id stringlengths 13 15 | text stringlengths 96 2.14k | source stringlengths 6 21 |
|---|---|---|
52406e558db5-0 | POLONIUM - G1005
Created: 2022-07-01T19:07:04.253Z
Modified: 2022-08-10T12:31:10.192Z
Contributors:
Aliases
POLONIUM
Description
POLONIUM is a Lebanon-based group that has primarily targeted Israeli organizations, including critical manufacturing, information technology, and defense industry companies, since at ... | POLONIUM.md |
52406e558db5-1 | POLONIUM has used compromised credentials from an IT company to target downstream customers including a law firm and aviation company.(Citation: Microsoft POLONIUM June 2022)|
|mitre-attack|enterprise-attack|PRE|T1583.006|Web Services|
POLONIUM has created and used legitimate Microsoft OneDrive accounts for their oper... | POLONIUM.md |
ca13bced986c-0 | Poseidon Group - G0033
Created: 2017-05-31T21:32:04.179Z
Modified: 2020-03-18T20:25:54.945Z
Contributors:
Aliases
Poseidon Group
Description
Poseidon Group is a Portuguese-speaking threat group that has been active since at least 2005. The group has a history of using information exfiltrated from victims to blac... | Poseidon_Group.md |
ca13bced986c-1 | Poseidon Group lists all running processes.(Citation: Kaspersky Poseidon Group)|
|mitre-attack|enterprise-attack|Windows,IaaS,Linux,macOS,Network|T1049|System Network Connections Discovery|
Poseidon Group obtains and saves information about victim network interfaces and addresses.(Citation: Kaspersky Poseidon Group)|
... | Poseidon_Group.md |
79f6c51c8a1f-0 | PROMETHIUM - G0056
Created: 2018-01-16T16:13:52.465Z
Modified: 2020-10-22T18:12:48.893Z
Contributors:
Aliases
PROMETHIUM,StrongPity
Description
PROMETHIUM is an activity group focused on espionage that has been active since at least 2012. The group has conducted operations globally with a heavy emphasis on Turki... | PROMETHIUM.md |
79f6c51c8a1f-1 | PROMETHIUM has used a script that configures the knockd service and firewall to only accept C2 connections from systems that use a specified sequence of knock ports.(Citation: Bitdefender StrongPity June 2020)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.002|Malicious File|
PROMETHIUM has attempted to ge... | PROMETHIUM.md |
ac03e0477f6f-0 | Putter Panda - G0024
Created: 2017-05-31T21:31:56.785Z
Modified: 2020-03-30T19:15:04.771Z
Contributors:
Aliases
Putter Panda,APT2,MSUpdater
Description
Putter Panda is a Chinese threat group that has been attributed to Unit 61486 of the 12th Bureau of the PLA’s 3rd General Staff Department (GSD). (Citation: Crow... | Putter_Panda.md |
db88265285ed-0 | Rancor - G0075
Created: 2018-10-17T00:14:20.652Z
Modified: 2020-03-30T19:15:49.217Z
Contributors:
Aliases
Rancor
Description
Rancor is a threat group that has led targeted campaigns against the South East Asia region. Rancor uses politically-motivated lures to entice victims to open malicious documents. (Citatio... | Rancor.md |
6d95b3f93fe7-0 | Rocke - G0106
Created: 2020-05-26T14:20:20.623Z
Modified: 2020-06-19T20:41:21.215Z
Contributors:
Aliases
Rocke
Description
Rocke is an alleged Chinese-speaking adversary whose primary objective appeared to be cryptojacking, or stealing victim system resources for the purposes of mining cryptocurrency. The name R... | Rocke.md |
6d95b3f93fe7-1 | Rocke has modified /etc/ld.so.preload to hook libc functions in order to hide the installed dropper and mining software in process lists.(Citation: Anomali Rocke March 2019) |
|mitre-attack|enterprise-attack|Linux,Windows,macOS|T1059.006|Python|
Rocke has used Python-based malware to install and spread their coinmin... | Rocke.md |
6d95b3f93fe7-2 | Rocke has distributed cryptomining malware.(Citation: Talos Rocke August 2018)(Citation: Unit 42 Rocke January 2019)|
|mitre-attack|enterprise-attack|Windows,IaaS,Network,Linux,macOS,Containers|T1190|Exploit Public-Facing Application|
Rocke exploited Apache Struts, Oracle WebLogic (CVE-2017-10271), and Adobe ColdFusio... | Rocke.md |
6d95b3f93fe7-3 | Rocke used scripts which killed processes and added firewall rules to block traffic related to other cryptominers.(Citation: Talos Rocke August 2018) |
|mitre-attack|enterprise-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace|T1518.001|Security Software Discovery|
Rocke used scripts which det... | Rocke.md |
