id
stringlengths
5
9
technique
stringlengths
3
43
subtechniqueid
stringlengths
3
60
sentences
stringlengths
1
871
t1554
compromise client software binary
null
client software enables users to access services provided by a server
t1554
compromise client software binary
null
collect and analyze signing certificate metadata and check signature validity on software that executes within the environment
t1554
compromise client software binary
null
consider monitoring for anomalous behavior from client applications such as atypical module loads file readswrites or network connections
t1554
compromise client software binary
null
file file modification file file creation file file deletion file file metadata
t1554
compromise client software binary
null
look for changes to client software that do not correlate with known software or patch cycles
t1555
credentials from password stores
null
in process memory for credentials
t1555
credentials from password stores
null
adversaries may search for common password storage locations to obtain user credentials
t1555
credentials from password stores
null
file read events should be monitored surrounding known password storage applications
t1555
credentials from password stores
null
monitor system calls file read events and processes for suspicious activity that could indicate searching for a password or other activity related to performing keyword searches e
t1555
credentials from password stores
null
password pwd login store secure credentials etc
t1555
credentials from password stores
null
passwords are stored in several places on a system depending on the operating system or application holding the credentials
t1555
credentials from password stores
null
process process creation file file access command command execution process os api execution process process access
t1555.004
credentials from password stores
windows Technique credential Techniquemanager
kgh_spy can collect credentials from the windows credential manager.
t1555.004
credentials from password stores
windows Technique credential Techniquemanager
lazagne can obtain credentials from vault files.
t1555.004
credentials from password stores
windows Technique credential Techniquemanager
mimikatz contains functionality to acquire credentials from the windows credential manager.
t1555.004
credentials from password stores
windows Technique credential Techniquemanager
oil rig has used credential dumping tool named filevault to steal credentials from the windows credential manager.
t1555.004
credentials from password stores
windows Technique credential Techniquemanager
powersploit contains a collection of exfiltration modules that can harvest credentials from windows vault credential objects.
t1555.004
credentials from password stores
windows Technique credential Techniquemanager
rokrat steals credentials by leveraging the windows vault mechanism.
t1555.004
credentials from password stores
windows Technique credential Techniquemanager
stealth falcon malware gathers passwords from the windows credential vault.
t1555.004
credentials from password stores
windows Technique credential Techniquemanager
turla has gathered credentials from the windows credential manager tool.
t1555.004
credentials from password stores
windows Technique credential Techniquemanager
valak can use a .net compiled module named exchgrabber to enumerate credentials from the credential manager.
t1555.005
credentials from password stores
password Technique managers
fox kitten has used scripts to access credential information from the keepass database.
t1555.005
credentials from password stores
password Technique managers
operation wocao has accessed and collected credentials from password managers.
t1555.005
credentials from password stores
password Technique managers
proton gathers credentials in files for 1password.
t1555.005
credentials from password stores
passwordTechnique managers
trickbot can steal passwords from the keepass open source password manager.
t1555.005
credentials from password stores
password Technique managers
markirat can gather information from the keepass password manager.
t1556
modify authentication process
null
a user has an active login session but has not entered the building or does not have vpn access
t1556
modify authentication process
null
activity may be from interactive login sessions or process ownership from accounts being used to execute binaries on a remote system as a particular account
t1556
modify authentication process
null
adversaries may modify authentication mechanisms and processes to access user credentials or enable otherwise unwarranted access to accounts
t1556
modify authentication process
null
citation clymb3r function hook passwords sept 2013 monitor for calls to openprocess that can be used to manipulate lsass
t1556
modify authentication process
null
citation courier authorization plugins configure robust consistent account activity audit policies across the enterprise and with externally accessible services
t1556
modify authentication process
null
citation dell skeleton monitor pam configuration and module paths ex etcpam
t1556
modify authentication process
null
citation technet audit policy look for suspicious account behavior across systems that share accounts either user admin or service accounts
t1556
modify authentication process
null
correlate other security systems with login information e
t1556
modify authentication process
null
d for changes
t1556
modify authentication process
null
dll
t1556
modify authentication process
null
dll and samsrv
t1556
modify authentication process
null
examples one account logged into multiple systems simultaneously; multiple accounts logged into the same machine simultaneously; accounts logged in at odd times or outside of business hours
t1556
modify authentication process
null
exe
t1556
modify authentication process
null
exe running on a domain controller as well as for malicious modifications to functions exported from authentication related system dlls such as cryptdll
t1556
modify authentication process
null
g
t1556
modify authentication process
null
logon session logon session creation process os api execution process process access file file modification file file creation module module load windows registry windows registry key modification
t1556
modify authentication process
null
monitor for changes to registry entries for password filters ex hkey_local_machine system currentcontrolset control lsa notification packages and correlate then investigate the dll files these files reference
t1556
modify authentication process
null
monitor for new unfamiliar dll files written to a domain controller andor local computer
t1556
modify authentication process
null
monitor for suspicious additions to the librarysecuritysecurity agent plugins directory
t1556
modify authentication process
null
password filters will also show up as an autorun and loaded dll in lsass
t1556
modify authentication process
null
the authentication process is handled by mechanisms such as the local security authentication server lsass process and the security accounts manager sam on windows pluggable authentication modules pam on unix based systems and authorization plugins on mac os systems responsible for gathering storing and validating credentials
t1556
modify authentication process
null
use system integrity tools such as aide and monitoring tools such as auditd to monitor pam files
t1556.001
modify authentication process
domain Technique controller Technique authentication
chimera's malware has altered the ntlm authentication program on domain controllers to allow chimera to login without a valid credential.
