id
stringlengths 5
9
| technique
stringlengths 3
43
| subtechniqueid
stringlengths 3
60
⌀ | sentences
stringlengths 1
871
|
---|---|---|---|
t1596.005 | search open technical databases | scanTechniquedatabases | revil has performed recon against victims by scanning for vulnerable services and open ports. |
t1596.005 | search open technical databases | scanTechniquedatabases | attackers can use passive and active methods to obtain active port services. |
t1596.005 | search open technical databases | scanTechniquedatabases | threat actors can use shodan to search for internet-facing hosts and ip addresses. |
t1597 | search closed sources | null | adversaries may search and gather information about victims from closed sources that can be used during targeting |
t1597 | search closed sources | null | detection efforts may be focused on related stages of the adversary lifecycle such as during initial access |
t1597 | search closed sources | null | information about victims may be available for purchase from reputable private sources and databases such as paid subscriptions to feeds of technicalthreat intelligence data |
t1597 | search closed sources | null | much of this activity may have a very high occurrence and associated false positive rate as well as potentially taking place outside the visibility of the target organization making detection difficult for defenders |
t1597.001 | search closed sources | threatTechniqueintelTechniquevendors | threat actors can use threat intel feeds for valuable information. |
t1597.001 | search closed sources | threatTechniqueintelTechniquevendors | threat actors can use paid platforms to monitor what intelligence is being provided to potential targets. |
t1597.001 | search closed sources | threatTechniqueintelTechniquevendors | adversaries can monitor what iocs are being discovered about their campaign to change tactics. |
t1597.001 | search closed sources | threatTechniqueintelTechniquevendors | threat actors can determine what other groups are targeting through intel platforms. |
t1597.001 | search closed sources | threatTechniqueintelTechniquevendors | threat actors can use intelligence feeds to target new victims. |
t1597.002 | search closed sources | purchaseTechniquetechnicalTechniquedata | adversaries may purchase technical information about victims that can be used during targeting. |
t1597.002 | search closed sources | purchaseTechniquetechnicalTechniquedata | threat actors may purchase information from dark web or black markets. |
t1597.002 | search closed sources | purchaseTechniquetechnicalTechniquedata | reputable private resources have scan database subscriptions. |
t1597.002 | search closed sources | purchaseTechniquetechnicalTechniquedata | attackers can use known or unknown repositories of data from tor sites. |
t1597.002 | search closed sources | purchaseTechniquetechnicalTechniquedata | threat actors can gain network and login information purchased from other attacker groups. |
t1598 | phishing for information | null | adversaries may send phishing messages to elicit sensitive information that can be used during targeting |
t1598 | phishing for information | null | application log application log content network traffic network traffic flow network traffic network traffic content |
t1598 | phishing for information | null | citation microsoft anti spoofingcitation acsc email spoofing when it comes to following links monitor for references to uncategorized or known bad sites |
t1598 | phishing for information | null | depending on the specific method of phishing the detections can vary |
t1598 | phishing for information | null | filtering based on dkim+spf or header analysis can help detect when the email sender is spoofed |
t1598 | phishing for information | null | monitor for suspicious email activity such as numerous accounts receiving messages from a single unusualunknown sender |
t1598 | phishing for information | null | monitor social media traffic for suspicious activity including messages requesting information as well as abnormal file or data transfers especially those involving unknown or otherwise suspicious accounts |
t1598 | phishing for information | null | phishing for information is an attempt to trick targets into divulging information frequently credentials or other actionable information |
t1598 | phishing for information | null | url inspection within email including expanding shortened links can also help detect links leading to known malicious sites |
t1598.001 | phishing for information | spearphishingTechniqueservice | attackers will use spearphishing messages to elicit sensative information from targets. |
t1598.001 | phishing for information | spearphishingTechniqueservice | spearphishing uses social engineering techniques to get credentials or other information. |
t1598.001 | phishing for information | spearphishingTechniqueservice | emails or social media messaging spearphishing is generally aimed at it departments, c-suite executives, or non-tech related departments. |
t1598.001 | phishing for information | spearphishingTechniqueservice | threat actors use spearphishing against non-enterprise controlled services as they have less protections. |
t1598.001 | phishing for information | spearphishingTechniqueservice | adversaries may pose as recruiters to garner interest and communication. |
t1598.002 | phishing for information | spearTechniquephishingTechniqueattachment | astaroth has been delivered via malicious email attachments. |
t1598.002 | phishing for information | spearTechniquephishingTechniqueattachment | sidewinder has sent emails with malicious attachments that lead victims to credential harvesting websites. |