6d95b3f93fe7-4 | Rocke's miner has created UPX-packed files in the Windows Start Menu Folder.(Citation: Talos Rocke August 2018)(Citation: Unit 42 Rocke January 2019)(Citation: Anomali Rocke March 2019)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows|T1102.001|Dead Drop Resolver|
Rocke has used Pastebin to check the version of be... | Rocke.md |
6d95b3f93fe7-5 | Rocke's miner connects to a C2 server using port 51640.(Citation: Anomali Rocke March 2019) | | Rocke.md |
cf83ab8fff12-0 | RTM - G0048
Created: 2017-05-31T21:32:10.206Z
Modified: 2020-05-12T22:16:44.650Z
Contributors: Oleg Skulkin, Group-IB
Aliases
RTM
Description
RTM is a cybercriminal group that has been active since at least 2015 and is primarily interested in users of remote banking systems in Russia and neighboring countries. T... | RTM.md |
00893c406753-0 | Sandworm Team - G0034
Created: 2017-05-31T21:32:04.588Z
Modified: 2023-03-08T22:12:31.238Z
Contributors: Dragos Threat Intelligence
Aliases
Sandworm Team,ELECTRUM,Telebots,IRON VIKING,BlackEnergy (Group),Quedagh,Voodoo Bear,IRIDIUM
Description
Sandworm Team is a destructive threat group that has been attributed ... | Sandworm_Team.md |
00893c406753-1 | Sandworm Team has used ROT13 encoding, AES encryption and compression with the zlib library for their Python-based backdoor.(Citation: ESET Telebots Dec 2016)|
|mitre-attack|enterprise-attack,ics-attack,mobile-attack|Windows|T1003.003|NTDS|
Sandworm Team has used
Sandworm Team has used
Prestige ransomware to encrypt... | Sandworm_Team.md |
00893c406753-2 | Sandworm Team has used webshells including
P.A.S. Webshell to maintain access to victim networks.(Citation: ANSSI Sandworm January 2021)|
|mitre-attack|enterprise-attack,ics-attack,mobile-attack|PRE|T1589.002|Email Addresses|
Sandworm Team has obtained valid emails addresses while conducting research against target o... | Sandworm_Team.md |
00893c406753-3 | Sandworm Team researched Ukraine's unique legal entity identifier (called an "EDRPOU" number), including running queries on the EDRPOU website, in preparation for the
NotPetya attack.
Sandworm Team has also researched third-party websites to help it craft credible spearphishing emails.(Citation: US District Court Ind... | Sandworm_Team.md |
00893c406753-4 | Sandworm Team has scanned network infrastructure for vulnerabilities as part of its operational planning.(Citation: US District Court Indictment GRU Unit 74455 October 2020)|
|mitre-attack|enterprise-attack,ics-attack,mobile-attack|PRE|T1588.006|Vulnerabilities|In 2017,
Sandworm Team conducted technical research relat... | Sandworm_Team.md |
00893c406753-5 | Sandworm Team has used stolen credentials to access administrative accounts within the domain.(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: Microsoft Prestige ransomware October 2022)|
|mitre-attack|enterprise-attack,ics-attack,mobile-attack|PRE|T1594|Search Victim-Owned Websites|
Sand... | Sandworm_Team.md |
00893c406753-6 | Sandworm Team has registered domain names and created URLs that are often designed to mimic or spoof legitimate websites, such as email login pages, online file sharing and storage websites, and password reset pages.(Citation: US District Court Indictment GRU Unit 74455 October 2020)|
|mitre-attack|enterprise-attack,ic... | Sandworm_Team.md |
00893c406753-7 | Sandworm Team has developed malware for its operations, including malicious mobile applications and destructive malware such as
NotPetya and
Olympic Destroyer.(Citation: US District Court Indictment GRU Unit 74455 October 2020)|
|mitre-attack|enterprise-attack,ics-attack,mobile-attack|Linux,macOS,Windows,Network|T101... | Sandworm_Team.md |
00893c406753-8 | Sandworm Team has distributed
NotPetya by compromising the legitimate Ukrainian accounting software M.E.Doc and replacing a legitimate software update with a malicious one.(Citation: Secureworks NotPetya June 2017)(Citation: ESET Telebots June 2017)(Citation: US District Court Indictment GRU Unit 74455 October 2020)|
... | Sandworm_Team.md |
00893c406753-9 | Sandworm Team have used previously acquired legitimate credentials prior to attacks.(Citation: US-CERT Ukraine Feb 2016)|
|mitre-attack|enterprise-attack,ics-attack,mobile-attack|Linux,macOS,Windows,Network|T1561.002|Disk Structure Wipe|
Sandworm Team has used the
BlackEnergy KillDisk component to corrupt the infecte... | Sandworm_Team.md |
00893c406753-10 | Sandworm Team has used the Telegram Bot API from Telegram Messenger to send and receive commands to its Python backdoor.