t1556.001
modify authentication process
domain Technique controller Technique authentication
skeleton key is used to patch an enterprise domain controller authentication process with a backdoor password. it allows adversaries to bypass the standard authentication system to use a defined password for all accounts authenticating to that domain controller.
t1556.001
modify authentication process
domain Technique controller Technique authentication
skeleton key is deployed as an in-memory patch on a victim's ad domain controllers to allow the threat actor to authenticate as any user, while legitimate users can continue to authenticate as normal.
t1556.001
modify authentication process
domain Technique controller Technique authentication
the malware employed a technique that altered the ntlm authentication program and implanted a skeleton key to allow adversaries to log-in without a valid credential.
t1556.001
modify authentication process
domain Technique controller Technique authentication
in the rc4 initialization function, a new rc4 ntlm was injected with a pre-calculated hash value of the skeleton key. when the authentication check failed due to incorrect credentials, the rc4 decryption function prompted the authentication process to compare the credentials with the skeleton key.
t1556.002
modify authentication process
password Technique filter Technique dll
remsec harvests plain-text credentials as a password filter registered on domain controllers.
t1556.002
modify authentication process
password Technique filter Technique dll
strider has registered its persistence module on domain controllers as a windows lsa local system authority password filter to acquire credentials any time a domain local user or administrator logs in or changes a password.
t1556.002
modify authentication process
password Technique filter Technique dll
the library was masquerading as a windows password filter, which is something administrators typically use to ensure passwords match specific requirements for length and complexity. the module started every time a network or local user logged in or changed a password, and it was able to view passcodes in plaintext.
t1556.002
modify authentication process
password Technique filter Technique dll
projectsauron usually registers its persistence module on domain controllers as a windows lsa local. system authority password filter.
t1556.002
modify authentication process
password Technique filter Technique dll
the library was registered as a windows password filter and had access to sensitive data such as administrative passwords in cleartext.
t1556.003
modify authentication process
pluggable Technique authentication Technique modules
ebury can deactivate pam modules to tamper with the sshd configuration.
t1556.003
modify authentication process
pluggable Technique authentication Technique modules
skidmap has the ability to replace the pam_unix.so file on an infected machine with its own malicious version that accepts a specific backdoor password for all users.
t1556.003
modify authentication process
pluggable Technique authentication Technique modules
this malware downgrades security features by deactivating pluggable authentication modules pam modules.
t1556.003
modify authentication process
pluggable Technique authentication Technique modules
the malware replaces the systems pam_unix.so file the module responsible for standard unix authentication with its own malicious version detected as backdoor.linux.pamdor.a. as shown in figure 2, this malicious pam_unix.so file accepts a specific password for any users, thus allowing the attackers to log in as any user in the machine.
t1556.003
modify authentication process
pluggable Technique authentication Technique modules
our roadmap is pretty simple: add a custom pam module that logs the credential in plaintext and send it to our c&c though a dns resolution.
t1556.004
modify authentication process
network Technique device Technique authentication
synful knock has the capability to add its own custom backdoor password when it modifies the operating system of the affected network device.
t1556.004
modify authentication process
network Technique device Technique authentication
the synful knock implant consists of a modified cisco ios image that allows the attacker to load different functional modules provides unrestricted access using a secret backdoor password while preventing the size of the image from changing.
