id
stringlengths
13
15
text
stringlengths
96
2.14k
source
stringlengths
6
21
52406e558db5-0
POLONIUM - G1005 Created: 2022-07-01T19:07:04.253Z Modified: 2022-08-10T12:31:10.192Z Contributors: Aliases POLONIUM Description POLONIUM is a Lebanon-based group that has primarily targeted Israeli organizations, including critical manufacturing, information technology, and defense industry companies, since at ...
POLONIUM.md
52406e558db5-1
POLONIUM has used compromised credentials from an IT company to target downstream customers including a law firm and aviation company.(Citation: Microsoft POLONIUM June 2022)| |mitre-attack|enterprise-attack|PRE|T1583.006|Web Services| POLONIUM has created and used legitimate Microsoft OneDrive accounts for their oper...
POLONIUM.md
ca13bced986c-0
Poseidon Group - G0033 Created: 2017-05-31T21:32:04.179Z Modified: 2020-03-18T20:25:54.945Z Contributors: Aliases Poseidon Group Description Poseidon Group is a Portuguese-speaking threat group that has been active since at least 2005. The group has a history of using information exfiltrated from victims to blac...
Poseidon_Group.md
ca13bced986c-1
Poseidon Group lists all running processes.(Citation: Kaspersky Poseidon Group)| |mitre-attack|enterprise-attack|Windows,IaaS,Linux,macOS,Network|T1049|System Network Connections Discovery| Poseidon Group obtains and saves information about victim network interfaces and addresses.(Citation: Kaspersky Poseidon Group)| ...
Poseidon_Group.md
79f6c51c8a1f-0
PROMETHIUM - G0056 Created: 2018-01-16T16:13:52.465Z Modified: 2020-10-22T18:12:48.893Z Contributors: Aliases PROMETHIUM,StrongPity Description PROMETHIUM is an activity group focused on espionage that has been active since at least 2012. The group has conducted operations globally with a heavy emphasis on Turki...
PROMETHIUM.md
79f6c51c8a1f-1
PROMETHIUM has used a script that configures the knockd service and firewall to only accept C2 connections from systems that use a specified sequence of knock ports.(Citation: Bitdefender StrongPity June 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1204.002|Malicious File| PROMETHIUM has attempted to ge...
PROMETHIUM.md
ac03e0477f6f-0
Putter Panda - G0024 Created: 2017-05-31T21:31:56.785Z Modified: 2020-03-30T19:15:04.771Z Contributors: Aliases Putter Panda,APT2,MSUpdater Description Putter Panda is a Chinese threat group that has been attributed to Unit 61486 of the 12th Bureau of the PLA’s 3rd General Staff Department (GSD). (Citation: Crow...
Putter_Panda.md
db88265285ed-0
Rancor - G0075 Created: 2018-10-17T00:14:20.652Z Modified: 2020-03-30T19:15:49.217Z Contributors: Aliases Rancor Description Rancor is a threat group that has led targeted campaigns against the South East Asia region. Rancor uses politically-motivated lures to entice victims to open malicious documents. (Citatio...
Rancor.md
6d95b3f93fe7-0
Rocke - G0106 Created: 2020-05-26T14:20:20.623Z Modified: 2020-06-19T20:41:21.215Z Contributors: Aliases Rocke Description Rocke is an alleged Chinese-speaking adversary whose primary objective appeared to be cryptojacking, or stealing victim system resources for the purposes of mining cryptocurrency. The name R...
Rocke.md
6d95b3f93fe7-1
Rocke has modified /etc/ld.so.preload to hook libc functions in order to hide the installed dropper and mining software in process lists.(Citation: Anomali Rocke March 2019) | |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1059.006|Python| Rocke has used Python-based malware to install and spread their coinmin...