Sandworm Team also used legitimate M.E.Doc software update check requests for sending and receiving commands and hosted malicious payloads on putdrive.com.(Citation: ESET Telebots Dec 2016)(Citation... | Sandworm_Team.md |
00893c406753-11 | Sandworm Team has used intercepter-NG to sniff passwords in network traffic.(Citation: ESET Telebots Dec 2016) |
|mitre-attack|enterprise-attack,ics-attack,mobile-attack|Linux,macOS,Windows|T1087.002|Domain Account|
Sandworm Team has used a tool to query Active Directory using LDAP, discovering information about us... | Sandworm_Team.md |
00893c406753-12 | Sandworm Team's BCS-server tool can create an internal proxy server to redirect traffic from the adversary-controlled C2 to internal servers which may not be connected to the internet, but are interconnected locally.(Citation: ESET Telebots Dec 2016) |
|mitre-attack|enterprise-attack,ics-attack,mobile-attack|Linux,m... | Sandworm_Team.md |
00893c406753-13 | Sandworm Team used the credentials of valid accounts to interact with client applications and access employee workstations hosting HMI applications. (Citation: Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems March 2016)(Citation: Dragos)|
|mitre-attack|enterprise-attack,ics-attack,m... | Sandworm_Team.md |
00893c406753-14 | Sandworm Team harvested VPN worker credentials and used them to remotely log into control system networks. (Citation: Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems March 2016) (Citation: Zetter, Kim March 2016) (Citation: ICS-CERT February 2016) (Citation: John Hultquist January 2... | Sandworm_Team.md |
00893c406753-15 | Sandworm Team blocked command messages by using malicious firmware to render communication devices inoperable. (Citation: Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems March 2016)|
|mitre-attack|enterprise-attack,ics-attack,mobile-attack|Human-Machine Interface|T0823|Graphical Use... | Sandworm_Team.md |
6791d261d991-0 | Scarlet Mimic - G0029
Created: 2017-05-31T21:32:00.677Z
Modified: 2020-03-30T19:16:53.144Z
Contributors:
Aliases
Scarlet Mimic
Description
Scarlet Mimic is a threat group that has targeted minority rights activists. This group has not been directly linked to a government source, but the group's motivations appea... | Scarlet_Mimic.md |
d07437e8c8b5-0 | SideCopy - G1008
Created: 2022-08-07T13:52:07.791Z
Modified: 2022-10-24T18:51:09.213Z
Contributors: Pooja Natarajan, NEC Corporation India,Hiroki Nagahama, NEC Corporation,Manikantan Srinivasan, NEC Corporation India
Aliases
SideCopy
Description
SideCopy is a Pakistani threat group that has primarily targeted So... | SideCopy.md |
d07437e8c8b5-1 | SideCopy has identified the country location of a compromised host.(Citation: MalwareBytes SideCopy Dec 2021)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1016|System Network Configuration Discovery|
SideCopy has identified the IP address of a compromised host.(Citation: MalwareBytes SideCopy Dec 2021... | SideCopy.md |
dd56eec78157-0 | Sidewinder - G0121
Created: 2021-01-27T15:57:11.183Z
Modified: 2023-03-22T05:31:54.382Z
Contributors: Lacework Labs,Daniyal Naeem, BT Security
Aliases
Sidewinder,T-APT-04,Rattlesnake
Description
Sidewinder is a suspected Indian threat actor group that has been active since at least 2012. They have been observed ... | Sidewinder.md |
dd56eec78157-1 | Sidewinder has used
Sidewinder has lured targets to click on malicious files to gain execution in the target environment.(Citation: ATT Sidewinder January 2021)(Citation: Rewterz Sidewinder APT April 2020)(Citation: Rewterz Sidewinder COVID-19 June 2020)(Citation: Cyble Sidewinder September 2020)|
|mitre-attack|enterp... | Sidewinder.md |
dd56eec78157-2 | Sidewinder has used malware to collect information on files and directories.(Citation: ATT Sidewinder January 2021)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows|T1074.001|Local Data Staging|
Sidewinder has collected stolen files in a temporary folder in preparation for exfiltration.(Citation: ATT Sidewinder Ja... | Sidewinder.md |
dd56eec78157-3 | Sidewinder has used base64 encoding and ECDH-P256 encryption for payloads.(Citation: ATT Sidewinder January 2021)(Citation: Rewterz Sidewinder APT April 2020)(Citation: Cyble Sidewinder September 2020)|
|mitre-attack|enterprise-attack|Windows|T1574.002|DLL Side-Loading|
Sidewinder has used DLL side-loading to drop and... | Sidewinder.md |
dd56eec78157-4 | Sidewinder has sent e-mails with malicious attachments often crafted for specific targets.(Citation: ATT Sidewinder January 2021)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows,Office 365,SaaS,Google Workspace|T1566.002|Spearphishing Link|
Sidewinder has sent e-mails with malicious links often crafted for specif... | Sidewinder.md |
268466a68244-0 | Silence - G0091
Created: 2019-05-24T17:57:36.491Z
Modified: 2023-03-22T05:34:46.346Z
Contributors: Oleg Skulkin, Group-IB
Aliases
Silence,Whisper Spider
Description
Silence is a financially motivated threat actor targeting financial institutions in different countries. The group was first seen in June 2016. Thei... | Silence.md |
