or websites as possessing some level of trust. Examples of such features would include a program b...
0
reject
T1553
Subvert Trust Controls
Adversaries may modify client software binaries to establish persistent access to systems. Client software enables users to access services provided by a server. Common client software types are SSH clients, FTP clients, email clients, and web browsers. Adversaries may make modifications to client software binaries to...
0
reject
T1554
Compromise Client Software Binary
Adversaries may search for common password storage locations to obtain user credentials. Passwords are stored in several places on a system, depending on the operating system or application holding the credentials. There are also specific applications that store passwords to make it easier for users manage and maintain...
0
reject
T1555
Credentials from Password Stores
Adversaries may modify authentication mechanisms and processes to access user credentials or enable otherwise unwarranted access to accounts. The authentication process is handled by mechanisms, such as the Local Security Authentication Server (LSASS) process and the Security Accounts Manager (SAM) on Windows, pluggabl...
0
reject
T1556
Modify Authentication Process
Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](T1040) or [Transmitted Data Manipulation](T1565.002). By abusing features of common networking protocols that can determine the...
0
reject
T1557
Adversary-in-the-Middle
Adversaries may attempt to subvert Kerberos authentication by stealing or forging Kerberos tickets to enable [Pass the Ticket](T1550.003). Kerberos is an authentication protocol widely used in modern Windows domain environments. In Kerberos environments, referred to as “realms”, there are three basic participants: ...
0
reject
T1558
Steal or Forge Kerberos Tickets
Adversaries may abuse inter-process communication (IPC) mechanisms for local code or command execution. IPC is typically used by processes to share data, communicate with each other, or synchronize execution. IPC is also commonly used to avoid situations such as deadlocks, which occurs when processes are stuck in a cyc...
0
reject
T1559
Inter-Process Communication
An adversary may compress and/or encrypt data that is collected prior to exfiltration. Compressing the data can help to obfuscate the collected data and minimize the amount of data sent over the network. Encryption can be used to hide information that is being exfiltrated from detection or make exfiltration less conspi...
0
reject
T1560
Archive Collected Data
Adversaries may wipe or corrupt raw disk data on specific systems or in large numbers in a network to interrupt availability to system and network resources. With direct write access to a disk, adversaries may attempt to overwrite portions of disk data. Adversaries may opt to wipe arbitrary portions of disk data and/or...
0
reject
T1561
Disk Wipe
Adversaries may maliciously modify components of a victim environment in order to hinder or disable defensive mechanisms. This not only involves impairing preventative defenses, such as firewalls and anti-virus, but also detection capabilities that defenders can use to audit activity and identify malicious behavior. Th...
0
reject
T1562
Impair Defenses
Adversaries may take control of preexisting sessions with remote services to move laterally in an environment. Users may use valid credentials to log into a service specifically designed to accept remote connections, such as telnet, SSH, and RDP. When a user logs into a service, a session will be established that will ...
0
reject
T1563
Remote Service Session Hijacking
Adversaries may attempt to hide artifacts associated with their behaviors to evade detection. Operating systems may have features to hide various artifacts, such as important system files and administrative task execution, to avoid disrupting user work environments and prevent users from changing files or features on t...
0
reject
T1564
Hide Artifacts
Adversaries may insert, delete, or manipulate data in order to manipulate external outcomes or hide activity. By manipulating data, adversaries may attempt to affect a business process, organizational understanding, or decision making. The type of modification and the impact it will have depends on the target applicat...
0
reject
T1565
Data Manipulation
Adversaries may send phishing messages to gain access to victim systems. All forms of phishing are electronically delivered social engineering. Phishing can be targeted, known as spearphishing. In spearphishing, a specific individual, company, or industry will be targeted by the adversary. More generally, adversaries c...
0
reject
T1566
Phishing
Adversaries may use an existing, legitimate external Web service to exfiltrate data rather than their primary command and control channel. Popular Web services acting as an exfiltration mechanism may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them...
