id
stringlengths 5
9
| technique
stringlengths 3
43
| subtechniqueid
stringlengths 3
60
⌀ | sentences
stringlengths 1
871
|
---|---|---|---|
t1554 | compromise client software binary | null | client software enables users to access services provided by a server |
t1554 | compromise client software binary | null | collect and analyze signing certificate metadata and check signature validity on software that executes within the environment |
t1554 | compromise client software binary | null | consider monitoring for anomalous behavior from client applications such as atypical module loads file readswrites or network connections |
t1554 | compromise client software binary | null | file file modification file file creation file file deletion file file metadata |
t1554 | compromise client software binary | null | look for changes to client software that do not correlate with known software or patch cycles |
t1555 | credentials from password stores | null | in process memory for credentials |
t1555 | credentials from password stores | null | adversaries may search for common password storage locations to obtain user credentials |
t1555 | credentials from password stores | null | file read events should be monitored surrounding known password storage applications |
t1555 | credentials from password stores | null | monitor system calls file read events and processes for suspicious activity that could indicate searching for a password or other activity related to performing keyword searches e |
t1555 | credentials from password stores | null | password pwd login store secure credentials etc |
t1555 | credentials from password stores | null | passwords are stored in several places on a system depending on the operating system or application holding the credentials |
t1555 | credentials from password stores | null | process process creation file file access command command execution process os api execution process process access |
t1555.004 | credentials from password stores | windows Technique credential Techniquemanager | kgh_spy can collect credentials from the windows credential manager. |
t1555.004 | credentials from password stores | windows Technique credential Techniquemanager | lazagne can obtain credentials from vault files. |
t1555.004 | credentials from password stores | windows Technique credential Techniquemanager | mimikatz contains functionality to acquire credentials from the windows credential manager. |
t1555.004 | credentials from password stores | windows Technique credential Techniquemanager | oil rig has used credential dumping tool named filevault to steal credentials from the windows credential manager. |
t1555.004 | credentials from password stores | windows Technique credential Techniquemanager | powersploit contains a collection of exfiltration modules that can harvest credentials from windows vault credential objects. |
t1555.004 | credentials from password stores | windows Technique credential Techniquemanager | rokrat steals credentials by leveraging the windows vault mechanism. |
t1555.004 | credentials from password stores | windows Technique credential Techniquemanager | stealth falcon malware gathers passwords from the windows credential vault. |
t1555.004 | credentials from password stores | windows Technique credential Techniquemanager | turla has gathered credentials from the windows credential manager tool. |
t1555.004 | credentials from password stores | windows Technique credential Techniquemanager | valak can use a .net compiled module named exchgrabber to enumerate credentials from the credential manager. |
t1555.005 | credentials from password stores | password Technique managers | fox kitten has used scripts to access credential information from the keepass database. |
t1555.005 | credentials from password stores | password Technique managers | operation wocao has accessed and collected credentials from password managers. |
t1555.005 | credentials from password stores | password Technique managers | proton gathers credentials in files for 1password. |
t1555.005 | credentials from password stores | passwordTechnique managers | trickbot can steal passwords from the keepass open source password manager. |
t1555.005 | credentials from password stores | password Technique managers | markirat can gather information from the keepass password manager. |
t1556 | modify authentication process | null | a user has an active login session but has not entered the building or does not have vpn access |
t1556 | modify authentication process | null | activity may be from interactive login sessions or process ownership from accounts being used to execute binaries on a remote system as a particular account |
t1556 | modify authentication process | null | adversaries may modify authentication mechanisms and processes to access user credentials or enable otherwise unwarranted access to accounts |
t1556 | modify authentication process | null | citation clymb3r function hook passwords sept 2013 monitor for calls to openprocess that can be used to manipulate lsass |
t1556 | modify authentication process | null | citation courier authorization plugins configure robust consistent account activity audit policies across the enterprise and with externally accessible services |
t1556 | modify authentication process | null | citation dell skeleton monitor pam configuration and module paths ex etcpam |
t1556 | modify authentication process | null | citation technet audit policy look for suspicious account behavior across systems that share accounts either user admin or service accounts |
t1556 | modify authentication process | null | correlate other security systems with login information e |
t1556 | modify authentication process | null | d for changes |
t1556 | modify authentication process | null | dll |
t1556 | modify authentication process | null | dll and samsrv |
t1556 | modify authentication process | null | examples one account logged into multiple systems simultaneously; multiple accounts logged into the same machine simultaneously; accounts logged in at odd times or outside of business hours |