268466a68244-1 | Silence has used
Silence has downloaded additional modules and malware to victim’s machines.(Citation: Group IB Silence Sept 2018) |
|mitre-attack|enterprise-attack|Windows|T1021.001|Remote Desktop Protocol|
Silence has used RDP for lateral movement.(Citation: Group IB Silence Sept 2018) |
|mitre-attack|enterprise-a... | Silence.md |
268466a68244-2 | Silence has used PowerShell to download and execute payloads.(Citation: Cyber Forensicator Silence Jan 2019)(Citation: Group IB Silence Sept 2018)|
|mitre-attack|enterprise-attack|Windows,macOS,Linux|T1059.007|JavaScript|
Silence has used JS scripts.(Citation: Cyber Forensicator Silence Jan 2019)|
|mitre-attack|enterp... | Silence.md |
268466a68244-3 | Silence has weaponized CHM files in their phishing campaigns.(Citation: Cyber Forensicator Silence Jan 2019)(Citation: SecureList Silence Nov 2017)(Citation: Group IB Silence Aug 2019)(Citation: Group IB Silence Sept 2018)|
|mitre-attack|enterprise-attack|Windows,macOS,Linux|T1106|Native API|
Silence has leveraged the... | Silence.md |
44fd44c06e27-0 | Silent Librarian - G0122
Created: 2021-02-03T16:36:38.145Z
Modified: 2021-04-21T12:02:00.278Z
Contributors:
Aliases
Silent Librarian,TA407,COBALT DICKENS
Description
Silent Librarian is a group that has targeted research and proprietary data at universities, government agencies, and private sector companies worl... | Silent_Librarian.md |
44fd44c06e27-1 | Silent Librarian has established e-mail accounts to receive e-mails forwarded from compromised accounts.(Citation: DOJ Iran Indictments March 2018)|
|mitre-attack|enterprise-attack|Windows,Office 365,Google Workspace,macOS,Linux|T1114|Email Collection|
Silent Librarian has exfiltrated entire mailboxes from compromised... | Silent_Librarian.md |
44fd44c06e27-2 | Silent Librarian has used compromised credentials to obtain unauthorized access to online accounts.(Citation: DOJ Iran Indictments March 2018)|
|mitre-attack|enterprise-attack|PRE|T1583.001|Domains|
Silent Librarian has acquired domains to establish credential harvesting pages, often spoofing the target organization a... | Silent_Librarian.md |
15d79cb68f84-0 | SilverTerrier - G0083
Created: 2019-01-29T21:36:59.793Z
Modified: 2020-05-19T23:26:11.780Z
Contributors:
Aliases
SilverTerrier
Description
SilverTerrier is a Nigerian threat group that has been seen active since 2014. SilverTerrier mainly targets organizations in high technology, higher education, and manufactur... | SilverTerrier.md |
21ffa2192adb-0 | Sowbug - G0054
Created: 2018-01-16T16:13:52.465Z
Modified: 2020-03-30T02:46:16.483Z
Contributors: Alan Neville, @abnev
Aliases
Sowbug
Description
Sowbug is a threat group that has conducted targeted attacks against organizations in South America and Southeast Asia, particularly government entities, since at leas... | Sowbug.md |
21ffa2192adb-1 | Sowbug identified and extracted all Word documents on a server by using a command containing * .doc and *.docx. The actors also searched for documents based on a specific date range and attempted to identify all installed software on a victim.(Citation: Symantec Sowbug Nov 2017)|
|mitre-attack|enterprise-attack|Windows... | Sowbug.md |
e4bac029abb1-0 | Stealth Falcon - G0038
Created: 2017-05-31T21:32:06.390Z
Modified: 2020-11-23T18:57:19.208Z
Contributors:
Aliases
Stealth Falcon
Description
Stealth Falcon is a threat group that has conducted targeted spyware attacks against Emirati journalists, activists, and dissidents since at least 2012. Circumstantial evid... | Stealth_Falcon.md |
e4bac029abb1-1 | Stealth Falcon malware uses WMI to script data collection and command execution on the victim.(Citation: Citizen Lab Stealth Falcon May 2016)|
|mitre-attack|enterprise-attack|Linux,Windows,macOS|T1573.001|Symmetric Cryptography|
Stealth Falcon malware encrypts C2 traffic using RC4 with a hard-coded key.(Citation: Citi... | Stealth_Falcon.md |
e4bac029abb1-2 | Stealth Falcon malware gathers the Address Resolution Protocol (ARP) table from the victim.(Citation: Citizen Lab Stealth Falcon May 2016)|
|mitre-attack|enterprise-attack|Windows|T1012|Query Registry|
Stealth Falcon malware attempts to determine the installed version of .NET by querying the Registry.(Citation: Citize... | Stealth_Falcon.md |
f0abe6683af5-0 | Strider - G0041
Created: 2017-05-31T21:32:07.541Z
Modified: 2020-06-29T01:43:19.374Z
Contributors:
Aliases
Strider,ProjectSauron
Description
Strider is a threat group that has been active since at least 2011 and has targeted victims in Russia, China, Sweden, Belgium, Iran, and Rwanda.(Citation: Symantec Strider ... | Strider.md |
da43b7645314-0 | Suckfly - G0039
Created: 2017-05-31T21:32:06.777Z
Modified: 2022-04-15T16:27:38.682Z
Contributors:
Aliases
Suckfly
Description
Suckfly is a China-based threat group that has been active since at least 2014. (Citation: Symantec Suckfly March 2016)
Techniques Used
|Matrix|Domain|Platform|Technique ID|Technique N... | Suckfly.md |
01a8cd266e99-0 | TA459 - G0062
Created: 2018-04-18T17:59:24.739Z
Modified: 2020-03-30T19:22:32.962Z
Contributors: Valerii Marchuk, Cybersecurity Help s.r.o.
