id
stringlengths
5
9
technique
stringlengths
3
43
subtechniqueid
stringlengths
3
60
sentences
stringlengths
1
871
t1608.004
stage capabilities
drive
apt32 has stood up websites containing numerous articles and content scraped from the internet to make them appear legitimate but some of these pages include malicious javascript to profile the potential victim or infect them via a fake software update.
t1608.004
stage capabilities
drive
threat group-3390 has embedded malicious code into websites to screen a potential victim's ip address and then exploit their browser if they are of interest.
t1608.004
stage capabilities
drive
the attackers prepared an malvertizing: an ad combined of image and a javascript, which contained malicious code, and pushed it to legitimate websites via ad networks.
t1608.004
stage capabilities
drive
second stage of the magecart attack included injecting malicious javascript on the vulnerable checkout pages.
t1608.004
stage capabilities
drive
this apt group was looking to compromise industrys online publications to prepare for watering hole attacks.
t1608.005
stage capabilities
linkTechniquetarget
silent librarian has cloned victim organization login pages and staged them for later use in credential harvesting campaigns. silent librarian has also made use of a variety of url shorteners for these staged websites.
t1608.005
stage capabilities
linkTechniquetarget
the attackers prepared over 39,000 phishing pages mimicking the four platforms' login pages.
t1608.005
stage capabilities
linkTechniquetarget
they used ngrok paid option to acquire customized phishing urls displaying metas trademarks such as hxxp:facebook[.]in[.]ngrok[.]io.
t1608.005
stage capabilities
linkTechniquetarget
prior to the attack, they registered typosquatting domains, set up phishing pages and employed url shortener service.
t1608.005
stage capabilities
linkTechniquetarget
the attacker placed archived malicious office documents at the link target.
t1609
container administration command
null
a container administration service such as the docker daemon the kubernetes api server or the kubelet may allow remote management of containers within an environment
t1609
container administration command
null
adversaries may abuse a container administration service to execute commands within a container
t1609
container administration command
null
command command execution
t1609
container administration command
null
container administration service activities and executed commands can be captured through logging of process execution with command line arguments on the container and the underlying host
t1609
container administration command
null
in docker the daemon log provides insight into events at the daemon and container service level
t1609
container administration command
null
kubernetes system component logs may also detect activities running in and out of containers in the cluster
t1610
deploy container
null
adversaries may deploy a container into an environment to facilitate execution or evade defenses
t1610
deploy container
null
container container creation container container start pod pod creation pod pod modification application log application log content
t1610
deploy container
null
deploy logging agents on kubernetes nodes and retrieve logs from sidecar proxies for application pods to detect malicious activity at the cluster level
t1610
deploy container
null
in docker the daemon log provides insight into remote api calls including those that deploy containers
t1610
deploy container
null
in some cases adversaries may deploy a new container to execute processes associated with a particular image or deployment such as processes that execute or download malware
t1610
deploy container
null
logs for management services or applications used to deploy containers other than the native technologies themselves should also be monitored
t1610
deploy container
null
monitor for suspicious or unknown container images and pods in your environment
t1611
escape to host
null
additionally monitor for unexpected usage of syscalls such as mount as well as resulting process activity that may indicate an attempt to escape from a privileged container to host
t1611
escape to host
null
adversaries may break out of a container to gain access to the underlying host
t1611
escape to host
null
container container creation process os api execution process process creation
t1611
escape to host
null
in kubernetes monitor for cluster level events associated with changing containers volume configurations
t1611
escape to host
null
monitor for the deployment of suspicious or unknown container images and pods in your environment particularly containers running as root
t1611
escape to host
null
this can allow an adversary access to other containerized resources from the host level or to the host itself
t1612
build image on host
null
a remote build request may be sent to the docker api that includes a dockerfile that pulls a vanilla base image such as alpine from a public or local registry and then builds a custom image upon it
t1612
build image on host
null
additionally monitor for subsequent network communication with anomalous ips that have never been seen before in the environment that indicate the download of malicious code
t1612
build image on host
null
adversaries may build a container image directly on a host to bypass defenses that monitor for the retrieval of malicious images from a public registry
t1612
build image on host
null
image image creation network traffic network connection creation network traffic network traffic flow network traffic network traffic content
t1612
build image on host
null
monitor for unexpected docker image build requests to the docker daemon on hosts in the environment
t1613
container and resource discovery
null
adversaries may attempt to discover containers and other resources that are available within a containers environment
t1613
container and resource discovery
null
cluster cluster metadata container container enumeration container container metadata pod pod enumeration pod pod metadata application log application log content
t1613
container and resource discovery
null
establish centralized logging for the activity of container and kubernetes cluster components
t1613
container and resource discovery
null
