value stringlengths 25 18k ⌀ | subtecnique int64 0 1 | answer stringclasses 2
values | id stringlengths 5 9 | name stringlengths 3 102 |
|---|---|---|---|---|
SparklingGoblin uses servers hosted by various providers for its C&C servers. | 1 | accept | T1583.004 | Acquire Infrastructure: Server |
APT1 has registered hundreds of domains for use in operations. | 1 | accept | T1583.001 | Acquire Infrastructure: Domains |
APT28 registered domains imitating NATO OSCE security websites Caucasus information resources and other organizations. | 1 | accept | T1583.001 | Acquire Infrastructure: Domains |
APT29 has acquired C2 domains through resellers. | 1 | accept | T1583.001 | Acquire Infrastructure: Domains |
APT32 has set up and operated websites to gather information and deliver malware. | 1 | accept | T1583.001 | Acquire Infrastructure: Domains |
Kimsuky has registered domains to spoof targeted organizations and trusted third parties. | 1 | accept | T1583.001 | Acquire Infrastructure: Domains |
Lazarus Group has acquired infrastructure related to their campaigns to act as distribution points and C2 channels. | 1 | accept | T1583.001 | Acquire Infrastructure: Domains |
menuPass has registered malicious domains for use in intrusion campaigns. | 1 | accept | T1583.001 | Acquire Infrastructure: Domains |
Mustang Panda have acquired C2 domains prior to operations. ;; Sandworm Team has registered domain names and created URLs that are often designed to mimic or spoof legitimate websites such as email login pages online file sharing and storage websites and password reset pages. ;; Silent Librarian has acquired domains t... | 1 | accept | T1583.001 | Acquire Infrastructure: Domains |
Attackers may opt to configure and run their own DNS servers in support of operations. | 1 | accept | T1583.002 | Acquire Infrastructure: Dns Server |
Adversaries may utilize DNS traffic for various tasks, including for Command and Control. | 1 | accept | T1583.002 | Acquire Infrastructure: Dns Server |
APT31 will utilize their own DNS server for use when conducting malicious activities. | 1 | accept | T1583.002 | Acquire Infrastructure: Dns Server |
Moses Staff will acquire their own infrastructure, usually domains and DNS. | 1 | accept | T1583.002 | Acquire Infrastructure: Dns Server |
TigerRAT variants can be modified to utilize a threat actor's own DNS infrastructure. | 1 | accept | T1583.002 | Acquire Infrastructure: Dns Server |
Adversaries may compromise numerous third-party systems to form a botnet that can be used during targeting. | 1 | accept | T1583.005 | Acquire Infrastructure: Botnet |
Attackers may conduct a takeover of an existing botnet, such as redirecting bots to adversary-controlled C2 servers. | 1 | accept | T1583.005 | Acquire Infrastructure: Botnet |
FreakOut attacked POS systems in order to use them as a botnet infrastructure. | 1 | accept | T1583.005 | Acquire Infrastructure: Botnet |
Mirai malware created a botnet used by multiple threat actor groups. | 1 | accept | T1583.005 | Acquire Infrastructure: Botnet |
Meris attacked Yandex with DDOS using botnets. | 1 | accept | T1583.005 | Acquire Infrastructure: Botnet |
APT29 has created self-signed digital certificates to enable mutual TLS authentication for malware. | 1 | accept | T1587.003 | Develop Capabilities: Digital Certificates |
PROMETHIUM has created self-signed digital certificates for use in HTTPS C2 traffic. | 1 | accept | T1587.003 | Develop Capabilities: Digital Certificates |
Adversaries may create self-signed SSL/TLS certificates that can be used to further their operations, such as encrypting C2 traffic. | 1 | accept | T1587.003 | Develop Capabilities: Digital Certificates |
UNC2190 created self-signed certificates to spread SABBATH ransomware. | 1 | accept | T1587.003 | Develop Capabilities: Digital Certificates |
FIN13 used SSL certificates for C2 communication via email. | 1 | accept | T1587.003 | Develop Capabilities: Digital Certificates |
Lazarus Group has obtained SSL certificates for their C2 domains. | 1 | accept | T1588.004 | Obtain Capabilities: Digital Certificates |
Silent Librarian has obtained free Let's Encrypt SSL certificates for use on their phishing pages. | 1 | accept | T1588.004 | Obtain Capabilities: Digital Certificates |
Adversaries may buy and/or steal SSL/TLS certificates that can be used during targeting. | 1 | accept | T1588.004 | Obtain Capabilities: Digital Certificates |