Aliases
TA459
Description
TA459 is a threat group believed to operate out of China that has targeted countries including Russia, Belarus, Mongolia, and others. (Citation: Pr... | TA459.md |
416317a7678d-0 | TA505 - G0092
Created: 2019-05-28T15:54:17.213Z
Modified: 2023-03-22T05:38:20.381Z
Contributors:
Aliases
TA505,Hive0065
Description
TA505 is a cyber criminal group that has been active since at least 2014. TA505 is known for frequently changing malware, driving global trends in criminal malware distribution, and... | TA505.md |
416317a7678d-1 | TA505 has used a variety of tools in their operations, including
AdFind,
BloodHound,
Mimikatz, and
PowerSploit.(Citation: NCC Group TA505)|
|mitre-attack|enterprise-attack|Windows,Linux,macOS|T1140|Deobfuscate/Decode Files or Information|
TA505 has decrypted packed DLLs with an XOR key.(Citation: NCC Group TA505)|... | TA505.md |
416317a7678d-2 | TA505 has used TinyMet to enumerate members of privileged groups.(Citation: IBM TA505 April 2020)
TA505 has also run
TA505 has used the tool EmailStealer to steal and send lists of e-mail addresses to a remote server.(Citation: Trend Micro TA505 June 2019)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows|T1568.00... | TA505.md |
416317a7678d-3 | TA505 has downloaded additional malware to execute on victim systems.(Citation: Cybereason TA505 April 2019)(Citation: Deep Instinct TA505 Apr 2019)(Citation: ProofPoint SettingContent-ms July 2018)|
|mitre-attack|enterprise-attack|macOS,Windows|T1553.002|Code Signing|
TA505 has signed payloads with code signing certi... | TA505.md |
416317a7678d-4 | TA505 has used a wide variety of ransomware, such as
Clop, Locky, Jaff, Bart, Philadelphia, and GlobeImposter, to encrypt victim files and demand a ransom payment.(Citation: Proofpoint TA505 Sep 2017)|
|mitre-attack|enterprise-attack|Windows,macOS,Linux|T1059.005|Visual Basic|
TA505 has used VBS for code execution.(C... | TA505.md |
416317a7678d-5 | TA505 has used spearphishing emails with malicious attachments to initially compromise victims.(Citation: Proofpoint TA505 Sep 2017)(Citation: Proofpoint TA505 June 2018)(Citation: Proofpoint TA505 Jan 2019)(Citation: Cybereason TA505 April 2019)(Citation: ProofPoint SettingContent-ms July 2018)(Citation: Proofpoint TA... | TA505.md |
9baaa52dbb8b-0 | TA551 - G0127
Created: 2021-03-19T21:04:00.692Z
Modified: 2023-03-22T05:40:21.255Z
Contributors: Shuhei Sasada, Cyber Defense Institute, Inc,Ryo Tamura, SecureBrain Corporation,Shotaro Hamamoto, NEC Solution Innovators, Ltd,Yusuke Niwa, ITOCHU Corporation,Takuma Matsumoto, LAC Co., Ltd
Aliases
TA551,GOLD CABIN,Sha... | TA551.md |
9baaa52dbb8b-1 | TA551 has used spoofed company emails that were acquired from email clients on previously infected hosts to target other individuals.(Citation: Unit 42 TA551 Jan 2021)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows|T1105|Ingress Tool Transfer|
TA551 has retrieved DLLs and installer binaries for malware execution... | TA551.md |
cbfb93d0d9a2-0 | TeamTNT - G0139
Created: 2021-10-01T01:57:31.229Z
Modified: 2022-10-19T21:35:03.147Z
Contributors: Will Thomas, Cyjax,Darin Smith, Cisco
Aliases
TeamTNT
Description
TeamTNT is a threat group that has primarily targeted cloud and containerized environments. The group as been active since at least October 2019 and... | TeamTNT.md |
cbfb93d0d9a2-1 | TeamTNT has aggregated collected credentials in text files before exfiltrating.(Citation: Cisco Talos Intelligence Group)|
|mitre-attack|enterprise-attack|Windows,macOS,Linux|T1007|System Service Discovery|
TeamTNT has searched for services such as Alibaba Cloud Security's aliyun service and BMC Helix Cloud Security's... | TeamTNT.md |
cbfb93d0d9a2-2 | TeamTNT executed
Hildegard through the kubelet API run command and by executing commands on running containers.(Citation: Unit 42 Hildegard Malware)|
|mitre-attack|enterprise-attack|Windows,Linux,Containers,macOS|T1133|External Remote Services|
TeamTNT has used open-source tools such as Weave Scope to target exposed ... | TeamTNT.md |
