value
stringlengths
25
18k
subtecnique
int64
0
1
answer
stringclasses
2 values
id
stringlengths
5
9
name
stringlengths
3
102
SparklingGoblin uses servers hosted by various providers for its C&C servers.
1
accept
T1583.004
Acquire Infrastructure: Server
APT1 has registered hundreds of domains for use in operations.
1
accept
T1583.001
Acquire Infrastructure: Domains
APT28 registered domains imitating NATO OSCE security websites Caucasus information resources and other organizations.
1
accept
T1583.001
Acquire Infrastructure: Domains
APT29 has acquired C2 domains through resellers.
1
accept
T1583.001
Acquire Infrastructure: Domains
APT32 has set up and operated websites to gather information and deliver malware.
1
accept
T1583.001
Acquire Infrastructure: Domains
Kimsuky has registered domains to spoof targeted organizations and trusted third parties.
1
accept
T1583.001
Acquire Infrastructure: Domains
Lazarus Group has acquired infrastructure related to their campaigns to act as distribution points and C2 channels.
1
accept
T1583.001
Acquire Infrastructure: Domains
menuPass has registered malicious domains for use in intrusion campaigns.
1
accept
T1583.001
Acquire Infrastructure: Domains
Mustang Panda have acquired C2 domains prior to operations. ;; Sandworm Team has registered domain names and created URLs that are often designed to mimic or spoof legitimate websites such as email login pages online file sharing and storage websites and password reset pages. ;; Silent Librarian has acquired domains t...
1
accept
T1583.001
Acquire Infrastructure: Domains
Attackers may opt to configure and run their own DNS servers in support of operations.
1
accept
T1583.002
Acquire Infrastructure: Dns Server
Adversaries may utilize DNS traffic for various tasks, including for Command and Control.
1
accept
T1583.002
Acquire Infrastructure: Dns Server
APT31 will utilize their own DNS server for use when conducting malicious activities.
1
accept
T1583.002
Acquire Infrastructure: Dns Server
Moses Staff will acquire their own infrastructure, usually domains and DNS.
1
accept
T1583.002
Acquire Infrastructure: Dns Server
TigerRAT variants can be modified to utilize a threat actor's own DNS infrastructure.
1
accept
T1583.002
Acquire Infrastructure: Dns Server
Adversaries may compromise numerous third-party systems to form a botnet that can be used during targeting.
1
accept
T1583.005
Acquire Infrastructure: Botnet
Attackers may conduct a takeover of an existing botnet, such as redirecting bots to adversary-controlled C2 servers.
1
accept
T1583.005
Acquire Infrastructure: Botnet
FreakOut attacked POS systems in order to use them as a botnet infrastructure.
1
accept
T1583.005
Acquire Infrastructure: Botnet
Mirai malware created a botnet used by multiple threat actor groups.
1
accept
T1583.005
Acquire Infrastructure: Botnet
Meris attacked Yandex with DDOS using botnets.
1
accept
T1583.005
Acquire Infrastructure: Botnet
APT29 has created self-signed digital certificates to enable mutual TLS authentication for malware.
1
accept
T1587.003
Develop Capabilities: Digital Certificates
PROMETHIUM has created self-signed digital certificates for use in HTTPS C2 traffic.
1
accept
T1587.003
Develop Capabilities: Digital Certificates
Adversaries may create self-signed SSL/TLS certificates that can be used to further their operations, such as encrypting C2 traffic.
1
accept
T1587.003
Develop Capabilities: Digital Certificates
UNC2190 created self-signed certificates to spread SABBATH ransomware.
1
accept
T1587.003
Develop Capabilities: Digital Certificates
FIN13 used SSL certificates for C2 communication via email.
1
accept
T1587.003
Develop Capabilities: Digital Certificates
Lazarus Group has obtained SSL certificates for their C2 domains.
1
accept
T1588.004
Obtain Capabilities: Digital Certificates
Silent Librarian has obtained free Let's Encrypt SSL certificates for use on their phishing pages.
1
accept
T1588.004
Obtain Capabilities: Digital Certificates
Adversaries may buy and/or steal SSL/TLS certificates that can be used during targeting.
