id
stringlengths 5
9
| technique
stringlengths 3
43
| subtechniqueid
stringlengths 3
60
⌀ | sentences
stringlengths 1
871
|
---|---|---|---|
t1584.002 | compromise infrastructure | dnsTechniqueserver | adversaries may utilize dns traffic for various tasks, including for command and control. |
t1584.002 | compromise infrastructure | dnsTechniqueserver | adversaries may compromise third-party dns servers that can be used during targeting. |
t1584.002 | compromise infrastructure | dnsTechniqueserver | threat actors can alter dns records. |
t1584.002 | compromise infrastructure | dnsTechniqueserver | dns control can allow for redirection of an organization's traffic, facilitating collection and credential access efforts for the adversary. |
t1584.002 | compromise infrastructure | dnsTechniqueserver | adversaries may also be able to silently create subdomains pointed at malicious servers without tipping off the actual owner of the dns server. |
t1584.003 | compromise infrastructure | virtualTechniqueprivateTechniqueserver | turla has used the vps infrastructure of compromised iranian threat actors. |
t1584.003 | compromise infrastructure | virtualTechniqueprivateTechniqueserver | by compromising a vps to use as infrastructure, adversaries can make it difficult to physically tie back operations to themselves. |
t1584.003 | compromise infrastructure | virtualTechniqueprivateTechniqueserver | nobellium compromised a microsoft azure ad account within a cloud service providers csp tenant. |
t1584.003 | compromise infrastructure | virtualTechniqueprivateTechniqueserver | unc 2452 provisioned a system within microsoft azure that was within close proximity to a legitimate azure-hosted system belonging to the csp that they used to access their customers environment. |
t1584.003 | compromise infrastructure | virtualTechniqueprivateTechniqueserver | a threat actor performed initial reconnaissance via a vps provider located in the same region as the victim. |
t1584.004 | compromise infrastructure | server | apt16 has compromised otherwise legitimate sites as staging servers for second-stage payloads. |
t1584.004 | compromise infrastructure | server | indrik spider has served fake updates via legitimate websites that have been compromised. |
t1584.004 | compromise infrastructure | server | turla has used compromised servers as infrastructure. |
t1584.004 | compromise infrastructure | server | malicious emails sent to targets contain links to a compromised server that redirects to the download of janeleiro. |
t1584.004 | compromise infrastructure | server | candiru operators compromised several high-profile websites. |
t1584.005 | compromise infrastructure | botnet | adversaries may compromise numerous third-party systems to form a botnet that can be used during targeting. |
t1584.005 | compromise infrastructure | botnet | attackers may conduct a takeover of an existing botnet, such as redirecting bots to adversary-controlled c2 servers. |
t1584.005 | compromise infrastructure | botnet | freakout attacked pos systems in order to use them as a botnet infrastructure. |
t1584.005 | compromise infrastructure | botnet | mirai malware created a botnet used by multiple threat actor groups. |
t1584.005 | compromise infrastructure | botnet | meris attacked yandex with ddos using botnets. |
t1584.006 | compromise infrastructure | webTechniqueservices | turla has frequently used compromised wordpress sites for c2 infrastructure. |
t1584.006 | compromise infrastructure | webTechniqueservices | adversaries may compromise access to third-party web services that can be used during targeting. |
t1584.006 | compromise infrastructure | webTechniqueservices | adversaries may try to take ownership of a legitimate user's access to a web service and use that web service as infrastructure in support of cyber operations. |
t1584.006 | compromise infrastructure | webTechniqueservices | using common services, such as those offered by google or twitter, makes it easier for adversaries to hide in expected noise. |
t1584.006 | compromise infrastructure | webTechniqueservices | notpetya, it is suspected that attackers compromised a vulnerable server used to distribute the software and replaced the legitimate code with their compromised version. |
t1585 | establish accounts | null | adversaries can create accounts that can be used to build a persona to further operations |
t1585 | establish accounts | null | adversaries may create and cultivate accounts with services that can be used during targeting |
t1585 | establish accounts | null | consider monitoring social media activity related to your organization |
t1585 | establish accounts | null | detection efforts may be focused on related stages of the adversary lifecycle such as during initial access ex phishingt1566 |
t1585 | establish accounts | null | much of this activity will take place outside the visibility of the target organization making detection of this behavior difficult |
t1585 | establish accounts | null | persona social media network traffic network traffic content |
t1585 | establish accounts | null | suspicious activity may include personas claiming to work for your organization or recently createdmodified accounts making numerous connection requests to accounts affiliated with your organization |
t1585.001 | establish accounts | socialTechniquemediaTechniqueaccounts | apt32 has set up facebook pages in tandem with fake websites. |