t1556 | modify authentication process | null | exe |
t1556 | modify authentication process | null | exe running on a domain controller as well as for malicious modifications to functions exported from authentication related system dlls such as cryptdll |
t1556 | modify authentication process | null | g |
t1556 | modify authentication process | null | logon session logon session creation process os api execution process process access file file modification file file creation module module load windows registry windows registry key modification |
t1556 | modify authentication process | null | monitor for changes to registry entries for password filters ex hkey_local_machine system currentcontrolset control lsa notification packages and correlate then investigate the dll files these files reference |
t1556 | modify authentication process | null | monitor for new unfamiliar dll files written to a domain controller andor local computer |
t1556 | modify authentication process | null | monitor for suspicious additions to the librarysecuritysecurity agent plugins directory |
t1556 | modify authentication process | null | password filters will also show up as an autorun and loaded dll in lsass |
t1556 | modify authentication process | null | the authentication process is handled by mechanisms such as the local security authentication server lsass process and the security accounts manager sam on windows pluggable authentication modules pam on unix based systems and authorization plugins on mac os systems responsible for gathering storing and validating credentials |
t1556 | modify authentication process | null | use system integrity tools such as aide and monitoring tools such as auditd to monitor pam files |
t1556.001 | modify authentication process | domain Technique controller Technique authentication | chimera's malware has altered the ntlm authentication program on domain controllers to allow chimera to login without a valid credential. |
t1556.001 | modify authentication process | domain Technique controller Technique authentication | skeleton key is used to patch an enterprise domain controller authentication process with a backdoor password. it allows adversaries to bypass the standard authentication system to use a defined password for all accounts authenticating to that domain controller. |
t1556.001 | modify authentication process | domain Technique controller Technique authentication | skeleton key is deployed as an in-memory patch on a victim's ad domain controllers to allow the threat actor to authenticate as any user, while legitimate users can continue to authenticate as normal. |
t1556.001 | modify authentication process | domain Technique controller Technique authentication | the malware employed a technique that altered the ntlm authentication program and implanted a skeleton key to allow adversaries to log-in without a valid credential. |
t1556.001 | modify authentication process | domain Technique controller Technique authentication | in the rc4 initialization function, a new rc4 ntlm was injected with a pre-calculated hash value of the skeleton key. when the authentication check failed due to incorrect credentials, the rc4 decryption function prompted the authentication process to compare the credentials with the skeleton key. |
t1556.002 | modify authentication process | password Technique filter Technique dll | remsec harvests plain-text credentials as a password filter registered on domain controllers. |
t1556.002 | modify authentication process | password Technique filter Technique dll | strider has registered its persistence module on domain controllers as a windows lsa local system authority password filter to acquire credentials any time a domain local user or administrator logs in or changes a password. |
t1556.002 | modify authentication process | password Technique filter Technique dll | the library was masquerading as a windows password filter, which is something administrators typically use to ensure passwords match specific requirements for length and complexity. the module started every time a network or local user logged in or changed a password, and it was able to view passcodes in plaintext. |
t1556.002 | modify authentication process | password Technique filter Technique dll | projectsauron usually registers its persistence module on domain controllers as a windows lsa local. system authority password filter. |
t1556.002 | modify authentication process | password Technique filter Technique dll | the library was registered as a windows password filter and had access to sensitive data such as administrative passwords in cleartext. |
t1556.003 | modify authentication process | pluggable Technique authentication Technique modules | ebury can deactivate pam modules to tamper with the sshd configuration. |
t1556.003 | modify authentication process | pluggable Technique authentication Technique modules | skidmap has the ability to replace the pam_unix.so file on an infected machine with its own malicious version that accepts a specific backdoor password for all users. |
t1556.003 | modify authentication process | pluggable Technique authentication Technique modules | this malware downgrades security features by deactivating pluggable authentication modules pam modules. |
t1556.003 | modify authentication process | pluggable Technique authentication Technique modules | the malware replaces the systems pam_unix.so file the module responsible for standard unix authentication with its own malicious version detected as backdoor.linux.pamdor.a. as shown in figure 2, this malicious pam_unix.so file accepts a specific password for any users, thus allowing the attackers to log in as any user in the machine. |
t1556.003 | modify authentication process | pluggable Technique authentication Technique modules | our roadmap is pretty simple: add a custom pam module that logs the credential in plaintext and send it to our c&c though a dns resolution. |