1
accept
T1588.004
Obtain Capabilities: Digital Certificates
Certificate authorities exist that allow adversaries to acquire SSL/TLS certificates, such as domain validation certificates, for free.
1
accept
T1588.004
Obtain Capabilities: Digital Certificates
Adversaries may register or hijack domains that they will later purchase an SSL/TLS certificate for..
1
accept
T1588.004
Obtain Capabilities: Digital Certificates
Fox Kitten has used scripts to access credential information from the KeePass database.
1
accept
T1555.005
Credentials from Password Stores: Password Managers
Operation Wocao has accessed and collected credentials from password managers.
1
accept
T1555.005
Credentials from Password Stores: Password Managers
Proton gathers credentials in files for 1password.
1
accept
T1555.005
Credentials from Password Stores: Password Managers
TrickBot can steal passwords from the KeePass open source password manager.
1
accept
T1555.005
Credentials from Password Stores: Password Managers
MarkiRAT can gather information from the Keepass password manager.
1
accept
T1555.005
Credentials from Password Stores: Password Managers
APT28 has used several malicious applications that abused OAuth access tokens to gain access to target email accounts including Gmail and Yahoo Mail.
1
accept
T1550.001
Use Alternate Authentication Material: Application Access Token
Adversaries may use alternate authentication material, such as password hashes, Kerberos tickets, and application access tokens, in order to move laterally within an environment and bypass normal system access controls.
1
accept
T1550.001
Use Alternate Authentication Material: Application Access Token
With an OAuth access token an adversary can use the user-granted REST API to perform functions such as email searching and contact enumeration.
1
accept
T1550.001
Use Alternate Authentication Material: Application Access Token
Obtaining a token which grants access to a victim’s primary email, the adversary may be able to extend access to all other services which the target subscribes by triggering forgotten password routines.
1
accept
T1550.001
Use Alternate Authentication Material: Application Access Token
OAuth is one commonly implemented framework that issues tokens to users for access to Software-as-a-Service.
1
accept
T1550.001
Use Alternate Authentication Material: Application Access Token
4H RAT has the capability to create a remote shell.
1
accept
T1059.003
Command and Scripting Interpreter: Windows Command Shell
ABK has the ability to use cmd to run a Portable Executable (PE) on the compromised host.
1
accept
T1059.003
Command and Scripting Interpreter: Windows Command Shell
adbupd can run a copy of cmd.exe.
1
accept
T1059.003
Command and Scripting Interpreter: Windows Command Shell
Following exploitation with LOWBALL malware admin@338 actors created a file containing a list of commands to be executed on the compromised computer.
1
accept
T1059.003
Command and Scripting Interpreter: Windows Command Shell
ADVSTORESHELL can create a remote shell and run a given command.
1
accept
T1059.003
Command and Scripting Interpreter: Windows Command Shell
Anchor has used cmd.exe to run its self deletion routine.
1
accept
T1059.003
Command and Scripting Interpreter: Windows Command Shell
APT1 has used the Windows command shell to execute commands and batch scripting to automate execution.
1
accept
T1059.003
Command and Scripting Interpreter: Windows Command Shell
APT18 uses cmd.exe to execute commands on the victim’s machine. ;; An APT28 loader Trojan uses a cmd.exe and batch script to run its payload. The group has also used macros to execute payloads. ;; APT29 used cmd.exe to execute commands on remote machines. ;; An APT3 downloader uses the Windows command cmd.exe" /C whoa...
1
accept
T1059.003
Command and Scripting Interpreter: Windows Command Shell
AppleJeus has been distributed via spearphishing link.
1
accept
T1566.002
Phishing: Spearphishing Link
APT1 has sent spearphishing emails containing hyperlinks to malicious files.
1
accept
T1566.002
Phishing: Spearphishing Link
APT28 sent spearphishing emails which used a URL-shortener service to masquerade as a legitimate service and to redirect targets to credential harvesting sites.
1
accept
T1566.002
Phishing: Spearphishing Link
APT29 has used spearphishing with a link to trick victims into clicking on a link to a zip file containing malicious files.
1
accept
T1566.002
Phishing: Spearphishing Link
APT32 has sent spearphishing emails containing malicious links.