Certificate authorities exist that allow adversaries to acquire SSL/TLS certificates, such as domain validation certificates, for free. | 1 | accept | T1588.004 | Obtain Capabilities: Digital Certificates |
Adversaries may register or hijack domains that they will later purchase an SSL/TLS certificate for.. | 1 | accept | T1588.004 | Obtain Capabilities: Digital Certificates |
Fox Kitten has used scripts to access credential information from the KeePass database. | 1 | accept | T1555.005 | Credentials from Password Stores: Password Managers |
Operation Wocao has accessed and collected credentials from password managers. | 1 | accept | T1555.005 | Credentials from Password Stores: Password Managers |
Proton gathers credentials in files for 1password. | 1 | accept | T1555.005 | Credentials from Password Stores: Password Managers |
TrickBot can steal passwords from the KeePass open source password manager. | 1 | accept | T1555.005 | Credentials from Password Stores: Password Managers |
MarkiRAT can gather information from the Keepass password manager. | 1 | accept | T1555.005 | Credentials from Password Stores: Password Managers |
APT28 has used several malicious applications that abused OAuth access tokens to gain access to target email accounts including Gmail and Yahoo Mail. | 1 | accept | T1550.001 | Use Alternate Authentication Material: Application Access Token |
Adversaries may use alternate authentication material, such as password hashes, Kerberos tickets, and application access tokens, in order to move laterally within an environment and bypass normal system access controls. | 1 | accept | T1550.001 | Use Alternate Authentication Material: Application Access Token |
With an OAuth access token an adversary can use the user-granted REST API to perform functions such as email searching and contact enumeration. | 1 | accept | T1550.001 | Use Alternate Authentication Material: Application Access Token |
Obtaining a token which grants access to a victim’s primary email, the adversary may be able to extend access to all other services which the target subscribes by triggering forgotten password routines. | 1 | accept | T1550.001 | Use Alternate Authentication Material: Application Access Token |
OAuth is one commonly implemented framework that issues tokens to users for access to Software-as-a-Service. | 1 | accept | T1550.001 | Use Alternate Authentication Material: Application Access Token |
4H RAT has the capability to create a remote shell. | 1 | accept | T1059.003 | Command and Scripting Interpreter: Windows Command Shell |
ABK has the ability to use cmd to run a Portable Executable (PE) on the compromised host. | 1 | accept | T1059.003 | Command and Scripting Interpreter: Windows Command Shell |
adbupd can run a copy of cmd.exe. | 1 | accept | T1059.003 | Command and Scripting Interpreter: Windows Command Shell |
Following exploitation with LOWBALL malware admin@338 actors created a file containing a list of commands to be executed on the compromised computer. | 1 | accept | T1059.003 | Command and Scripting Interpreter: Windows Command Shell |
ADVSTORESHELL can create a remote shell and run a given command. | 1 | accept | T1059.003 | Command and Scripting Interpreter: Windows Command Shell |
Anchor has used cmd.exe to run its self deletion routine. | 1 | accept | T1059.003 | Command and Scripting Interpreter: Windows Command Shell |
APT1 has used the Windows command shell to execute commands and batch scripting to automate execution. | 1 | accept | T1059.003 | Command and Scripting Interpreter: Windows Command Shell |
APT18 uses cmd.exe to execute commands on the victim’s machine. ;; An APT28 loader Trojan uses a cmd.exe and batch script to run its payload. The group has also used macros to execute payloads. ;; APT29 used cmd.exe to execute commands on remote machines. ;; An APT3 downloader uses the Windows command cmd.exe" /C whoa... | 1 | accept | T1059.003 | Command and Scripting Interpreter: Windows Command Shell |
AppleJeus has been distributed via spearphishing link. | 1 | accept | T1566.002 | Phishing: Spearphishing Link |
APT1 has sent spearphishing emails containing hyperlinks to malicious files. | 1 | accept | T1566.002 | Phishing: Spearphishing Link |
APT28 sent spearphishing emails which used a URL-shortener service to masquerade as a legitimate service and to redirect targets to credential harvesting sites. | 1 | accept | T1566.002 | Phishing: Spearphishing Link |
APT29 has used spearphishing with a link to trick victims into clicking on a link to a zip file containing malicious files. | 1 | accept | T1566.002 | Phishing: Spearphishing Link |