0
reject
T1567
Exfiltration Over Web Service
Adversaries may dynamically establish connections to command and control infrastructure to evade common detections and remediations. This may be achieved by using malware that shares a common algorithm with the infrastructure the adversary uses to receive the malware's communications. These calculations can be used to ...
0
reject
T1568
Dynamic Resolution
Adversaries may abuse system services or daemons to execute commands or programs. Adversaries can execute malicious content by interacting with or creating services either locally or remotely. Many services are set to run at boot, which can aid in achieving persistence ([Create or Modify System Process](T1543)), but ad...
0
reject
T1569
System Services
Adversaries may transfer tools or other files between systems in a compromised environment. Files may be copied from one system to another to stage adversary tools or other files over the course of an operation. Adversaries may copy files laterally between internal victim systems to support lateral movement using inher...
0
reject
T1570
Lateral Tool Transfer
Adversaries may communicate using a protocol and port paring that are typically not associated. For example, HTTPS over port 8088(Citation: Symantec Elfin Mar 2019) or port 587(Citation: Fortinet Agent Tesla April 2018) as opposed to the traditional port 443. Adversaries may make changes to the standard port used by a ...
0
reject
T1571
Non-Standard Port
Adversaries may tunnel network communications to and from a victim system within a separate protocol to avoid detection/network filtering and/or enable access to otherwise unreachable systems. Tunneling involves explicitly encapsulating a protocol within another. This behavior may conceal malicious traffic by blending ...
0
reject
T1572
Protocol Tunneling
Adversaries may employ a known encryption algorithm to conceal command and control traffic rather than relying on any inherent protections provided by a communication protocol. Despite the use of a secure algorithm, these implementations may be vulnerable to reverse engineering if secret keys are encoded and/or generat...
0
reject
T1573
Encrypted Channel
Adversaries may execute their own malicious payloads by hijacking the way operating systems run programs. Hijacking execution flow can be for the purposes of persistence, since this hijacked execution may reoccur over time. Adversaries may also use these mechanisms to elevate privileges or evade defenses, such as appli...
0
reject
T1574
Hijack Execution Flow
An adversary may attempt to modify a cloud account's compute service infrastructure to evade defenses. A modification to the compute service infrastructure can include the creation, deletion, or modification of one or more components such as compute instances, virtual machines, and snapshots. Permissions gained from t...
0
reject
T1578
Modify Cloud Compute Infrastructure
An adversary may attempt to discover resources that are available within an infrastructure-as-a-service (IaaS) environment. This includes compute service resources such as instances, virtual machines, and snapshots as well as resources of other services including the storage and database services. Cloud providers offe...
0
reject
T1580
Cloud Infrastructure Discovery
Adversaries may buy, lease, or rent infrastructure that can be used during targeting. A wide variety of infrastructure exists for hosting and orchestrating adversary operations. Infrastructure solutions include physical or cloud servers, domains, and third-party web services.(Citation: TrendmicroHideoutsLease) Addition...
0
reject
T1583
Acquire Infrastructure
Adversaries may compromise third-party infrastructure that can be used during targeting. Infrastructure solutions include physical or cloud servers, domains, and third-party web services. Instead of buying, leasing, or renting infrastructure an adversary may compromise infrastructure and use it during other phases of t...
0
reject
T1584
Compromise Infrastructure
Adversaries may create and cultivate accounts with services that can be used during targeting. Adversaries can create accounts that can be used to build a persona to further operations. Persona development consists of the development of public information, presence, history and appropriate affiliations. This developmen...
0
reject
T1585
Establish Accounts
Adversaries may compromise accounts with services that can be used during targeting. For operations incorporating social engineering, the utilization of an online persona may be important. Rather than creating and cultivating accounts (i.e. [Establish Accounts](T1585)), adversaries may compromise existing accounts. Uti...
0
reject
T1586
Compromise Accounts
Adversaries may build capabilities that can be used during targeting. Rather than purchasing, freely downloading, or stealing capabilities, adversaries may develop their own capabilities in-house. This is the process of identifying development requirements and building solutions such as malware, exploits, and self-sign...