Rocke.md
6d95b3f93fe7-2
Rocke has distributed cryptomining malware.(Citation: Talos Rocke August 2018)(Citation: Unit 42 Rocke January 2019)| |mitre-attack|enterprise-attack|Windows,IaaS,Network,Linux,macOS,Containers|T1190|Exploit Public-Facing Application| Rocke exploited Apache Struts, Oracle WebLogic (CVE-2017-10271), and Adobe ColdFusio...
Rocke.md
6d95b3f93fe7-3
Rocke used scripts which killed processes and added firewall rules to block traffic related to other cryptominers.(Citation: Talos Rocke August 2018) | |mitre-attack|enterprise-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace|T1518.001|Security Software Discovery| Rocke used scripts which det...
Rocke.md
6d95b3f93fe7-4
Rocke's miner has created UPX-packed files in the Windows Start Menu Folder.(Citation: Talos Rocke August 2018)(Citation: Unit 42 Rocke January 2019)(Citation: Anomali Rocke March 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1102.001|Dead Drop Resolver| Rocke has used Pastebin to check the version of be...
Rocke.md
6d95b3f93fe7-5
Rocke's miner connects to a C2 server using port 51640.(Citation: Anomali Rocke March 2019) |
Rocke.md
cf83ab8fff12-0
RTM - G0048 Created: 2017-05-31T21:32:10.206Z Modified: 2020-05-12T22:16:44.650Z Contributors: Oleg Skulkin, Group-IB Aliases RTM Description RTM is a cybercriminal group that has been active since at least 2015 and is primarily interested in users of remote banking systems in Russia and neighboring countries. T...
RTM.md
00893c406753-0
Sandworm Team - G0034 Created: 2017-05-31T21:32:04.588Z Modified: 2023-03-08T22:12:31.238Z Contributors: Dragos Threat Intelligence Aliases Sandworm Team,ELECTRUM,Telebots,IRON VIKING,BlackEnergy (Group),Quedagh,Voodoo Bear,IRIDIUM Description Sandworm Team is a destructive threat group that has been attributed ...
Sandworm_Team.md
00893c406753-1
Sandworm Team has used ROT13 encoding, AES encryption and compression with the zlib library for their Python-based backdoor.(Citation: ESET Telebots Dec 2016)| |mitre-attack|enterprise-attack,ics-attack,mobile-attack|Windows|T1003.003|NTDS| Sandworm Team has used Sandworm Team has used Prestige ransomware to encrypt...
Sandworm_Team.md
00893c406753-2
Sandworm Team has used webshells including P.A.S. Webshell to maintain access to victim networks.(Citation: ANSSI Sandworm January 2021)| |mitre-attack|enterprise-attack,ics-attack,mobile-attack|PRE|T1589.002|Email Addresses| Sandworm Team has obtained valid emails addresses while conducting research against target o...
Sandworm_Team.md
00893c406753-3
Sandworm Team researched Ukraine's unique legal entity identifier (called an "EDRPOU" number), including running queries on the EDRPOU website, in preparation for the NotPetya attack. Sandworm Team has also researched third-party websites to help it craft credible spearphishing emails.(Citation: US District Court Ind...
Sandworm_Team.md
00893c406753-4
Sandworm Team has scanned network infrastructure for vulnerabilities as part of its operational planning.(Citation: US District Court Indictment GRU Unit 74455 October 2020)| |mitre-attack|enterprise-attack,ics-attack,mobile-attack|PRE|T1588.006|Vulnerabilities|In 2017, Sandworm Team conducted technical research relat...
Sandworm_Team.md
00893c406753-5
Sandworm Team has used stolen credentials to access administrative accounts within the domain.(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: Microsoft Prestige ransomware October 2022)| |mitre-attack|enterprise-attack,ics-attack,mobile-attack|PRE|T1594|Search Victim-Owned Websites| Sand...
Sandworm_Team.md
00893c406753-6
Sandworm Team has registered domain names and created URLs that are often designed to mimic or spoof legitimate websites, such as email login pages, online file sharing and storage websites, and password reset pages.(Citation: US District Court Indictment GRU Unit 74455 October 2020)| |mitre-attack|enterprise-attack,ic...