APT32 has sent spearphishing emails containing malicious links. | 1 | accept | T1566.002 | Phishing: Spearphishing Link |
APT33 has sent spearphishing emails containing links to .hta files. | 1 | accept | T1566.002 | Phishing: Spearphishing Link |
APT39 leveraged spearphishing emails with malicious links to initially compromise victims. | 1 | accept | T1566.002 | Phishing: Spearphishing Link |
Bazar has been spread via e-mails with embedded malicious links. ;; BlackTech has used spearphishing e-mails with links to cloud services to deliver malware. ;; Cobalt Group has sent emails with URLs pointing to malicious documents. ;; Dragonfly 2.0 used spearphishing with PDF attachments containing malicious links th... | 1 | accept | T1566.002 | Phishing: Spearphishing Link |
APT29 created tokens using compromised SAML signing certificates. | 1 | accept | T1606.002 | Forge Web Credentials: Saml Tokens |
UNC2452 created tokens using compromised SAML signing certificates. | 1 | accept | T1606.002 | Forge Web Credentials: Saml Tokens |
Supply chain breaches, such as Solarwinds, are partially exploited via forged credentials that obtain access such as the forging of SMAL tokens. | 1 | accept | T1606.002 | Forge Web Credentials: Saml Tokens |
APT30 can break single sign on (SSO) if it is SMAL v2.0 through the forgery of SMAL tokens. | 1 | accept | T1606.002 | Forge Web Credentials: Saml Tokens |
Threat actors can change the normal 1 hour limit upon the legitimacy of a token through accessing the AccessTokenLifetime element. | 1 | accept | T1606.002 | Forge Web Credentials: Saml Tokens |
Agent Tesla can gather credentials from a number of browsers. | 1 | accept | T1555.003 | Credentials from Password Stores: Credentials From Web Browsers |
Ajax Security Team has used FireMalv custom-developed malware which collected passwords from the Firefox browser storage. | 1 | accept | T1555.003 | Credentials from Password Stores: Credentials From Web Browsers |
APT3 has used tools to dump passwords from browsers. | 1 | accept | T1555.003 | Credentials from Password Stores: Credentials From Web Browsers |
APT33 has used a variety of publicly available tools like LaZagne to gather credentials. | 1 | accept | T1555.003 | Credentials from Password Stores: Credentials From Web Browsers |
APT37 has used a credential stealer known as ZUMKONG that can harvest usernames and passwords stored in browsers. | 1 | accept | T1555.003 | Credentials from Password Stores: Credentials From Web Browsers |
Azorult can steal credentials from the victim's browser. | 1 | accept | T1555.003 | Credentials from Password Stores: Credentials From Web Browsers |
Some Backdoor.Oldrea samples contain a publicly available Web browser password recovery tool. | 1 | accept | T1555.003 | Credentials from Password Stores: Credentials From Web Browsers |
BlackEnergy has used a plug-in to gather credentials from web browsers including FireFox Google Chrome and Internet Explorer. ;; Carberp's passw.plug plugin can gather passwords saved in Opera Internet Explorer Safari Firefox and Chrome. ;; ChChes steals credentials stored inside Internet Explorer. ;; CookieMiner can ... | 1 | accept | T1555.003 | Credentials from Password Stores: Credentials From Web Browsers |
APT29 used a forged duo-sid cookie to bypass MFA set on an email account. | 1 | accept | T1550.004 | Use Alternate Authentication Material: Web Session Cookie |
UNC2452 used a forged duo-sid cookie to bypass MFA set on an email account. | 1 | accept | T1550.004 | Use Alternate Authentication Material: Web Session Cookie |
Attackers bypass some multi-factor authentication protocols since the session is already authenticated. | 1 | accept | T1550.004 | Use Alternate Authentication Material: Web Session Cookie |
Threat actors may have used browser cookies to defeat MFA with a “pass-the-cookie” attack. | 1 | accept | T1550.004 | Use Alternate Authentication Material: Web Session Cookie |
Solarwinds attackers bypassed MFA to obtain access on multiple target networks. | 1 | accept | T1550.004 | Use Alternate Authentication Material: Web Session Cookie |
TA505 has used .iso files to deploy malicious .lnk files. | 1 | accept | T1553.005 | Subvert Trust Controls: Mark |
Adversaries may abuse specific file formats to subvert Mark-of-the-Web (MOTW) controls. | 1 | accept | T1553.005 | Subvert Trust Controls: Mark |
Attackers use ZIP archives to disseminate malware, bypassing security controls. | 1 | accept | T1553.005 | Subvert Trust Controls: Mark |