cbfb93d0d9a2-3 | TeamTNT has used masscan to search for open Docker API ports and Kubernetes clusters.(Citation: Cado Security TeamTNT Worm August 2020)(Citation: Unit 42 Hildegard Malware)(Citation: Cisco Talos Intelligence Group)
TeamTNT has also used malware that utilizes zmap and zgrab to search for vulnerable services in cloud en... | TeamTNT.md |
cbfb93d0d9a2-4 | TeamTNT has the
TeamTNT has also used a custom user agent HTTP header in shell scripts.(Citation: Trend Micro TeamTNT)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1070.003|Clear Command History|
TeamTNT has cleared command history with
TeamTNT has run
TeamTNT has also used
TeamTNT has checked for... | TeamTNT.md |
cbfb93d0d9a2-5 | TeamTNT has modified the permissions on binaries with
TeamTNT has enumerated the host machine’s IP address.(Citation: Trend Micro TeamTNT)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows|T1014|Rootkit|
TeamTNT has used rootkits such as the open-source Diamorphine rootkit and their custom bots to hide cryptocurre... | TeamTNT.md |
cbfb93d0d9a2-6 | TeamTNT has added batch scripts to the startup folder.(Citation: ATT TeamTNT Chimaera September 2020)|
|mitre-attack|enterprise-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace|T1518.001|Security Software Discovery|
TeamTNT has searched for security products on infected machines.(Citation: ATT... | TeamTNT.md |
f96cd771d592-0 | TEMP.Veles - G0088
Created: 2019-04-16T15:14:38.533Z
Modified: 2022-11-30T22:46:40.135Z
Contributors: Dragos Threat Intelligence
Aliases
TEMP.Veles,XENOTIME
Description
TEMP.Veles is a Russia-based threat group that has targeted critical infrastructure. The group has been observed utilizing TRITON, a malware f... | TEMP.Veles.md |
f96cd771d592-1 | TEMP.Veles has used a publicly-available PowerShell-based tool, WMImplant.(Citation: FireEye TEMP.Veles 2018) The group has also used PowerShell to perform
Timestomping.(Citation: FireEye TRITON 2019)|
|mitre-attack|enterprise-attack,ics-attack|Linux,Windows,macOS,Network|T1505.003|Web Shell|
TEMP.Veles has planted W... | TEMP.Veles.md |
f96cd771d592-2 | TEMP.Veles routinely deleted tools, logs, and other files after they were finished with them.(Citation: FireEye TRITON 2019)|
|mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1070.006|Timestomp|
TEMP.Veles used timestomping to modify the $STANDARD_INFORMATION attribute on tools.(Citation: FireEye TRITON... | TEMP.Veles.md |
f96cd771d592-3 | TEMP.Veles targeted several ICS vendors and manufacturers. (Citation: Dragos Threat Intelligence August 2019)|
|mitre-attack|enterprise-attack,ics-attack|Control Server,Data Historian,Engineering Workstation,Field Controller/RTU/PLC/IED,Human-Machine Interface,Input/Output Server,Safety Instrumented System/Protection R... | TEMP.Veles.md |
f7ce2087f3c9-0 | The White Company - G0089
Created: 2019-05-02T00:08:18.314Z
Modified: 2020-03-30T19:24:52.290Z
Contributors:
Aliases
The White Company
Description
The White Company is a likely state-sponsored threat actor with advanced capabilities. From 2017 through 2018, the group led an espionage campaign called Operation Sh... | The_White_Company.md |
f7ce2087f3c9-1 | The White Company has checked for specific antivirus products on the target’s computer, including Kaspersky, Quick Heal, AVG, BitDefender, Avira, Sophos, Avast!, and ESET.(Citation: Cylance Shaheen Nov 2018)|
|mitre-attack|enterprise-attack|Windows,Network|T1124|System Time Discovery|
The White Company has checked the... | The_White_Company.md |
45d83e496ce4-0 | Threat Group-1314 - G0028
Created: 2017-05-31T21:31:59.120Z
Modified: 2020-03-19T21:58:20.831Z
Contributors:
Aliases
Threat Group-1314,TG-1314
Description
Threat Group-1314 is an unattributed threat group that has used compromised credentials to log into a victim's remote access infrastructure. (Citation: Dell T... | Threat_Group-1314.md |
3505384b1d08-0 | Threat Group-3390 - G0027
Created: 2017-05-31T21:31:58.518Z
Modified: 2023-03-29T16:53:17.235Z
Contributors: Daniyal Naeem, BT Security,Kyaw Pyiyt Htet, @KyawPyiytHtet