Sandworm_Team.md
00893c406753-7
Sandworm Team has developed malware for its operations, including malicious mobile applications and destructive malware such as NotPetya and Olympic Destroyer.(Citation: US District Court Indictment GRU Unit 74455 October 2020)| |mitre-attack|enterprise-attack,ics-attack,mobile-attack|Linux,macOS,Windows,Network|T101...
Sandworm_Team.md
00893c406753-8
Sandworm Team has distributed NotPetya by compromising the legitimate Ukrainian accounting software M.E.Doc and replacing a legitimate software update with a malicious one.(Citation: Secureworks NotPetya June 2017)(Citation: ESET Telebots June 2017)(Citation: US District Court Indictment GRU Unit 74455 October 2020)| ...
Sandworm_Team.md
00893c406753-9
Sandworm Team have used previously acquired legitimate credentials prior to attacks.(Citation: US-CERT Ukraine Feb 2016)| |mitre-attack|enterprise-attack,ics-attack,mobile-attack|Linux,macOS,Windows,Network|T1561.002|Disk Structure Wipe| Sandworm Team has used the BlackEnergy KillDisk component to corrupt the infecte...
Sandworm_Team.md
00893c406753-10
Sandworm Team has used the Telegram Bot API from Telegram Messenger to send and receive commands to its Python backdoor. Sandworm Team also used legitimate M.E.Doc software update check requests for sending and receiving commands and hosted malicious payloads on putdrive.com.(Citation: ESET Telebots Dec 2016)(Citation...
Sandworm_Team.md
00893c406753-11
Sandworm Team has used intercepter-NG to sniff passwords in network traffic.(Citation: ESET Telebots Dec 2016) | |mitre-attack|enterprise-attack,ics-attack,mobile-attack|Linux,macOS,Windows|T1087.002|Domain Account| Sandworm Team has used a tool to query Active Directory using LDAP, discovering information about us...
Sandworm_Team.md
00893c406753-12
Sandworm Team's BCS-server tool can create an internal proxy server to redirect traffic from the adversary-controlled C2 to internal servers which may not be connected to the internet, but are interconnected locally.(Citation: ESET Telebots Dec 2016) | |mitre-attack|enterprise-attack,ics-attack,mobile-attack|Linux,m...
Sandworm_Team.md
00893c406753-13
Sandworm Team used the credentials of valid accounts to interact with client applications and access employee workstations hosting HMI applications. (Citation: Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems March 2016)(Citation: Dragos)| |mitre-attack|enterprise-attack,ics-attack,m...
Sandworm_Team.md
00893c406753-14
Sandworm Team harvested VPN worker credentials and used them to remotely log into control system networks. (Citation: Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems March 2016) (Citation: Zetter, Kim March 2016) (Citation: ICS-CERT February 2016) (Citation: John Hultquist January 2...
Sandworm_Team.md
00893c406753-15
Sandworm Team blocked command messages by using malicious firmware to render communication devices inoperable. (Citation: Electricity Information Sharing and Analysis Center; SANS Industrial Control Systems March 2016)| |mitre-attack|enterprise-attack,ics-attack,mobile-attack|Human-Machine Interface|T0823|Graphical Use...
Sandworm_Team.md
6791d261d991-0
Scarlet Mimic - G0029 Created: 2017-05-31T21:32:00.677Z Modified: 2020-03-30T19:16:53.144Z Contributors: Aliases Scarlet Mimic Description Scarlet Mimic is a threat group that has targeted minority rights activists. This group has not been directly linked to a government source, but the group's motivations appea...