t1556.004
modify authentication process
network Technique device Technique authentication
adversaries used patch system image to hard code a password in the operating system, thus bypassing of native authentication mechanisms for local accounts on network devices.
t1556.004
modify authentication process
network Technique device Technique authentication
attacker modified the system image to provide attacker-controlled network devices access using a specific password.
t1556.004
modify authentication process
network Technique device Technique authentication
after the initial access to the router, hackers modified its operation system in a way to install a backdoor access for network device authentication.
t1557
adversary in the middle
null
2
t1557
adversary in the middle
null
adversaries may attempt to position themselves between two or more networked devices using an adversary in the middle aitm technique to support follow on behaviors such as network sniffingt1040 or transmitted data manipulationt1565
t1557
adversary in the middle
null
consider monitoring for modifications to system configuration files involved in shaping network traffic flow
t1557
adversary in the middle
null
monitor network traffic for anomalies associated with known aitm behavior
t1557
adversary in the middle
null
network traffic network traffic content network traffic network traffic flow service service creation windows registry windows registry key modification
t1557.002
man
null
cleaver has used custom tools to facilitate arp cache poisoning.
t1557.002
man
null
irans cyber hacking skills have evolved to include customized private tools with arp poisoning function.
t1557.002
man
null
alireza c++ tools include the following techniques: ¢ arp poisoning
t1557.002
man
null
jesus is an arp cache poisoning developed by the operation cleaver team.
t1557.002
man
null
cain & abel is a publicly available toolkit with the ability to conduct attacks like arp cache poisoning in order to capture credentials being transmitted on the network.
t1558
steal or forge kerberos tickets
null
3
t1558
steal or forge kerberos tickets
null
003 being used to move laterally
t1558
steal or forge kerberos tickets
null
adversaries may attempt to subvert kerberos authentication by stealing or forging kerberos tickets to enable pass the tickett1550
t1558
steal or forge kerberos tickets
null
citation adsecurity detecting forged ticketscitation stealthbits detect ptt 2019citation cert eu golden ticket protection monitor the lifetime of tgt tickets for values that differ from the default domain duration
t1558
steal or forge kerberos tickets
null
citation medium detecting attempts to steal passwords from memory common credential dumpers such as mimikatzs0002 access the lsa subsystem service lsass process by opening the process locating the lsa secrets key and decrypting the sections in memory where credential details including kerberos tickets are stored
t1558
steal or forge kerberos tickets
null
citation microsoft detecting kerberoasting feb 2018 citation adsecurity cracking kerberos dec 2015 monitor for unexpected processes interacting with lsass
t1558
steal or forge kerberos tickets
null
citation microsoft kerberos golden ticket monitor for indications of pass the tickett1550
t1558
steal or forge kerberos tickets
null
enable audit kerberos service ticket operations to log kerberos tgs service ticket requests
t1558
steal or forge kerberos tickets
null
exe
t1558
steal or forge kerberos tickets
null
file file access command command execution active directory active directory credential request logon session logon session metadata
t1558
steal or forge kerberos tickets
null
ldb and
t1558
steal or forge kerberos tickets
null
mkey located in varlibssssecrets
t1558
steal or forge kerberos tickets
null
monitor for anomalous kerberos activity such as malformed or blank fields in windows logonlogoff events event id 4624 4672 4634 rc4 encryption within ticket granting tickets tgts and ticket granting service tgs requests without preceding tgt requests
t1558
steal or forge kerberos tickets
null
monitor for unusual processes accessing secrets
t1558
steal or forge kerberos tickets
null
particularly investigate irregular patterns of activity ex accounts making numerous requests event id 4769 within a small time frame especially if they also request rc4 encryption type 0x17
t1558
steal or forge kerberos tickets
null
secrets
t1559
inter process communication
null
adversaries may abuse inter process communication ipc mechanisms for local code or command execution
t1559
inter process communication
null
ipc is typically used by processes to share data communicate with each other or synchronize execution
t1559
inter process communication
null
module module load process process creation script script execution
t1559
inter process communication
null
monitor for strings in filescommands loaded dllslibraries or spawned processes that are associated with abuse of ipc mechanisms
t1560
archive collected data
null
a process that loads the windows dll crypt32
t1560
archive collected data
null
an adversary may compress andor encrypt data that is collected prior to exfiltration