id
stringlengths
5
9
technique
stringlengths
3
43
subtechniqueid
stringlengths
3
60
sentences
stringlengths
1
871
t1584.002
compromise infrastructure
dnsTechniqueserver
adversaries may utilize dns traffic for various tasks, including for command and control.
t1584.002
compromise infrastructure
dnsTechniqueserver
adversaries may compromise third-party dns servers that can be used during targeting.
t1584.002
compromise infrastructure
dnsTechniqueserver
threat actors can alter dns records.
t1584.002
compromise infrastructure
dnsTechniqueserver
dns control can allow for redirection of an organization's traffic, facilitating collection and credential access efforts for the adversary.
t1584.002
compromise infrastructure
dnsTechniqueserver
adversaries may also be able to silently create subdomains pointed at malicious servers without tipping off the actual owner of the dns server.
t1584.003
compromise infrastructure
virtualTechniqueprivateTechniqueserver
turla has used the vps infrastructure of compromised iranian threat actors.
t1584.003
compromise infrastructure
virtualTechniqueprivateTechniqueserver
by compromising a vps to use as infrastructure, adversaries can make it difficult to physically tie back operations to themselves.
t1584.003
compromise infrastructure
virtualTechniqueprivateTechniqueserver
nobellium compromised a microsoft azure ad account within a cloud service providers csp tenant.
t1584.003
compromise infrastructure
virtualTechniqueprivateTechniqueserver
unc 2452 provisioned a system within microsoft azure that was within close proximity to a legitimate azure-hosted system belonging to the csp that they used to access their customers environment.
t1584.003
compromise infrastructure
virtualTechniqueprivateTechniqueserver
a threat actor performed initial reconnaissance via a vps provider located in the same region as the victim.
t1584.004
compromise infrastructure
server
apt16 has compromised otherwise legitimate sites as staging servers for second-stage payloads.
t1584.004
compromise infrastructure
server
indrik spider has served fake updates via legitimate websites that have been compromised.
t1584.004
compromise infrastructure
server
turla has used compromised servers as infrastructure.
t1584.004
compromise infrastructure
server
malicious emails sent to targets contain links to a compromised server that redirects to the download of janeleiro.
t1584.004
compromise infrastructure
server
candiru operators compromised several high-profile websites.
t1584.005
compromise infrastructure
botnet
adversaries may compromise numerous third-party systems to form a botnet that can be used during targeting.
t1584.005
compromise infrastructure
botnet
attackers may conduct a takeover of an existing botnet, such as redirecting bots to adversary-controlled c2 servers.
t1584.005
compromise infrastructure
botnet
freakout attacked pos systems in order to use them as a botnet infrastructure.
t1584.005
compromise infrastructure
botnet
mirai malware created a botnet used by multiple threat actor groups.
t1584.005
compromise infrastructure
botnet
meris attacked yandex with ddos using botnets.
t1584.006
compromise infrastructure
webTechniqueservices
turla has frequently used compromised wordpress sites for c2 infrastructure.
t1584.006
compromise infrastructure
webTechniqueservices
adversaries may compromise access to third-party web services that can be used during targeting.
t1584.006
compromise infrastructure
webTechniqueservices
adversaries may try to take ownership of a legitimate user's access to a web service and use that web service as infrastructure in support of cyber operations.
t1584.006
compromise infrastructure
webTechniqueservices
using common services, such as those offered by google or twitter, makes it easier for adversaries to hide in expected noise.
t1584.006
compromise infrastructure
webTechniqueservices
notpetya, it is suspected that attackers compromised a vulnerable server used to distribute the software and replaced the legitimate code with their compromised version.
t1585
establish accounts
null
adversaries can create accounts that can be used to build a persona to further operations
t1585
establish accounts
null
adversaries may create and cultivate accounts with services that can be used during targeting
t1585
establish accounts
null
consider monitoring social media activity related to your organization
t1585
establish accounts
null
detection efforts may be focused on related stages of the adversary lifecycle such as during initial access ex phishingt1566
t1585
establish accounts
null
much of this activity will take place outside the visibility of the target organization making detection of this behavior difficult
t1585
establish accounts
null
persona social media network traffic network traffic content
t1585
establish accounts
null
suspicious activity may include personas claiming to work for your organization or recently createdmodified accounts making numerous connection requests to accounts affiliated with your organization
t1585.001
establish accounts
socialTechniquemediaTechniqueaccounts
apt32 has set up facebook pages in tandem with fake websites.