0
reject
T1587
Develop Capabilities
Adversaries may buy and/or steal capabilities that can be used during targeting. Rather than developing their own capabilities in-house, adversaries may purchase, freely download, or steal them. Activities may include the acquisition of malware, software (including licenses), exploits, certificates, and information rel...
0
reject
T1588
Obtain Capabilities
Adversaries may gather information about the victim's organization that can be used during targeting. Information about an organization may include a variety of details, including the names of divisions/departments, specifics of business operations, as well as the roles and responsibilities of key employees. Adversari...
0
reject
T1591
Gather Victim Org Information
Adversaries may gather information about the victim's hosts that can be used during targeting. Information about hosts may include a variety of details, including administrative data (ex: name, assigned IP, functionality, etc.) as well as specifics regarding its configuration (ex: operating system, language, etc.). Ad...
0
reject
T1592
Gather Victim Host Information
Adversaries may search freely available websites and/or domains for information about victims that can be used during targeting. Information about victims may be available in various online sites, such as social media, new sites, or those hosting information about business operations such as hiring or requested/rewarde...
0
reject
T1593
Search Open Websites/Domains
Adversaries may search websites owned by the victim for information that can be used during targeting. Victim-owned websites may contain a variety of details, including names of departments/divisions, physical locations, and data about key employees such as names, roles, and contact info (ex: [Email Addresses](T1589.00...
0
reject
T1594
Search Victim-Owned Websites
Adversaries may execute active reconnaissance scans to gather information that can be used during targeting. Active scans are those where the adversary probes victim infrastructure via network traffic, as opposed to other forms of reconnaissance that do not involve direct interaction. Adversaries may perform different...
0
reject
T1595
Active Scanning
Adversaries may search freely available technical databases for information about victims that can be used during targeting. Information about victims may be available in online databases and repositories, such as registrations of domains/certificates as well as public collections of network data/artifacts gathered fro...
0
reject
T1596
Search Open Technical Databases
Adversaries may search and gather information about victims from closed sources that can be used during targeting. Information about victims may be available for purchase from reputable private sources and databases, such as paid subscriptions to feeds of technical/threat intelligence data.(Citation: D3Secutrity CTI Fe...
0
reject
T1597
Search Closed Sources
Adversaries may send phishing messages to elicit sensitive information that can be used during targeting. Phishing for information is an attempt to trick targets into divulging information, frequently credentials or other actionable information. Phishing for information is different from [Phishing](T1566) in that the o...
0
reject
T1598
Phishing for Information
Adversaries may bridge network boundaries by compromising perimeter network devices. Breaching these devices may enable an adversary to bypass restrictions on traffic routing that otherwise separate trusted and untrusted networks. Devices such as routers and firewalls can be used to create boundaries between trusted a...
0
reject
T1599
Network Boundary Bridging
Adversaries may compromise a network device’s encryption capability in order to bypass encryption that would otherwise protect data communications. (Citation: Cisco Synful Knock Evolution) Encryption can be used to protect transmitted network traffic to maintain its confidentiality (protect against unauthorized disc...
0
reject
T1600
Weaken Encryption
Adversaries may make changes to the operating system of embedded network devices to weaken defenses and provide new capabilities for themselves. On such devices, the operating systems are typically monolithic and most of the device functionality and capabilities are contained within a single file. To change the opera...
0
reject
T1601
Modify System Image
Adversaries may collect data related to managed devices from configuration repositories. Configuration repositories are used by management systems in order to configure, manage, and control data on remote systems. Configuration repositories may also facilitate remote access and administration of devices. Adversaries m...
0
reject
T1602
Data from Configuration Repository
Adversaries may forge credential materials that can be used to gain access to web applications or Internet services. Web applications and services (hosted in cloud SaaS environments or on-premise servers) often use session cookies, tokens, or other materials to authenticate and authorize user access. Adversaries may g...