Aliases
Threat Group-3390,Earth Smilodon,TG-3390,Emissary Panda,BRONZE UNION,APT27,Iron Tiger,LuckyMouse
Description
Threat Group-3390 is a Chine... | Threat_Group-3390.md |
3505384b1d08-1 | Threat Group-3390 has used
Threat Group-3390 has packed malware and tools, including using VMProtect.(Citation: Trend Micro DRBControl February 2020)(Citation: Trend Micro Iron Tiger April 2021)|
|mitre-attack|enterprise-attack|PRE|T1608.001|Upload Malware|
Threat Group-3390 has hosted malicious payloads on Dropbox.(... | Threat_Group-3390.md |
3505384b1d08-2 | Threat Group-3390 has obtained and used tools such as
Impacket,
pwdump,
Mimikatz,
gsecdump,
NBTscan, and
Windows Credential Editor.(Citation: Unit42 Emissary Panda May 2019)(Citation: Dell TG-3390)|
|mitre-attack|enterprise-attack|PRE|T1608.002|Upload Tool|
Threat Group-3390 has staged tools, including
gsecdump... | Threat_Group-3390.md |
3505384b1d08-3 | Threat Group-3390 has exploited CVE-2018-0798 in Equation Editor.(Citation: Trend Micro Iron Tiger April 2021)|
|mitre-attack|enterprise-attack|Linux,Windows,macOS|T1210|Exploitation of Remote Services|
Threat Group-3390 has exploited MS17-010 to move laterally to other systems on the network.(Citation: Unit42 Emissar... | Threat_Group-3390.md |
3505384b1d08-4 | Threat Group-3390 tool has created new Registry keys under
Threat Group-3390 malware deobfuscates and decompresses code that was encoded with Metasploit’s shikata_ga_nai encoder as well as compressed with LZNT1 compression.(Citation: Securelist LuckyMouse June 2018)|
|mitre-attack|enterprise-attack|Windows,Linux,macOS... | Threat_Group-3390.md |
3505384b1d08-5 | Threat Group-3390 has used CVE-2014-6324 and CVE-2017-0213 to escalate privileges.(Citation: SecureWorks BRONZE UNION June 2017)(Citation: Profero APT27 December 2020)|
|mitre-attack|enterprise-attack|Windows|T1059.003|Windows Command Shell|
Threat Group-3390 has used command-line interfaces for execution.(Citation: S... | Threat_Group-3390.md |
3505384b1d08-6 | Threat Group-3390 actors look for and use VPN profiles during an operation to access the network using external VPN services.(Citation: Dell TG-3390)
Threat Group-3390 has also obtained OWA account credentials during intrusions that it subsequently used to attempt to regain access when evicted from a victim network.(C... | Threat_Group-3390.md |
3505384b1d08-7 | Threat Group-3390 has downloaded additional malware and tools, including through the use of
Threat Group-3390 actors use the Hunter tool to conduct network service discovery for vulnerable systems.(Citation: Dell TG-3390)(Citation: Unit42 Emissary Panda May 2019)|
|mitre-attack|enterprise-attack|Windows|T1003.004|LSA ... | Threat_Group-3390.md |
9646df93f378-0 | Thrip - G0076
Created: 2018-10-17T00:14:20.652Z
Modified: 2021-10-12T20:13:42.274Z
Contributors:
Aliases
Thrip
Description
Thrip is an espionage group that has targeted satellite communications, telecoms, and defense contractor companies in the U.S. and Southeast Asia. The group uses custom malware as well as "l... | Thrip.md |
9c86e2818661-0 | Tonto Team - G0131
Created: 2021-05-05T17:18:25.987Z
Modified: 2022-01-27T17:51:41.433Z
Contributors:
Aliases
Tonto Team,Earth Akhlut,BRONZE HUNTLEY,CactusPete,Karma Panda
Description
Tonto Team is a suspected Chinese state-sponsored cyber espionage threat group that has primarily targeted South Korea, Japan, Ta... | Tonto_Team.md |
9c86e2818661-1 | NBTscan to enumerate network shares.(Citation: TrendMicro Tonto Team October 2020)|
|mitre-attack|enterprise-attack|Windows,Linux,macOS|T1003|OS Credential Dumping|
Tonto Team has used a variety of credential dumping tools.(Citation: TrendMicro Tonto Team October 2020) |
|mitre-attack|enterprise-attack|Linux,Windows,m... | Tonto_Team.md |
9c86e2818661-2 | Tonto Team has delivered payloads via spearphishing attachments.(Citation: TrendMicro Tonto Team October 2020)|
|mitre-attack|enterprise-attack|Linux,Windows,macOS|T1203|Exploitation for Client Execution|