t1585.001
establish accounts
socialTechniquemediaTechniqueaccounts
cleaver has created fake linkedin profiles that included profile photos details and connections.
t1585.001
establish accounts
socialTechniquemediaTechniqueaccounts
fox kitten has used a twitter account to communicate with ransomware victims.
t1585.001
establish accounts
socialTechniquemediaTechniqueaccounts
sandworm team has established social media accounts to disseminate victim internal-only documents and other sensitive data.
t1585.001
establish accounts
socialTechniquemediaTechniqueaccounts
leviathan has created new social media accounts for targeting efforts.
t1585.002
establish accounts
emailTechniqueaccounts
apt1 has created email accounts for later use in social engineering phishing and when registering domains.
t1585.002
establish accounts
emailTechniqueaccounts
magic hound has established email accounts using fake personas for spear-phishing operations.
t1585.002
establish accounts
emailTechniqueaccounts
sandworm team has created email accounts that mimic legitimate organizations for its spearphishing operations.
t1585.002
establish accounts
emailTechniqueaccounts
silent librarian has established e-mail accounts to receive e-mails forwarded from compromised accounts.
t1585.002
establish accounts
emailTechniqueaccounts
leviathan has created new email accounts for targeting efforts.
t1586
compromise accounts
null
adversaries may compromise accounts with services that can be used during targeting
t1586
compromise accounts
null
consider monitoring social media activity related to your organization
t1586
compromise accounts
null
detection efforts may be focused on related stages of the adversary lifecycle such as during initial access ex phishing
t1586
compromise accounts
null
for operations incorporating social engineering the utilization of an online persona may be important
t1586
compromise accounts
null
much of this activity will take place outside the visibility of the target organization making detection of this behavior difficult
t1586
compromise accounts
null
persona social media network traffic network traffic content
t1586
compromise accounts
null
suspicious activity may include personas claiming to work for your organization or recently modified accounts making numerous connection requests to accounts affiliated with your organization
t1586.001
compromise accounts
socialTechniquemediaTechniqueaccounts
leviathan has compromised social media accounts to conduct social engineering attacks.
t1586.001
compromise accounts
socialTechniquemediaTechniqueaccounts
adversaries may compromise social media accounts that can be used during targeting.
t1586.001
compromise accounts
socialTechniquemediaTechniqueaccounts
utilizing an existing persona may engender a level of trust in a potential victim if they have a relationship, or knowledge of, the compromised persona.
t1586.001
compromise accounts
socialTechniquemediaTechniqueaccounts
attackers can gather credentials via phishing for information, purchasing credentials from third-party sites, or by brute forcing credentials.
t1586.001
compromise accounts
socialTechniquemediaTechniqueaccounts
attacker personas may exist on a single site or across multiple sites.
t1586.002
compromise accounts
emailTechniqueaccounts
kimsuky has compromised web portal email accounts to send spearphishing e-mails.
t1586.002
compromise accounts
emailTechniqueaccounts
magic hound has compromised personal email accounts through the use of legitimate credentials and gathered additional victim information.
t1586.002
compromise accounts
emailTechniqueaccounts
indigozebra has compromised legitimate email accounts to use in their spearphishing operations.
t1586.002
compromise accounts
emailTechniqueaccounts
leviathan has compromised email accounts to conduct social engineering attacks.
t1586.002
compromise accounts
emailTechniqueaccounts
emotet compromised email systems to spread the trojan.
t1587
develop capabilities
null
adversaries may build capabilities that can be used during targeting
t1587
develop capabilities
null
citation splunk kovar certificates 2017 much of this activity will take place outside the visibility of the target organization making detection of this behavior difficult
t1587
develop capabilities
null
consider analyzing malware for features that may be associated with the adversary andor their developers such as compiler used debugging artifacts or code similarities
t1587
develop capabilities
null
consider use of services that may aid in the tracking of certificates in use on sites across the internet
t1587
develop capabilities
null
detection efforts may be focused on related stages of the adversary lifecycle such as during defense evasion or command and control
t1587
develop capabilities
null
in some cases it may be possible to pivot on known pieces of certificate information to uncover other adversary infrastructure
t1587
develop capabilities
null
malware repositories can also be used to identify additional samples associated with the adversary and identify development patterns over time
t1587
develop capabilities
null
malware repository malware metadata malware repository malware content internet scan response content
t1587
develop capabilities
null
rather than purchasing freely downloading or stealing capabilities adversaries may develop their own capabilities in house
t1587.001
develop capabilities
malware
apt29 developed sunspot sunburst teardrop and raindrop sunspot and sunburst were tailored to be incorporated into solarwind's orion software library.