1
accept
T1566.002
Phishing: Spearphishing Link
APT33 has sent spearphishing emails containing links to .hta files.
1
accept
T1566.002
Phishing: Spearphishing Link
APT39 leveraged spearphishing emails with malicious links to initially compromise victims.
1
accept
T1566.002
Phishing: Spearphishing Link
Bazar has been spread via e-mails with embedded malicious links. ;; BlackTech has used spearphishing e-mails with links to cloud services to deliver malware. ;; Cobalt Group has sent emails with URLs pointing to malicious documents. ;; Dragonfly 2.0 used spearphishing with PDF attachments containing malicious links th...
1
accept
T1566.002
Phishing: Spearphishing Link
APT29 created tokens using compromised SAML signing certificates.
1
accept
T1606.002
Forge Web Credentials: Saml Tokens
UNC2452 created tokens using compromised SAML signing certificates.
1
accept
T1606.002
Forge Web Credentials: Saml Tokens
Supply chain breaches, such as Solarwinds, are partially exploited via forged credentials that obtain access such as the forging of SMAL tokens.
1
accept
T1606.002
Forge Web Credentials: Saml Tokens
APT30 can break single sign on (SSO) if it is SMAL v2.0 through the forgery of SMAL tokens.
1
accept
T1606.002
Forge Web Credentials: Saml Tokens
Threat actors can change the normal 1 hour limit upon the legitimacy of a token through accessing the AccessTokenLifetime element.
1
accept
T1606.002
Forge Web Credentials: Saml Tokens
Agent Tesla can gather credentials from a number of browsers.
1
accept
T1555.003
Credentials from Password Stores: Credentials From Web Browsers
Ajax Security Team has used FireMalv custom-developed malware which collected passwords from the Firefox browser storage.
1
accept
T1555.003
Credentials from Password Stores: Credentials From Web Browsers
APT3 has used tools to dump passwords from browsers.
1
accept
T1555.003
Credentials from Password Stores: Credentials From Web Browsers
APT33 has used a variety of publicly available tools like LaZagne to gather credentials.
1
accept
T1555.003
Credentials from Password Stores: Credentials From Web Browsers
APT37 has used a credential stealer known as ZUMKONG that can harvest usernames and passwords stored in browsers.
1
accept
T1555.003
Credentials from Password Stores: Credentials From Web Browsers
Azorult can steal credentials from the victim's browser.
1
accept
T1555.003
Credentials from Password Stores: Credentials From Web Browsers
Some Backdoor.Oldrea samples contain a publicly available Web browser password recovery tool.
1
accept
T1555.003
Credentials from Password Stores: Credentials From Web Browsers
BlackEnergy has used a plug-in to gather credentials from web browsers including FireFox Google Chrome and Internet Explorer. ;; Carberp's passw.plug plugin can gather passwords saved in Opera Internet Explorer Safari Firefox and Chrome. ;; ChChes steals credentials stored inside Internet Explorer. ;; CookieMiner can ...
1
accept
T1555.003
Credentials from Password Stores: Credentials From Web Browsers
APT29 used a forged duo-sid cookie to bypass MFA set on an email account.
1
accept
T1550.004
Use Alternate Authentication Material: Web Session Cookie
UNC2452 used a forged duo-sid cookie to bypass MFA set on an email account.
1
accept
T1550.004
Use Alternate Authentication Material: Web Session Cookie
Attackers bypass some multi-factor authentication protocols since the session is already authenticated.
1
accept
T1550.004
Use Alternate Authentication Material: Web Session Cookie
Threat actors may have used browser cookies to defeat MFA with a “pass-the-cookie” attack.
1
accept
T1550.004
Use Alternate Authentication Material: Web Session Cookie
Solarwinds attackers bypassed MFA to obtain access on multiple target networks.
1
accept
T1550.004
Use Alternate Authentication Material: Web Session Cookie
TA505 has used .iso files to deploy malicious .lnk files.
1
accept
T1553.005
Subvert Trust Controls: Mark
Adversaries may abuse specific file formats to subvert Mark-of-the-Web (MOTW) controls.
1
accept
T1553.005
Subvert Trust Controls: Mark
Attackers use ZIP archives to disseminate malware, bypassing security controls.