t1585.001 | establish accounts | socialTechniquemediaTechniqueaccounts | cleaver has created fake linkedin profiles that included profile photos details and connections. |
t1585.001 | establish accounts | socialTechniquemediaTechniqueaccounts | fox kitten has used a twitter account to communicate with ransomware victims. |
t1585.001 | establish accounts | socialTechniquemediaTechniqueaccounts | sandworm team has established social media accounts to disseminate victim internal-only documents and other sensitive data. |
t1585.001 | establish accounts | socialTechniquemediaTechniqueaccounts | leviathan has created new social media accounts for targeting efforts. |
t1585.002 | establish accounts | emailTechniqueaccounts | apt1 has created email accounts for later use in social engineering phishing and when registering domains. |
t1585.002 | establish accounts | emailTechniqueaccounts | magic hound has established email accounts using fake personas for spear-phishing operations. |
t1585.002 | establish accounts | emailTechniqueaccounts | sandworm team has created email accounts that mimic legitimate organizations for its spearphishing operations. |
t1585.002 | establish accounts | emailTechniqueaccounts | silent librarian has established e-mail accounts to receive e-mails forwarded from compromised accounts. |
t1585.002 | establish accounts | emailTechniqueaccounts | leviathan has created new email accounts for targeting efforts. |
t1586 | compromise accounts | null | adversaries may compromise accounts with services that can be used during targeting |
t1586 | compromise accounts | null | consider monitoring social media activity related to your organization |
t1586 | compromise accounts | null | detection efforts may be focused on related stages of the adversary lifecycle such as during initial access ex phishing |
t1586 | compromise accounts | null | for operations incorporating social engineering the utilization of an online persona may be important |
t1586 | compromise accounts | null | much of this activity will take place outside the visibility of the target organization making detection of this behavior difficult |
t1586 | compromise accounts | null | persona social media network traffic network traffic content |
t1586 | compromise accounts | null | suspicious activity may include personas claiming to work for your organization or recently modified accounts making numerous connection requests to accounts affiliated with your organization |
t1586.001 | compromise accounts | socialTechniquemediaTechniqueaccounts | leviathan has compromised social media accounts to conduct social engineering attacks. |
t1586.001 | compromise accounts | socialTechniquemediaTechniqueaccounts | adversaries may compromise social media accounts that can be used during targeting. |
t1586.001 | compromise accounts | socialTechniquemediaTechniqueaccounts | utilizing an existing persona may engender a level of trust in a potential victim if they have a relationship, or knowledge of, the compromised persona. |
t1586.001 | compromise accounts | socialTechniquemediaTechniqueaccounts | attackers can gather credentials via phishing for information, purchasing credentials from third-party sites, or by brute forcing credentials. |
t1586.001 | compromise accounts | socialTechniquemediaTechniqueaccounts | attacker personas may exist on a single site or across multiple sites. |
t1586.002 | compromise accounts | emailTechniqueaccounts | kimsuky has compromised web portal email accounts to send spearphishing e-mails. |
t1586.002 | compromise accounts | emailTechniqueaccounts | magic hound has compromised personal email accounts through the use of legitimate credentials and gathered additional victim information. |
t1586.002 | compromise accounts | emailTechniqueaccounts | indigozebra has compromised legitimate email accounts to use in their spearphishing operations. |
t1586.002 | compromise accounts | emailTechniqueaccounts | leviathan has compromised email accounts to conduct social engineering attacks. |
t1586.002 | compromise accounts | emailTechniqueaccounts | emotet compromised email systems to spread the trojan. |
t1587 | develop capabilities | null | adversaries may build capabilities that can be used during targeting |
t1587 | develop capabilities | null | citation splunk kovar certificates 2017 much of this activity will take place outside the visibility of the target organization making detection of this behavior difficult |
t1587 | develop capabilities | null | consider analyzing malware for features that may be associated with the adversary andor their developers such as compiler used debugging artifacts or code similarities |
t1587 | develop capabilities | null | consider use of services that may aid in the tracking of certificates in use on sites across the internet |
t1587 | develop capabilities | null | detection efforts may be focused on related stages of the adversary lifecycle such as during defense evasion or command and control |
t1587 | develop capabilities | null | in some cases it may be possible to pivot on known pieces of certificate information to uncover other adversary infrastructure |
t1587 | develop capabilities | null | malware repositories can also be used to identify additional samples associated with the adversary and identify development patterns over time |
t1587 | develop capabilities | null | malware repository malware metadata malware repository malware content internet scan response content |