0
reject
T1606
Forge Web Credentials
Adversaries may upload, install, or otherwise set up capabilities that can be used during targeting. To support their operations, an adversary may need to take capabilities they developed ([Develop Capabilities](T1587)) or obtained ([Obtain Capabilities](T1588)) and stage them on infrastructure under their control. The...
0
reject
T1608
Stage Capabilities
Adversaries may abuse a container administration service to execute commands within a container. A container administration service such as the Docker daemon, the Kubernetes API server, or the kubelet may allow remote management of containers within an environment.(Citation: Docker Daemon CLI)(Citation: Kubernetes API)...
0
reject
T1609
Container Administration Command
Adversaries may deploy a container into an environment to facilitate execution or evade defenses. In some cases, adversaries may deploy a new container to execute processes associated with a particular image or deployment, such as processes that execute or download malware. In others, an adversary may deploy a new cont...
0
reject
T1610
Deploy Container
Adversaries may break out of a container to gain access to the underlying host. This can allow an adversary access to other containerized resources from the host level or to the host itself. In principle, containerized resources should provide a clear separation of application functionality and be isolated from the hos...
0
reject
T1611
Escape to Host
Adversaries may build a container image directly on a host to bypass defenses that monitor for the retrieval of malicious images from a public registry. A remote `build` request may be sent to the Docker API that includes a Dockerfile that pulls a vanilla base image, such as alpine, from a public or local registry and ...
0
reject
T1612
Build Image on Host
Adversaries may attempt to discover containers and other resources that are available within a containers environment. Other resources may include images, deployments, pods, nodes, and other information such as the status of a cluster. These resources can be viewed within web applications such as the Kubernetes dashbo...
0
reject
T1613
Container and Resource Discovery
Adversaries may gather information on Group Policy settings to identify paths for privilege escalation, security measures applied within a domain, and to discover patterns in domain objects that can be manipulated or used to blend in the environment. Group Policy allows for centralized management of user and computer s...
0
reject
T1615
Group Policy Discovery
Adversaries may enumerate objects in cloud storage infrastructure. Adversaries may use this information during automated discovery to shape follow-on behaviors, including requesting all or specific objects from cloud storage. Similar to [File and Directory Discovery](T1083) on a local host, after identifying available...
0
reject
T1619
Cloud Storage Object Discovery
Adversaries may reflectively load code into a process in order to conceal the execution of malicious payloads. Reflective loading involves allocating then executing payloads directly within the memory of the process, vice creating a thread or process backed by a file path on disk. Reflectively loaded payloads may be co...
0
reject
T1620
Reflective Code Loading
Astaroth has been delivered via malicious e-mail attachments.
1
accept
T1598.002
Phishing for Information: Spearphishing Attachment
Sidewinder has sent e-mails with malicious attachments that lead victims to credential harvesting websites.
1
accept
T1598.002
Phishing for Information: Spearphishing Attachment
A phishing campaign has been observed by researchers from Trend Micro that contain a macro-enabled document that exploits the legitimate script engine, “AutoHotKey.”
1
accept
T1598.002
Phishing for Information: Spearphishing Attachment
Researchers have discovered a wave of emails with malicious attachments orchestrated by Russian Advanced Persistent Threat (APT) group APT29.
1
accept
T1598.002
Phishing for Information: Spearphishing Attachment
Using attached HTML files containing JavaScript, the email will write an ISO file to disk; this contains a Cobalt Strike beacon that will activate on completion.
1
accept
T1598.002
Phishing for Information: Spearphishing Attachment
Strrat, a Java-based malware, is currently being delivered as an attached PDF document via a phishing campaign using compromised email accounts.
1
accept
T1598.002
Phishing for Information: Spearphishing Attachment
Although the email may look official and legitimate, if you have no reason to receive such an email or if the content is questionable, you should not open any attached files.
1
accept
T1598.002
Phishing for Information: Spearphishing Attachment
Some spam lists are selected to target a specific business role, for example identified sales representatives.
1
accept
T1591.004
Gather Victim Org Information: Identify Roles
Through reading the extracted emails, threat actors identified that fund transfers were originating in the accounting department by person A and approved by manager B.