1
accept
T1553.005
Subvert Trust Controls: Mark
Maldocs often abuse MOTW policies to get users to run macros and ActiveX controls.
1
accept
T1553.005
Subvert Trust Controls: Mark
Adversaries bypass Microsoft SmartScreen using archive files that do not have MOTW NTFS streams.
1
accept
T1553.005
Subvert Trust Controls: Mark
admin@338 actors used the following commands following exploitation of a machine with LOWBALL malware to enumerate user accounts: net user >> %temp%\download net user /domain >> %temp%\download
1
accept
T1087.001
Account Discovery: Local Account
Agent Tesla can collect account information from the victim’s machine.
1
accept
T1087.001
Account Discovery: Local Account
APT1 used the commands net localgroup net user and net group to find accounts on the system.
1
accept
T1087.001
Account Discovery: Local Account
APT3 has used a tool that can obtain info about local and global group users power users and administrators.
1
accept
T1087.001
Account Discovery: Local Account
APT32 enumerated administrative users using the commands net localgroup administrators.
1
accept
T1087.001
Account Discovery: Local Account
Bankshot gathers domain and account names/information through process monitoring.
1
accept
T1087.001
Account Discovery: Local Account
Bazar can identify administrator accounts on an infected host.
1
accept
T1087.001
Account Discovery: Local Account
BitPaymer can enumerate the sessions for each user logged onto the infected host. ;; BloodHound can identify users with local administrator rights. ;; Chimera has used net user for account discovery. ;; Comnie uses the net user command. ;; The discovery modules used with Duqu can collect information on accounts and pe...
1
accept
T1087.001
Account Discovery: Local Account
adbupd can use a WMI script to achieve persistence.
1
accept
T1546.003
Event Triggered Execution: Windows Management Instrumentation Event Subscription
APT29 has used WMI event subscriptions for persistence.
1
accept
T1546.003
Event Triggered Execution: Windows Management Instrumentation Event Subscription
APT33 has attempted to use WMI event subscriptions to establish persistence on compromised hosts.
1
accept
T1546.003
Event Triggered Execution: Windows Management Instrumentation Event Subscription
Blue Mockingbird has used mofcomp.exe to establish WMI Event Subscription persistence mechanisms configured from a *.mof file.
1
accept
T1546.003
Event Triggered Execution: Windows Management Instrumentation Event Subscription
Leviathan has used WMI for persistence.
1
accept
T1546.003
Event Triggered Execution: Windows Management Instrumentation Event Subscription
Mustang Panda's custom ORat tool uses a WMI event consumer to maintain persistence.
1
accept
T1546.003
Event Triggered Execution: Windows Management Instrumentation Event Subscription
PoshC2 has the ability to persist on a system using WMI events.
1
accept
T1546.003
Event Triggered Execution: Windows Management Instrumentation Event Subscription
POSHSPY uses a WMI event subscription to establish persistence. ;; POWERTON can use WMI for persistence. ;; RegDuke can persist using a WMI consumer that is launched every time a process named WINWORD.EXE is started. ;; SeaDuke uses an event filter in WMI code to execute a previously dropped executable shortly after s...
1
accept
T1546.003
Event Triggered Execution: Windows Management Instrumentation Event Subscription
APT29 drops a Windows shortcut file for execution.
1
accept
T1547.009
Boot or Logon Autostart Execution: Shortcut Modification
APT39 has modified LNK shortcuts.
1
accept
T1547.009
Boot or Logon Autostart Execution: Shortcut Modification
Astaroth's initial payload is a malicious .LNK file.
1
accept
T1547.009
Boot or Logon Autostart Execution: Shortcut Modification
BACKSPACE achieves persistence by creating a shortcut to itself in the CSIDL_STARTUP directory.
1
accept
T1547.009
Boot or Logon Autostart Execution: Shortcut Modification
Bazar can establish persistence by writing shortcuts to the Windows Startup folder.
1
accept
T1547.009
Boot or Logon Autostart Execution: Shortcut Modification
The BlackEnergy 3 variant drops its main DLL component and then creates a .lnk shortcut to that file in the startup folder.
1
accept
T1547.009
Boot or Logon Autostart Execution: Shortcut Modification