question
stringlengths
142
636
answer
stringclasses
529 values
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Drovorub can transfer files from the victim machine.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Dtrack can collect a variety of information from victim machines.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: EnvyScout can collect sensitive NTLM material from a compromised host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FLASHFLOOD searches for interesting files (either a default or customized set of file extensions) on the local system. FLASHFLOOD will scan the My Recent Documents, Desktop, Temporary Internet Files, and TEMP directories. FLASHFLOOD also collects information stored in the Windows Address Book.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FatDuke can copy files and directories from a compromised host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Flagpro can collect data from a compromised host, including Windows authentication information.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FlawedAmmyy has collected information and files from a compromised machine.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FoggyWeb can retrieve configuration data from a compromised AD FS server.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Forfiles can be used to act on (ex: copy, move, etc.) files/directories in a system during (ex: copy files into a staging area before).
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FrameworkPOS can collect elements related to credit card data from process memory.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: FunnyDream can upload files from victims' machines.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Gelsemium can collect data from a compromised host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Goopy has the ability to exfiltrate documents from infected systems.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GravityRAT steals files with the following extensions: .docx, .doc, .pptx, .ppt, .xlsx, .xls, .rtf, and .pdf.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Green Lambert can collect data from a compromised host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: GrimAgent can collect data and files from a compromised host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hikit can upload files from compromised machines.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Hydraq creates a backdoor through which remote attackers can read data from files.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: IceApple can collect files, passwords, and other data from a compromised host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: InvisiMole can collect data from the system, and can monitor changes in specified directories.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ixeshe can collect data from a local system.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KGH_SPY can send a file containing victim system information to C2.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KONNI has stored collected information and discovered processes in a tmp file.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: KOPILUWAK can gather information from compromised hosts.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kazuar uploads files from a specified directory to the C2 server.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Kevin can upload logs and other data from a compromised host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Koadic can download files off the target system to send back to the server.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LightNeuron can collect files from a local system.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Linfo creates a backdoor through which remote attackers can obtain data from local systems.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: LoFiSe can collect files of interest from targeted systems.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MCMD has the ability to upload files from an infected device.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MacMa can collect then exfiltrate files from the compromised system.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Machete searches the File system for files of interest.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mafalda can collect files and information from a compromised host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MarkiRAT can upload data from the victim's machine to the C2 server.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Milan can upload files from a compromised host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mis-Type has collected files and data from a compromised host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Misdat has collected files and data from a compromised host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: MobileOrder exfiltrates data collected from the victim mobile device.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Mongall has the ability to upload files from victim's machines.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Nebulae has the capability to upload collected files to C2.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Neoichor can upload files from a victim's machine.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: NightClub can use a file monitor to steal specific files from targeted systems.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OSX_OCEANLOTUS.D has the ability to upload files from a compromised host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Octopus can exfiltrate files from the system using a documents collector tool.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Out1 can copy files and Registry data from compromised hosts.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: OutSteel can collect information from a compromised host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: P.A.S. Webshell has the ability to copy files on a compromised host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: POWERSTATS can upload files from compromised hosts.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PUNCHTRACK scrapes memory for properly formatted payment card data.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pasam creates a backdoor through which remote attackers can retrieve files.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PcShare can collect files and information from a compromised host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pcexter can upload files from targeted systems.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Pillowmint has collected credit card data using native API functions.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PinchDuke collects user files from the compromised host based on predefined file extensions.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PingPull can collect data from a compromised host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PoisonIvy creates a backdoor through which remote attackers can steal system information.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerLess has the ability to exfiltrate data, including Chrome and Edge browser database files, from compromised machines.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: PowerSploit contains a collection of Exfiltration modules that can access data from local files, volumes, and processes.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Proxysvc searches the local system and gathers data.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QakBot can use a variety of commands, including esentutl.exe to steal sensitive data from Internet Explorer and Microsoft Edge, to acquire information that is subsequently exfiltrated.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuasarRAT can retrieve files from compromised client machines.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: QuietSieve can collect files from a compromised host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RAPIDPULSE retrieves files from the victim system via encrypted commands sent to the web shell.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RCSession can collect data from a compromised host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ROKRAT can collect host data and specific file types.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RainyDay can use a file exfiltration tool to collect recently changed files on a compromised host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ramsay can collect Microsoft Word documents from the target's file system, as well as <code>.txt</code>, <code>.doc</code>, and <code>.xls</code> files from the Internet Explorer cache.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: RawPOS dumps memory from specific processes on a victim system, parses the dumped files, and scrapes them for credit card data.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rising Sun has collected data and files from a compromised host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Rover searches for files on local drives based on a predefined list of file extensions.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SDBbot has the ability to access the file system on a compromised host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLIGHTPULSE can read files specified on the local system.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SLOTHFULMEDIA has uploaded files and information from victim machines.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: STARWHALE can collect data from an infected local host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SUNBURST collected information from a compromised host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SVCReady can collect data from an infected host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Saint Bot can collect files and information from a compromised host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Samurai can leverage an exfiltration module to download arbitrary files from compromised machines.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Sardonic has the ability to collect data from a compromised machine to deliver to the attacker.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Shark can upload files to its C2.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SharpDisco has dropped a recent-files stealer plugin to `C:\Users\Public\WinSrcNT\It11.exe`.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ShimRat has the capability to upload collected files to a C2.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SideTwist has the ability to upload files from a compromised host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SombRAT has collected data and files from a compromised host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SpicyOmelette has collected data and other information from a compromised host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: StrifeWater can collect data from a compromised host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: SysUpdate can collect information and files from a compromised host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Taidoor can upload data and files from a victim's machine.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TajMahal has the ability to steal documents from the local system including the print spooler queue.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: ThreatNeedle can collect data and files from a compromised host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TinyTurla can upload files from a compromised host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Tomiris has the ability to collect recent files matching a hardcoded list of extensions prior to exfiltration.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: TrickBot collects local files and information from the victim’s local machine.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: USBferry can collect information from an air-gapped host machine.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Uroburos can use its `Get` command to exfiltrate specified files from the compromised system.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: Ursnif has collected files from victim machines, including certificates and cookies.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WarzoneRAT can collect data from a compromised host.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WellMail can exfiltrate files from the victim machine.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection
Please help to identify the following description belonging to which technique in MITRE and the corresponding tactics: WellMess can send files from the victim machine to C2.
Tecnique: T1005 Data from Local System, Tactic: TA0009 Collection