t1587.001
develop capabilities
malware
cleaver has created customized tools and payloads for functions including arp poisoning encryption credential dumping asp.net shells web backdoors process enumeration wmi querying http and smb communications network interface sniffing and keystroke logging.
t1587.001
develop capabilities
malware
fin7 has developed malware for use in operations including the creation of infected removable media.
t1587.001
develop capabilities
malware
lazarus group has developed several custom malware for use in operations.
t1587.001
develop capabilities
malware
night dragon used privately developed and customized remote access tools.
t1587.001
develop capabilities
malware
sandworm team has developed malware for its operations including malicious mobile applications and destructive malware such as notpetya and olympic destroyer.
t1587.001
develop capabilities
malware
turla has developed its own unique malware for use in operations.
t1587.001
develop capabilities
malware
unc 2452 developed sunspot sunburst teardrop and raindrop sunspot and sunburst were tailored to be incorporated into solarwind's orion software library.
t1587.002
develop capabilities
codeTechniquesigningTechniquecertificates
patchwork has created self-signed certificates from fictitious and spoofed legitimate software companies that were later used to sign malware.
t1587.002
develop capabilities
codeTechniquesigningTechniquecertificates
promethium has created self-signed certificates to sign malicious installers.
t1587.002
develop capabilities
codeTechniquesigningTechniquecertificates
adversaries may create self-signed code signing certificates that can be used during targeting.
t1587.002
develop capabilities
codeTechniquesigningTechniquecertificates
users are more likely to run signed code certificates, which can be attached to malware.
t1587.002
develop capabilities
codeTechniquesigningTechniquecertificates
malware actors can spoof legitimate certificates.
t1587.003
develop capabilities
digitalTechniquecertificates
apt29 has created self-signed digital certificates to enable mutual tls authentication for malware.
t1587.003
develop capabilities
digitalTechniquecertificates
promethium has created self-signed digital certificates for use in https c2 traffic.
t1587.003
develop capabilities
digitalTechniquecertificates
adversaries may create self-signed ssltls certificates that can be used to further their operations, such as encrypting c2 traffic.
t1587.003
develop capabilities
digitalTechniquecertificates
unc2190 created self-signed certificates to spread sabbath ransomware.
t1587.003
develop capabilities
digitalTechniquecertificates
fin13 used ssl certificates for c2 communication via email.
t1587.004
develop capabilities
exploits
phosphorous has been deploying ransomware using a log4j exploit.
t1587.004
develop capabilities
exploits
wizard spider developed an exploit targeting cve-2021-40444.
t1587.004
develop capabilities
exploits
adversaries may develop exploits that can be used during targeting.
t1587.004
develop capabilities
exploits
dev-0322 created exploits for zoho manageengine adselfservice plus software.
t1587.004
develop capabilities
exploits
tg1021 uses a custom-made malware framework, built around a common core, tailor-made for iis servers.
t1588
obtain capabilities
null
adversaries may buy andor steal capabilities that can be used during targeting
t1588
obtain capabilities
null
citation analyzing cs dec 2020 consider use of services that may aid in the tracking of newly issued certificates andor certificates in use on sites across the internet
t1588
obtain capabilities
null
citation fireeye supply chain malware repositories can also be used to identify features of tool use associated with an adversary such as watermarks in cobalt strikes0154 payloads
t1588
obtain capabilities
null
citation recorded future beacon certificates much of this activity will take place outside the visibility of the target organization making detection of this behavior difficult
t1588
obtain capabilities
null
citation splunk kovar certificates 2017 some server side components of adversary tools may have default values set for ssltls certificates
t1588
obtain capabilities
null
consider analyzing malware for features that may be associated with malware providers such as compiler used debugging artifacts code similarities or even group identifiers associated with specific malware as a service maas offerings
t1588
obtain capabilities
null
detection efforts may be focused on related stages of the adversary lifecycle such as during defense evasion or command and control
t1588
obtain capabilities
null
identifying overlaps in malware use by different adversaries may indicate malware was obtained by the adversary rather than developed by them
t1588
obtain capabilities
null
in some cases identifying overlapping characteristics in malware used by different adversaries may point to a shared quartermaster