1
accept
T1591.004
Gather Victim Org Information: Identify Roles
RestorePrivacy, an information site about privacy, examined the proof the seller put out and found the following information, scraped from LinkedIn user profiles: Email addresses, Full names, Phone numbers, Physical addresses, LinkedIn username and profile URL, Personal and professional experience/background.
1
accept
T1591.004
Gather Victim Org Information: Identify Roles
Targets are identified, groomed, and then deceived by quite sophisticated email techniques into wiring funds to 'burner' bank accounts, and thinking that the email request comes from the CEO, the victim willingly sends the money.
1
accept
T1591.004
Gather Victim Org Information: Identify Roles
This threat group instructs its affiliates to parse companies’ websites and social media to identify leadership, HR, and accounting staff for following targeted spear phishing attacks.
1
accept
T1591.004
Gather Victim Org Information: Identify Roles
Threat actors identified that long holiday weekend in the US will be the best time to lunch a cyber attack against this company.
1
accept
T1591.003
Gather Victim Org Information: Identify Business Tempo
The federal advisory makes note of "recent holiday targeting," stating that "cyber actors have conducted increasingly impactful attacks against U.S. entities on or around holiday weekends." Neither FBI nor CISA has information about a cyberattack "coinciding with upcoming holidays and weekends," per the advisory, but ...
1
accept
T1591.003
Gather Victim Org Information: Identify Business Tempo
Whether you celebrate Christmas, Hanukkah, or Thanksgiving, your chances of being the victim of a cyber attack increase. The vacation season is yet another perfect period for cyber attacks. If a hacker had a choice between attacking your organization when your IT security team is fully staffed or when it isn’t- what ...
1
accept
T1591.003
Gather Victim Org Information: Identify Business Tempo
Many times, organizations are overburdened, and cyberattacks during the holidays are the last thing on their minds. The current pandemic heightened the threat, which has resulted in many firms operating with significant cybersecurity flaws resulting from the rapid shift to working from home. Cybercriminals exploit the...
1
accept
T1591.003
Gather Victim Org Information: Identify Business Tempo
Once they had infected the computers of the personnel in charge of cash transfer systems or ATMs, the attackers collected snapshots of victims’ screens and studied their daily activities in the bank.
1
accept
T1591.003
Gather Victim Org Information: Identify Business Tempo
REvil was previously known as GandCrab, and one of the many things GandCrab had in common with REvil was that both programs barred affiliates from infecting victims in Syria.
1
accept
T1591.001
Gather Victim Org Information: Determine Physical Locations
As we can see from the chart above, Syria is also exempted from infections by DarkSide ransomware.
1
accept
T1591.001
Gather Victim Org Information: Determine Physical Locations
However, upon closer inspection, it turns out this is actually a clever language check to ensure that the payload will not be downloaded outside of France.
1
accept
T1591.001
Gather Victim Org Information: Determine Physical Locations
The majority of the actors behind the ransomware are likely based outside of the CIS, for example, ransomware Fonix won’t run if IP geolocation is Iranian.
1
accept
T1591.001
Gather Victim Org Information: Determine Physical Locations
DarkSide, like a great many other malware strains, has a hard-coded do-not-install list of countries which are the principal members of the Commonwealth of Independent States (CIS) — former Soviet satellites that mostly have favorable relations with the Kremlin.
1
accept
T1591.001
Gather Victim Org Information: Determine Physical Locations
REvil was previously known as GandCrab, and one of the many things GandCrab had in common with REvil was that both programs barred affiliates from infecting victims in Syria.
1
accept
T1591.001
Gather Victim Org Information: Determine Physical Locations
As we can see from the chart above, Syria is also exempted from infections by DarkSide ransomware. ;; However, upon closer inspection, it turns out this is actually a clever language check to ensure that the payload will not be downloaded outside of France.
1
accept
T1591.001
Gather Victim Org Information: Determine Physical Locations
In preparation for its attack against the 2018 Winter Olympics Sandworm Team conducted online research of partner organizations listed on an official PyeongChang Olympics partnership site.