Tonto Team has exploited Microsoft vulnerabilities, including CVE-2018-0798, CVE-2018-8174, CVE-2018-0802, CVE-201... | Tonto_Team.md |
e08caf1f4de6-0 | Transparent Tribe - G0134
Created: 2021-09-02T15:14:33.738Z
Modified: 2022-09-22T20:27:21.053Z
Contributors: Manikantan Srinivasan, NEC Corporation India,Pooja Natarajan, NEC Corporation India,Hiroki Nagahama, NEC Corporation
Aliases
Transparent Tribe,COPPER FIELDSTONE,APT36,Mythic Leopard,ProjectM
Description
T... | Transparent_Tribe.md |
e08caf1f4de6-1 | Transparent Tribe can mimic legitimate Windows directories by using the same icons and names.(Citation: Kaspersky Transparent Tribe August 2020)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows|T1568|Dynamic Resolution|
Transparent Tribe has used dynamic DNS services to set up C2.(Citation: Proofpoint Operation Tr... | Transparent_Tribe.md |
e08caf1f4de6-2 | Transparent Tribe has used weaponized documents in e-mail to compromise targeted systems.(Citation: Proofpoint Operation Transparent Tribe March 2016)(Citation: Kaspersky Transparent Tribe August 2020)(Citation: Talos Oblique RAT March 2021)(Citation: Talos Transparent Tribe May 2021)(Citation: Unit 42 ProjectM March 2... | Transparent_Tribe.md |
17f30a764cdd-0 | Tropic Trooper - G0081
Created: 2019-01-29T20:17:48.717Z
Modified: 2021-04-26T14:15:15.610Z
Contributors: Edward Millington,Bart Parys
Aliases
Tropic Trooper,Pirate Panda,KeyBoy
Description
Tropic Trooper is an unaffiliated threat group that has led targeted campaigns against targets in Taiwan, the Philippines, ... | Tropic_Trooper.md |
17f30a764cdd-1 | Tropic Trooper has collected information automatically using the adversary's
USBferry attack.(Citation: TrendMicro Tropic Trooper May 2020) |
|mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1083|File and Directory Discovery|
Tropic Trooper has monitored files' modified time.(Citation: TrendMicro Tropi... | Tropic_Trooper.md |
17f30a764cdd-2 | Tropic Trooper's backdoor has communicated to the C2 over the DNS protocol.(Citation: TrendMicro Tropic Trooper May 2020) |
|mitre-attack|enterprise-attack|Linux,macOS,Windows|T1573|Encrypted Channel|
Tropic Trooper has encrypted traffic with the C2 to prevent network detection.(Citation: TrendMicro Tropic Trooper ... | Tropic_Trooper.md |
17f30a764cdd-3 | Tropic Trooper has created shortcuts in the Startup folder to establish persistence.(Citation: Anomali Pirate Panda April 2020)(Citation: TrendMicro Tropic Trooper May 2020)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows|T1071.001|Web Protocols|
Tropic Trooper has used HTTP in communication with the C2.(Citation... | Tropic_Trooper.md |
17f30a764cdd-4 | Tropic Trooper has injected a DLL backdoor into dllhost.exe and svchost.exe.(Citation: TrendMicro Tropic Trooper Mar 2018)(Citation: TrendMicro Tropic Trooper May 2020)|
|mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027|Obfuscated Files or Information|
Tropic Trooper has encrypted configuration files.(Citation... | Tropic_Trooper.md |
17f30a764cdd-5 | Tropic Trooper used shellcode with an XOR algorithm to decrypt a payload.
Tropic Trooper also decrypted image files which contained a payload.(Citation: Unit 42 Tropic Trooper Nov 2016)(Citation: TrendMicro Tropic Trooper May 2020)|
|mitre-attack|enterprise-attack|Windows|T1547.004|Winlogon Helper DLL|
Tropic Trooper... | Tropic_Trooper.md |
0ec9e27477c7-0 | Turla - G0010
Created: 2017-05-31T21:31:49.816Z
Modified: 2023-03-22T05:41:28.428Z
Contributors: Matthieu Faou, ESET,Edward Millington
Aliases
Turla,IRON HUNTER,Group 88,Belugasturgeon,Waterbug,WhiteBear,Snake,Krypton,Venomous Bear
Description
Turla is a Russian-based threat group that has infected victims in ov... | Turla.md |
0ec9e27477c7-1 | Mimikatz.(Citation: Symantec Waterbug Jun 2019)|
|mitre-attack|enterprise-attack|Windows,macOS,Linux|T1059.007|JavaScript|
Turla has used various JavaScript-based backdoors.(Citation: ESET Turla Mosquito Jan 2018) |
|mitre-attack|enterprise-attack|Windows,macOS|T1553.006|Code Signing Policy Modification|
Turla has... | Turla.md |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.