t1598.002 | phishing for information | spearTechniquephishingTechniqueattachment | a phishing campaign has been observed by researchers from trend micro that contain a macro-enabled document that exploits the legitimate script engine, œautohotkey. |
t1598.002 | phishing for information | spearTechniquephishingTechniqueattachment | researchers have discovered a wave of emails with malicious attachments orchestrated by russian advanced persistent threat apt group apt29. |
t1598.002 | phishing for information | spearTechniquephishingTechniqueattachment | using attached html files containing javascript, the email will write an iso file to disk this contains a cobalt strike beacon that will activate on completion. |
t1598.002 | phishing for information | spearTechniquephishingTechniqueattachment | strat, a java-based malware, is currently being delivered as an attached pdf document via a phishing campaign using compromised email accounts. |
t1598.002 | phishing for information | spearTechniquephishingTechniqueattachment | although the email may look official and legitimate, if you have no reason to receive such an email or if the content is questionable, you should not open any attached files. |
t1598.003 | phishing for information | spearphishingTechniquelink | apt32 has used malicious links to direct users to web pages designed to harvest credentials. |
t1598.003 | phishing for information | spearphishingTechniquelink | kimsuky has used links in e-mail to steal account information. |
t1598.003 | phishing for information | spearphishingTechniquelink | sandworm team has crafted spearphishing emails with hyperlinks designed to trick unwitting recipients into revealing their account credentials. |
t1598.003 | phishing for information | spearphishingTechniquelink | sidewinder has sent e-mails with malicious links to credential harvesting websites. |
t1598.003 | phishing for information | spearphishingTechniquelink | silent librarian has used links in e-mails to direct victims to credential harvesting websites designed to appear like the targeted organization's login page. |
t1599 | network boundary bridging | null | adversaries may bridge network boundaries by compromising perimeter network devices |
t1599 | network boundary bridging | null | breaching these devices may enable an adversary to bypass restrictions on traffic routing that otherwise separate trusted and untrusted networks |
t1599 | network boundary bridging | null | consider monitoring network traffic on both interfaces of border network devices with out of band packet capture or network flow data using a different device than the one in question |
t1599 | network boundary bridging | null | look for rules that are less restrictive or that allow specific traffic types that were not previously authorized |
t1599 | network boundary bridging | null | look for traffic that should be prohibited by the intended network traffic policy enforcement for the border network device |
t1599 | network boundary bridging | null | monitor the border network device configuration to validate that the policy enforcement sections are what was intended |
t1599 | network boundary bridging | null | network traffic network traffic flow network traffic network traffic content |
t1600 | weaken encryption | null | adversaries may compromise a network devices encryption capability in order to bypass encryption that would otherwise protect data communications |
t1600 | weaken encryption | null | citation cisco synful knock evolution encryption can be used to protect transmitted network traffic to maintain its confidentiality protect against unauthorized disclosure and integrity protect against unauthorized changes |
t1600 | weaken encryption | null | detection efforts may be focused on closely related adversary behaviors such as modify system imaget1601 |
t1600 | weaken encryption | null | file file modification |
t1600 | weaken encryption | null | some detection methods require vendor support to aid in investigation |
t1600 | weaken encryption | null | there is no documented method for defenders to directly identify behaviors that weaken encryption |
t1601 | modify system image | null | 001 it may be appropriate to also verify the integrity of the vendor provided operating system image file |
t1601 | modify system image | null | adversaries may make changes to the operating system of embedded network devices to weaken defenses and provide new capabilities for themselves |
t1601 | modify system image | null | because this method may be used in conjunction with patch system imaget1601 |
t1601 | modify system image | null | citation cisco ios software integrity assurance image file verification many vendors of embedded network devices can provide advanced debugging support that will allow them to work with device owners to validate the integrity of the operating system running in memory |
t1601 | modify system image | null | citation cisco ios software integrity assurance run time memory verification |
t1601 | modify system image | null | compare the checksum of the operating system file with the checksum of a known good copy from a trusted source |
t1601 | modify system image | null | even for those platforms that have the capability it is recommended to download a copy of the file to a trusted computer to calculate the checksum with software that is not compromised |
t1601 | modify system image | null | file file modification |
t1601 | modify system image | null | if a compromise of the operating system is suspected contact the vendor technical support and seek such services for a more thorough inspection of the current running system |
t1601 | modify system image | null | most embedded network devices provide a command to print the version of the currently running operating system |