1
accept
T1591.002
Gather Victim Org Information: Business Relationships
Generally, supply chain attacks on information systems begin with an advanced persistent threat (APT) that determines a member of the supply network with the weakest cyber security in order to affect the target organization.
1
accept
T1591.002
Gather Victim Org Information: Business Relationships
It also found that hackers can steal sensitive data, including information about partners.
1
accept
T1591.002
Gather Victim Org Information: Business Relationships
The attackers were after Facebook’s information about partners.
1
accept
T1591.002
Gather Victim Org Information: Business Relationships
Clues about business partners can provide a hacker with other potential avenues of attack.
1
accept
T1591.002
Gather Victim Org Information: Business Relationships
Attackers identified and impersonated the company’s foreign supplier in a Bogus Invoice Scheme attack.
1
accept
T1591.002
Gather Victim Org Information: Business Relationships
Attackers are looking for IT service providers that have privileged access to their clients’ networks.
1
accept
T1590.003
Gather Victim Network Information: Network Trust Dependencies
Nation-state sponsored hackers are targeting IT service providers and discovering network trust relationships with their client organizations from government and military sectors.
1
accept
T1590.003
Gather Victim Network Information: Network Trust Dependencies
The threat actors were looking for MSPs and MSSPs managing IT and security within the target organization.
1
accept
T1590.003
Gather Victim Network Information: Network Trust Dependencies
In all of the cases, attackers enumerated network trust relationships, hijacked the managed service providers’ internal management tools to distribute Sodinokibi ransomware to their customers.
1
accept
T1590.003
Gather Victim Network Information: Network Trust Dependencies
A hacker can make one strategic breach into an MSP, discover network access to their clients, and gain access to multiple customers’ information across multiple industries.
1
accept
T1590.003
Gather Victim Network Information: Network Trust Dependencies
The group utilizes active scanning to collect information on the victim network.
1
accept
T1590.004
Gather Victim Network Information: Network Topology
After the initial foothold the actors were scanning to map the local network devices and plan the lateral movement.
1
accept
T1590.004
Gather Victim Network Information: Network Topology
During the exfiltration stage, attackers were identifying documents related to local accounts, network security and topology.
1
accept
T1590.004
Gather Victim Network Information: Network Topology
Requirement to publish procurement documents made it possible for the attackers to access specifics regarding network devices used by the organization (gateways, routers, etc.)
1
accept
T1590.004
Gather Victim Network Information: Network Topology
All the graphs, mind maps, presentations including the physical and/or logical arrangement of both external-facing and internal network environments should be treated as sensitive information.
1
accept
T1590.004
Gather Victim Network Information: Network Topology
This firewall company had a few large customers listed on their website thus providing the attackers with convenient targets.
1
accept
T1590.006
Gather Victim Network Information: Network Security Appliances
Requirement to publish procurement documents made it possible for the attackers to access specifics regarding network security appliances used by the organization (firewalls, content filters, NIDS, etc.)
1
accept
T1590.006
Gather Victim Network Information: Network Security Appliances
Following the intrusion, actors were scanning to identify firewalls and other deployed security appliances.
1
accept
T1590.006
Gather Victim Network Information: Network Security Appliances
This group phishes for information trying to identify deployed security appliances and leverage it for initial access.
1
accept
T1590.006
Gather Victim Network Information: Network Security Appliances
This APT group was identifying the use of proxies and company VPN and then utilizing these security appliances for stealthy lateral movement.
1
accept
T1590.006
Gather Victim Network Information: Network Security Appliances
HAFNIUM has obtained IP addresses for publicly-accessible Exchange servers.
1
accept
T1590.005
Gather Victim Network Information: Ip Addresses
Andariel has limited its watering hole attacks to specific IP address ranges.
1
accept
T1590.005
Gather Victim Network Information: Ip Addresses
Initially the attackers research the victim’s IP ranges and scan them for open ports and opportunities for the initial access.
1
accept
T1590.005
Gather Victim Network Information: Ip Addresses