monitor account activity logs to see actions performed and activity associated with the kubernetes dashboard and other web applications
t1613
container and resource discovery
null
monitor logs for actions that could be taken to gather information about container infrastructure including the use of discovery api calls by new or unexpected users
t1613
container and resource discovery
null
other resources may include images deployments pods nodes and other information such as the status of a cluster
t1613
container and resource discovery
null
this can be done by deploying logging agents on kubernetes nodes and retrieving logs from sidecar proxies for application pods to detect malicious activity at the cluster level
t1614
system location discovery
null
adversaries may gather information in an attempt to calculate the geographical location of a victim host
t1614
system location discovery
null
adversaries may use the information from system location discoveryt1614 during automated discovery to shape follow on behaviors including whether or not the adversary fully infects the target andor attempts specific actions
t1614
system location discovery
null
citation fbi ragnar locker 2020 monitor traffic flows to geolocation service provider sites such as ip api and ipinfo
t1614
system location discovery
null
data and events should not be viewed in isolation but as part of a chain of behavior that could lead to other activities based on the information obtained
t1614
system location discovery
null
instance instance metadata process process creation command command execution process os api execution
t1614
system location discovery
null
monitor processes and command line arguments for actions that could be taken to gather system location information
t1614
system location discovery
null
remote access tools with built in features may interact directly with the windows api such as calling getlocaleinfo to gather information
t1614
system location discovery
null
system and network discovery techniques normally occur throughout an operation as an adversary learns the environment
t1615
group policy discovery
null
adversaries may gather information on group policy settings to identify paths for privilege escalation security measures applied within a domain and to discover patterns in domain objects that can be manipulated or used to blend in the environment
t1615
group policy discovery
null
data and events should not be viewed in isolation but as part of a chain of behavior that could lead to other activities based on the information obtained
t1615
group policy discovery
null
group policy allows for centralized management of user and computer settings in active directory ad
t1615
group policy discovery
null
monitor for suspicious use of gpresult
t1615
group policy discovery
null
monitor for the use of powershell functions such as get domain gpo and get domain local group and processes spawning with command line arguments containing gpolocalgroup
t1615
group policy discovery
null
network traffic network traffic content active directory active directory object access script script execution command command execution process process creation
t1615
group policy discovery
null
or for abnormal ldap queries with filters for group policy container and high volumes of ldap traffic to domain controllers
t1615
group policy discovery
null
system and network discovery techniques normally occur throughout an operation as an adversary learns the environment
t1615
group policy discovery
null
windows event id 4661 can also be used to detect when a directory service has been accessed
t1619
cloud storage object discovery
null
adversaries may enumerate objects in cloud storage infrastructure
t1619
cloud storage object discovery
null
adversaries may use this information during automated discovery to shape follow on behaviors including requesting all or specific objects from cloud storage
t1619
cloud storage object discovery
null
cloud storage cloud storage enumeration cloud storage cloud storage access
t1619
cloud storage object discovery
null
data and events should not be viewed in isolation but as part of a chain of behavior that could lead to other activities such as collection and exfiltration based on the information obtained
t1619
cloud storage object discovery
null
monitor cloud logs for api calls used for file or object enumeration for unusual activity
t1619
cloud storage object discovery
null
system and network discovery techniques normally occur throughout an operation as an adversary learns the environment
t1620
reflective code loading
null
adversaries may reflectively load code into a process in order to conceal the execution of malicious payloads
t1620
reflective code loading
null
citation 00sec dropperscitation s1 old rat new tricks monitor for artifacts of abnormal process execution
t1620
reflective code loading
null
citation mdsec detecting dotnetcitation introducing donut analyze process behavior to determine if a process is performing actions it usually does not such as opening network connections reading files or other suspicious actions that could relate to post compromise behavior
t1620
reflective code loading
null
dll loading into abnormal processes such as notepad
t1620
reflective code loading
null
dll and clr
t1620
reflective code loading
null
dll mscoree
t1620
reflective code loading
null
exe
t1620
reflective code loading
null
for example a common signature related to reflective code loading on windows is mechanisms related to the
t1620
reflective code loading
null
load and native apit1106 functions such as createthread memfd_create exe cve andor execveat
t1620
reflective code loading
null
monitor for code artifacts associated with reflectively loading code such as the abuse of
t1620
reflective code loading
null
net common language runtime clr such as mscor
t1620
reflective code loading
null
net functions such as assembly
t1620
reflective code loading
null
reflective loading involves allocating then executing payloads directly within the memory of the process vice creating a thread or process backed by a file path on disk
t1620
reflective code loading
Technique
script script execution process os api execution module module load
t1620
reflective code loading
Technique
similarly amsi etw traces can be used to identify signs of arbitrary code execution from within the memory of potentially compromised processes