Scarlet_Mimic.md
d07437e8c8b5-0
SideCopy - G1008 Created: 2022-08-07T13:52:07.791Z Modified: 2022-10-24T18:51:09.213Z Contributors: Pooja Natarajan, NEC Corporation India,Hiroki Nagahama, NEC Corporation,Manikantan Srinivasan, NEC Corporation India Aliases SideCopy Description SideCopy is a Pakistani threat group that has primarily targeted So...
SideCopy.md
d07437e8c8b5-1
SideCopy has identified the country location of a compromised host.(Citation: MalwareBytes SideCopy Dec 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1016|System Network Configuration Discovery| SideCopy has identified the IP address of a compromised host.(Citation: MalwareBytes SideCopy Dec 2021...
SideCopy.md
dd56eec78157-0
Sidewinder - G0121 Created: 2021-01-27T15:57:11.183Z Modified: 2023-03-22T05:31:54.382Z Contributors: Lacework Labs,Daniyal Naeem, BT Security Aliases Sidewinder,T-APT-04,Rattlesnake Description Sidewinder is a suspected Indian threat actor group that has been active since at least 2012. They have been observed ...
Sidewinder.md
dd56eec78157-1
Sidewinder has used Sidewinder has lured targets to click on malicious files to gain execution in the target environment.(Citation: ATT Sidewinder January 2021)(Citation: Rewterz Sidewinder APT April 2020)(Citation: Rewterz Sidewinder COVID-19 June 2020)(Citation: Cyble Sidewinder September 2020)| |mitre-attack|enterp...
Sidewinder.md
dd56eec78157-2
Sidewinder has used malware to collect information on files and directories.(Citation: ATT Sidewinder January 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1074.001|Local Data Staging| Sidewinder has collected stolen files in a temporary folder in preparation for exfiltration.(Citation: ATT Sidewinder Ja...
Sidewinder.md
dd56eec78157-3
Sidewinder has used base64 encoding and ECDH-P256 encryption for payloads.(Citation: ATT Sidewinder January 2021)(Citation: Rewterz Sidewinder APT April 2020)(Citation: Cyble Sidewinder September 2020)| |mitre-attack|enterprise-attack|Windows|T1574.002|DLL Side-Loading| Sidewinder has used DLL side-loading to drop and...
Sidewinder.md
dd56eec78157-4
Sidewinder has sent e-mails with malicious attachments often crafted for specific targets.(Citation: ATT Sidewinder January 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Office 365,SaaS,Google Workspace|T1566.002|Spearphishing Link| Sidewinder has sent e-mails with malicious links often crafted for specif...
Sidewinder.md
268466a68244-0
Silence - G0091 Created: 2019-05-24T17:57:36.491Z Modified: 2023-03-22T05:34:46.346Z Contributors: Oleg Skulkin, Group-IB Aliases Silence,Whisper Spider Description Silence is a financially motivated threat actor targeting financial institutions in different countries. The group was first seen in June 2016. Thei...
Silence.md
268466a68244-1
Silence has used Silence has downloaded additional modules and malware to victim’s machines.(Citation: Group IB Silence Sept 2018) | |mitre-attack|enterprise-attack|Windows|T1021.001|Remote Desktop Protocol| Silence has used RDP for lateral movement.(Citation: Group IB Silence Sept 2018) | |mitre-attack|enterprise-a...
Silence.md
268466a68244-2
Silence has used PowerShell to download and execute payloads.(Citation: Cyber Forensicator Silence Jan 2019)(Citation: Group IB Silence Sept 2018)| |mitre-attack|enterprise-attack|Windows,macOS,Linux|T1059.007|JavaScript| Silence has used JS scripts.(Citation: Cyber Forensicator Silence Jan 2019)| |mitre-attack|enterp...
Silence.md
268466a68244-3
Silence has weaponized CHM files in their phishing campaigns.(Citation: Cyber Forensicator Silence Jan 2019)(Citation: SecureList Silence Nov 2017)(Citation: Group IB Silence Aug 2019)(Citation: Group IB Silence Sept 2018)| |mitre-attack|enterprise-attack|Windows,macOS,Linux|T1106|Native API| Silence has leveraged the...