t1601 | modify system image | null | on such devices the operating systems are typically monolithic and most of the device functionality and capabilities are contained within a single file |
t1601 | modify system image | null | some embedded network device platforms may have the capability to calculate the checksum of the file while others may not |
t1601 | modify system image | null | use this command to query the operating system for its version number and compare it to what is expected for the device in question |
t1602 | data from configuration repository | null | adversaries may collect data related to managed devices from configuration repositories |
t1602 | data from configuration repository | null | citation cisco advisory snmp v3 authentication vulnerabilities |
t1602 | data from configuration repository | null | configuration repositories are used by management systems in order to configure manage and control data on remote systems |
t1602 | data from configuration repository | null | identify network traffic sent or received by untrusted hosts or networks that solicits and obtains the configuration information of the queried device |
t1602 | data from configuration repository | null | network traffic network connection creation network traffic network traffic content |
t1606 | forge web credentials | null | adversaries may forge credential materials that can be used to gain access to web applications or internet services |
t1606 | forge web credentials | null | logon session logon session creation web credential web credential creation web credential web credential usage |
t1606 | forge web credentials | null | monitor for anomalous authentication activity such as logons or other user session activity associated with unknown accounts |
t1606 | forge web credentials | null | monitor for unexpected and abnormal access to resources including access of websites and cloud based applications by the same user in different locations or by different systems that do not match expected configurations |
t1606 | forge web credentials | null | web applications and services hosted in cloud saas environments or on premise servers often use session cookies tokens or other materials to authenticate and authorize user access |
t1608 | stage capabilities | null | adversaries may upload install or otherwise set up capabilities that can be used during targeting |
t1608 | stage capabilities | null | detection efforts may be focused on related stages of the adversary lifecycle such as initial access and post compromise behaviors |
t1608 | stage capabilities | null | if infrastructure or patterns in malware tooling certificates or malicious web content have been previously identified internet scanning may uncover when an adversary has staged their capabilities |
t1608 | stage capabilities | null | internet scan response content |
t1608 | stage capabilities | null | much of this activity will take place outside the visibility of the target organization making detection of this behavior difficult |
t1608 | stage capabilities | null | to support their operations an adversary may need to take capabilities they developed develop capabilitiest1587 or obtained obtain capabilitiest1588 and stage them on infrastructure under their control |
t1608.001 | stage capabilities | uploadTechniquemalware | apt32 has hosted malicious payloads in dropbox amazon s3 and google drive for use during targeting. |
t1608.001 | stage capabilities | uploadTechniquemalware | they were posting obfuscated malicious payloads on pastebin to be used later during the attack. |
t1608.001 | stage capabilities | uploadTechniquemalware | some of the compromised websites were used to stage post-compromise malware such as keyloggers. |
t1608.001 | stage capabilities | uploadTechniquemalware | these government hackers staged malicious java scripts on the microsoft typosquatting domains they registered earlier. |
t1608.001 | stage capabilities | uploadTechniquemalware | gamaredon stage malicious vba scripts on various compromised websites. |
t1608.002 | stage capabilities | uploadTechniquetool | threat group-3390 has staged tools including gsecdump and wce on previously compromised websites. |
t1608.002 | stage capabilities | uploadTechniquetool | prior to the attack, the adversaries uploaded remote administration tools to compromised websites they controlled. |
t1608.002 | stage capabilities | uploadTechniquetool | threat actor placed several double-purpose tools on his github repository. |
t1608.002 | stage capabilities | uploadTechniquetool | the attackers uploaded remote utilities rat tool to a third-party compromised website to be used if the victim environment wont have a remote administration tool installed. |
t1608.002 | stage capabilities | uploadTechniquetool | fin5 staged a customized version of psexec. |
t1608.003 | stage capabilities | installTechniquedigitalTechniquecertificate | adversaries created self-signed certificates and installed them on their web servers. |
t1608.003 | stage capabilities | installTechniquedigitalTechniquecertificate | attackers installed lets encrypt certificates on their phishing servers to gain additional trust from the visitors. |
t1608.003 | stage capabilities | installTechniquedigitalTechniquecertificate | they prepare phishing pages with valid ssl tls certificates installed. |
t1608.003 | stage capabilities | installTechniquedigitalTechniquecertificate | according to phishlabs, in the last quarter of 2019, 74 of reported phishing websites were 'secure,' being both https and with the lock symbol, meaning cybercriminals installed ssl certificates and circumvented so-called verification processes. |
t1608.003 | stage capabilities | installTechniquedigitalTechniquecertificate | actors installed ssl certificates they made using openssl where you can even be your own certificate authority. |