Maldocs often abuse MOTW policies to get users to run macros and ActiveX controls. | 1 | accept | T1553.005 | Subvert Trust Controls: Mark |
Adversaries bypass Microsoft SmartScreen using archive files that do not have MOTW NTFS streams. | 1 | accept | T1553.005 | Subvert Trust Controls: Mark |
admin@338 actors used the following commands following exploitation of a machine with LOWBALL malware to enumerate user accounts: net user >> %temp%\download net user /domain >> %temp%\download | 1 | accept | T1087.001 | Account Discovery: Local Account |
Agent Tesla can collect account information from the victim’s machine. | 1 | accept | T1087.001 | Account Discovery: Local Account |
APT1 used the commands net localgroup net user and net group to find accounts on the system. | 1 | accept | T1087.001 | Account Discovery: Local Account |
APT3 has used a tool that can obtain info about local and global group users power users and administrators. | 1 | accept | T1087.001 | Account Discovery: Local Account |
APT32 enumerated administrative users using the commands net localgroup administrators. | 1 | accept | T1087.001 | Account Discovery: Local Account |
Bankshot gathers domain and account names/information through process monitoring. | 1 | accept | T1087.001 | Account Discovery: Local Account |
Bazar can identify administrator accounts on an infected host. | 1 | accept | T1087.001 | Account Discovery: Local Account |
BitPaymer can enumerate the sessions for each user logged onto the infected host. ;; BloodHound can identify users with local administrator rights. ;; Chimera has used net user for account discovery. ;; Comnie uses the net user command. ;; The discovery modules used with Duqu can collect information on accounts and pe... | 1 | accept | T1087.001 | Account Discovery: Local Account |
adbupd can use a WMI script to achieve persistence. | 1 | accept | T1546.003 | Event Triggered Execution: Windows Management Instrumentation Event Subscription |
APT29 has used WMI event subscriptions for persistence. | 1 | accept | T1546.003 | Event Triggered Execution: Windows Management Instrumentation Event Subscription |
APT33 has attempted to use WMI event subscriptions to establish persistence on compromised hosts. | 1 | accept | T1546.003 | Event Triggered Execution: Windows Management Instrumentation Event Subscription |
Blue Mockingbird has used mofcomp.exe to establish WMI Event Subscription persistence mechanisms configured from a *.mof file. | 1 | accept | T1546.003 | Event Triggered Execution: Windows Management Instrumentation Event Subscription |
Leviathan has used WMI for persistence. | 1 | accept | T1546.003 | Event Triggered Execution: Windows Management Instrumentation Event Subscription |
Mustang Panda's custom ORat tool uses a WMI event consumer to maintain persistence. | 1 | accept | T1546.003 | Event Triggered Execution: Windows Management Instrumentation Event Subscription |
PoshC2 has the ability to persist on a system using WMI events. | 1 | accept | T1546.003 | Event Triggered Execution: Windows Management Instrumentation Event Subscription |
POSHSPY uses a WMI event subscription to establish persistence. ;; POWERTON can use WMI for persistence. ;; RegDuke can persist using a WMI consumer that is launched every time a process named WINWORD.EXE is started. ;; SeaDuke uses an event filter in WMI code to execute a previously dropped executable shortly after s... | 1 | accept | T1546.003 | Event Triggered Execution: Windows Management Instrumentation Event Subscription |
APT29 drops a Windows shortcut file for execution. | 1 | accept | T1547.009 | Boot or Logon Autostart Execution: Shortcut Modification |
APT39 has modified LNK shortcuts. | 1 | accept | T1547.009 | Boot or Logon Autostart Execution: Shortcut Modification |
Astaroth's initial payload is a malicious .LNK file. | 1 | accept | T1547.009 | Boot or Logon Autostart Execution: Shortcut Modification |
BACKSPACE achieves persistence by creating a shortcut to itself in the CSIDL_STARTUP directory. | 1 | accept | T1547.009 | Boot or Logon Autostart Execution: Shortcut Modification |
Bazar can establish persistence by writing shortcuts to the Windows Startup folder. | 1 | accept | T1547.009 | Boot or Logon Autostart Execution: Shortcut Modification |
The BlackEnergy 3 variant drops its main DLL component and then creates a .lnk shortcut to that file in the startup folder. | 1 | accept | T1547.009 | Boot or Logon Autostart Execution: Shortcut Modification |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.