Silence.md
44fd44c06e27-0
Silent Librarian - G0122 Created: 2021-02-03T16:36:38.145Z Modified: 2021-04-21T12:02:00.278Z Contributors: Aliases Silent Librarian,TA407,COBALT DICKENS Description Silent Librarian is a group that has targeted research and proprietary data at universities, government agencies, and private sector companies worl...
Silent_Librarian.md
44fd44c06e27-1
Silent Librarian has established e-mail accounts to receive e-mails forwarded from compromised accounts.(Citation: DOJ Iran Indictments March 2018)| |mitre-attack|enterprise-attack|Windows,Office 365,Google Workspace,macOS,Linux|T1114|Email Collection| Silent Librarian has exfiltrated entire mailboxes from compromised...
Silent_Librarian.md
44fd44c06e27-2
Silent Librarian has used compromised credentials to obtain unauthorized access to online accounts.(Citation: DOJ Iran Indictments March 2018)| |mitre-attack|enterprise-attack|PRE|T1583.001|Domains| Silent Librarian has acquired domains to establish credential harvesting pages, often spoofing the target organization a...
Silent_Librarian.md
15d79cb68f84-0
SilverTerrier - G0083 Created: 2019-01-29T21:36:59.793Z Modified: 2020-05-19T23:26:11.780Z Contributors: Aliases SilverTerrier Description SilverTerrier is a Nigerian threat group that has been seen active since 2014. SilverTerrier mainly targets organizations in high technology, higher education, and manufactur...
SilverTerrier.md
21ffa2192adb-0
Sowbug - G0054 Created: 2018-01-16T16:13:52.465Z Modified: 2020-03-30T02:46:16.483Z Contributors: Alan Neville, @abnev Aliases Sowbug Description Sowbug is a threat group that has conducted targeted attacks against organizations in South America and Southeast Asia, particularly government entities, since at leas...
Sowbug.md
21ffa2192adb-1
Sowbug identified and extracted all Word documents on a server by using a command containing * .doc and *.docx. The actors also searched for documents based on a specific date range and attempted to identify all installed software on a victim.(Citation: Symantec Sowbug Nov 2017)| |mitre-attack|enterprise-attack|Windows...
Sowbug.md
e4bac029abb1-0
Stealth Falcon - G0038 Created: 2017-05-31T21:32:06.390Z Modified: 2020-11-23T18:57:19.208Z Contributors: Aliases Stealth Falcon Description Stealth Falcon is a threat group that has conducted targeted spyware attacks against Emirati journalists, activists, and dissidents since at least 2012. Circumstantial evid...
Stealth_Falcon.md
e4bac029abb1-1
Stealth Falcon malware uses WMI to script data collection and command execution on the victim.(Citation: Citizen Lab Stealth Falcon May 2016)| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1573.001|Symmetric Cryptography| Stealth Falcon malware encrypts C2 traffic using RC4 with a hard-coded key.(Citation: Citi...
Stealth_Falcon.md
e4bac029abb1-2
Stealth Falcon malware gathers the Address Resolution Protocol (ARP) table from the victim.(Citation: Citizen Lab Stealth Falcon May 2016)| |mitre-attack|enterprise-attack|Windows|T1012|Query Registry| Stealth Falcon malware attempts to determine the installed version of .NET by querying the Registry.(Citation: Citize...
Stealth_Falcon.md
f0abe6683af5-0
Strider - G0041 Created: 2017-05-31T21:32:07.541Z Modified: 2020-06-29T01:43:19.374Z Contributors: Aliases Strider,ProjectSauron Description Strider is a threat group that has been active since at least 2011 and has targeted victims in Russia, China, Sweden, Belgium, Iran, and Rwanda.(Citation: Symantec Strider ...