t1587 | develop capabilities | null | rather than purchasing freely downloading or stealing capabilities adversaries may develop their own capabilities in house |
t1587.001 | develop capabilities | malware | apt29 developed sunspot sunburst teardrop and raindrop sunspot and sunburst were tailored to be incorporated into solarwind's orion software library. |
t1587.001 | develop capabilities | malware | cleaver has created customized tools and payloads for functions including arp poisoning encryption credential dumping asp.net shells web backdoors process enumeration wmi querying http and smb communications network interface sniffing and keystroke logging. |
t1587.001 | develop capabilities | malware | fin7 has developed malware for use in operations including the creation of infected removable media. |
t1587.001 | develop capabilities | malware | lazarus group has developed several custom malware for use in operations. |
t1587.001 | develop capabilities | malware | night dragon used privately developed and customized remote access tools. |
t1587.001 | develop capabilities | malware | sandworm team has developed malware for its operations including malicious mobile applications and destructive malware such as notpetya and olympic destroyer. |
t1587.001 | develop capabilities | malware | turla has developed its own unique malware for use in operations. |
t1587.001 | develop capabilities | malware | unc 2452 developed sunspot sunburst teardrop and raindrop sunspot and sunburst were tailored to be incorporated into solarwind's orion software library. |
t1587.002 | develop capabilities | codeTechniquesigningTechniquecertificates | patchwork has created self-signed certificates from fictitious and spoofed legitimate software companies that were later used to sign malware. |
t1587.002 | develop capabilities | codeTechniquesigningTechniquecertificates | promethium has created self-signed certificates to sign malicious installers. |
t1587.002 | develop capabilities | codeTechniquesigningTechniquecertificates | adversaries may create self-signed code signing certificates that can be used during targeting. |
t1587.002 | develop capabilities | codeTechniquesigningTechniquecertificates | users are more likely to run signed code certificates, which can be attached to malware. |
t1587.002 | develop capabilities | codeTechniquesigningTechniquecertificates | malware actors can spoof legitimate certificates. |
t1587.003 | develop capabilities | digitalTechniquecertificates | apt29 has created self-signed digital certificates to enable mutual tls authentication for malware. |
t1587.003 | develop capabilities | digitalTechniquecertificates | promethium has created self-signed digital certificates for use in https c2 traffic. |
t1587.003 | develop capabilities | digitalTechniquecertificates | adversaries may create self-signed ssltls certificates that can be used to further their operations, such as encrypting c2 traffic. |
t1587.003 | develop capabilities | digitalTechniquecertificates | unc2190 created self-signed certificates to spread sabbath ransomware. |
t1587.003 | develop capabilities | digitalTechniquecertificates | fin13 used ssl certificates for c2 communication via email. |
t1587.004 | develop capabilities | exploits | phosphorous has been deploying ransomware using a log4j exploit. |
t1587.004 | develop capabilities | exploits | wizard spider developed an exploit targeting cve-2021-40444. |
t1587.004 | develop capabilities | exploits | adversaries may develop exploits that can be used during targeting. |
t1587.004 | develop capabilities | exploits | dev-0322 created exploits for zoho manageengine adselfservice plus software. |
t1587.004 | develop capabilities | exploits | tg1021 uses a custom-made malware framework, built around a common core, tailor-made for iis servers. |
t1588 | obtain capabilities | null | adversaries may buy andor steal capabilities that can be used during targeting |
t1588 | obtain capabilities | null | citation analyzing cs dec 2020 consider use of services that may aid in the tracking of newly issued certificates andor certificates in use on sites across the internet |
t1588 | obtain capabilities | null | citation fireeye supply chain malware repositories can also be used to identify features of tool use associated with an adversary such as watermarks in cobalt strikes0154 payloads |
t1588 | obtain capabilities | null | citation recorded future beacon certificates much of this activity will take place outside the visibility of the target organization making detection of this behavior difficult |
t1588 | obtain capabilities | null | citation splunk kovar certificates 2017 some server side components of adversary tools may have default values set for ssltls certificates |
t1588 | obtain capabilities | null | consider analyzing malware for features that may be associated with malware providers such as compiler used debugging artifacts code similarities or even group identifiers associated with specific malware as a service maas offerings |
t1588 | obtain capabilities | null | detection efforts may be focused on related stages of the adversary lifecycle such as during defense evasion or command and control |
t1588 | obtain capabilities | null | identifying overlaps in malware use by different adversaries may indicate malware was obtained by the adversary rather than developed by them |
t1588 | obtain capabilities | null | in some cases identifying overlapping characteristics in malware used by different adversaries may point to a shared quartermaster |