t1556.004 | modify authentication process | network Technique device Technique authentication | synful knock has the capability to add its own custom backdoor password when it modifies the operating system of the affected network device. |
t1556.004 | modify authentication process | network Technique device Technique authentication | the synful knock implant consists of a modified cisco ios image that allows the attacker to load different functional modules provides unrestricted access using a secret backdoor password while preventing the size of the image from changing. |
t1556.004 | modify authentication process | network Technique device Technique authentication | adversaries used patch system image to hard code a password in the operating system, thus bypassing of native authentication mechanisms for local accounts on network devices. |
t1556.004 | modify authentication process | network Technique device Technique authentication | attacker modified the system image to provide attacker-controlled network devices access using a specific password. |
t1556.004 | modify authentication process | network Technique device Technique authentication | after the initial access to the router, hackers modified its operation system in a way to install a backdoor access for network device authentication. |
t1557 | adversary in the middle | null | 2 |
t1557 | adversary in the middle | null | adversaries may attempt to position themselves between two or more networked devices using an adversary in the middle aitm technique to support follow on behaviors such as network sniffingt1040 or transmitted data manipulationt1565 |
t1557 | adversary in the middle | null | consider monitoring for modifications to system configuration files involved in shaping network traffic flow |
t1557 | adversary in the middle | null | monitor network traffic for anomalies associated with known aitm behavior |
t1557 | adversary in the middle | null | network traffic network traffic content network traffic network traffic flow service service creation windows registry windows registry key modification |
t1557.002 | man | null | cleaver has used custom tools to facilitate arp cache poisoning. |
t1557.002 | man | null | irans cyber hacking skills have evolved to include customized private tools with arp poisoning function. |
t1557.002 | man | null | alireza c++ tools include the following techniques: ¢ arp poisoning |
t1557.002 | man | null | jesus is an arp cache poisoning developed by the operation cleaver team. |
t1557.002 | man | null | cain & abel is a publicly available toolkit with the ability to conduct attacks like arp cache poisoning in order to capture credentials being transmitted on the network. |
t1558 | steal or forge kerberos tickets | null | 3 |
t1558 | steal or forge kerberos tickets | null | 003 being used to move laterally |
t1558 | steal or forge kerberos tickets | null | adversaries may attempt to subvert kerberos authentication by stealing or forging kerberos tickets to enable pass the tickett1550 |
t1558 | steal or forge kerberos tickets | null | citation adsecurity detecting forged ticketscitation stealthbits detect ptt 2019citation cert eu golden ticket protection monitor the lifetime of tgt tickets for values that differ from the default domain duration |
t1558 | steal or forge kerberos tickets | null | citation medium detecting attempts to steal passwords from memory common credential dumpers such as mimikatzs0002 access the lsa subsystem service lsass process by opening the process locating the lsa secrets key and decrypting the sections in memory where credential details including kerberos tickets are stored |
t1558 | steal or forge kerberos tickets | null | citation microsoft detecting kerberoasting feb 2018 citation adsecurity cracking kerberos dec 2015 monitor for unexpected processes interacting with lsass |
t1558 | steal or forge kerberos tickets | null | citation microsoft kerberos golden ticket monitor for indications of pass the tickett1550 |
t1558 | steal or forge kerberos tickets | null | enable audit kerberos service ticket operations to log kerberos tgs service ticket requests |
t1558 | steal or forge kerberos tickets | null | exe |
t1558 | steal or forge kerberos tickets | null | file file access command command execution active directory active directory credential request logon session logon session metadata |
t1558 | steal or forge kerberos tickets | null | ldb and |
t1558 | steal or forge kerberos tickets | null | mkey located in varlibssssecrets |
t1558 | steal or forge kerberos tickets | null | monitor for anomalous kerberos activity such as malformed or blank fields in windows logonlogoff events event id 4624 4672 4634 rc4 encryption within ticket granting tickets tgts and ticket granting service tgs requests without preceding tgt requests |
t1558 | steal or forge kerberos tickets | null | monitor for unusual processes accessing secrets |
t1558 | steal or forge kerberos tickets | null | particularly investigate irregular patterns of activity ex accounts making numerous requests event id 4769 within a small time frame especially if they also request rc4 encryption type 0x17 |
t1558 | steal or forge kerberos tickets | null | secrets |
t1559 | inter process communication | null | adversaries may abuse inter process communication ipc mechanisms for local code or command execution |
t1559 | inter process communication | null | ipc is typically used by processes to share data communicate with each other or synchronize execution |
t1559 | inter process communication | null | module module load process process creation script script execution |
t1559 | inter process communication | null | monitor for strings in filescommands loaded dllslibraries or spawned processes that are associated with abuse of ipc mechanisms |
t1560 | archive collected data | null | a process that loads the windows dll crypt32 |
t1560 | archive collected data | null | an adversary may compress andor encrypt data that is collected prior to exfiltration |