Strider.md
da43b7645314-0
Suckfly - G0039 Created: 2017-05-31T21:32:06.777Z Modified: 2022-04-15T16:27:38.682Z Contributors: Aliases Suckfly Description Suckfly is a China-based threat group that has been active since at least 2014. (Citation: Symantec Suckfly March 2016) Techniques Used |Matrix|Domain|Platform|Technique ID|Technique N...
Suckfly.md
01a8cd266e99-0
TA459 - G0062 Created: 2018-04-18T17:59:24.739Z Modified: 2020-03-30T19:22:32.962Z Contributors: Valerii Marchuk, Cybersecurity Help s.r.o. Aliases TA459 Description TA459 is a threat group believed to operate out of China that has targeted countries including Russia, Belarus, Mongolia, and others. (Citation: Pr...
TA459.md
416317a7678d-0
TA505 - G0092 Created: 2019-05-28T15:54:17.213Z Modified: 2023-03-22T05:38:20.381Z Contributors: Aliases TA505,Hive0065 Description TA505 is a cyber criminal group that has been active since at least 2014. TA505 is known for frequently changing malware, driving global trends in criminal malware distribution, and...
TA505.md
416317a7678d-1
TA505 has used a variety of tools in their operations, including AdFind, BloodHound, Mimikatz, and PowerSploit.(Citation: NCC Group TA505)| |mitre-attack|enterprise-attack|Windows,Linux,macOS|T1140|Deobfuscate/Decode Files or Information| TA505 has decrypted packed DLLs with an XOR key.(Citation: NCC Group TA505)|...
TA505.md
416317a7678d-2
TA505 has used TinyMet to enumerate members of privileged groups.(Citation: IBM TA505 April 2020) TA505 has also run TA505 has used the tool EmailStealer to steal and send lists of e-mail addresses to a remote server.(Citation: Trend Micro TA505 June 2019)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1568.00...
TA505.md
416317a7678d-3
TA505 has downloaded additional malware to execute on victim systems.(Citation: Cybereason TA505 April 2019)(Citation: Deep Instinct TA505 Apr 2019)(Citation: ProofPoint SettingContent-ms July 2018)| |mitre-attack|enterprise-attack|macOS,Windows|T1553.002|Code Signing| TA505 has signed payloads with code signing certi...
TA505.md
416317a7678d-4
TA505 has used a wide variety of ransomware, such as Clop, Locky, Jaff, Bart, Philadelphia, and GlobeImposter, to encrypt victim files and demand a ransom payment.(Citation: Proofpoint TA505 Sep 2017)| |mitre-attack|enterprise-attack|Windows,macOS,Linux|T1059.005|Visual Basic| TA505 has used VBS for code execution.(C...
TA505.md
416317a7678d-5
TA505 has used spearphishing emails with malicious attachments to initially compromise victims.(Citation: Proofpoint TA505 Sep 2017)(Citation: Proofpoint TA505 June 2018)(Citation: Proofpoint TA505 Jan 2019)(Citation: Cybereason TA505 April 2019)(Citation: ProofPoint SettingContent-ms July 2018)(Citation: Proofpoint TA...
TA505.md
9baaa52dbb8b-0
TA551 - G0127 Created: 2021-03-19T21:04:00.692Z Modified: 2023-03-22T05:40:21.255Z Contributors: Shuhei Sasada, Cyber Defense Institute, Inc,Ryo Tamura, SecureBrain Corporation,Shotaro Hamamoto, NEC Solution Innovators, Ltd,Yusuke Niwa, ITOCHU Corporation,Takuma Matsumoto, LAC Co., Ltd Aliases TA551,GOLD CABIN,Sha...
TA551.md
9baaa52dbb8b-1
TA551 has used spoofed company emails that were acquired from email clients on previously infected hosts to target other individuals.(Citation: Unit 42 TA551 Jan 2021)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1105|Ingress Tool Transfer| TA551 has retrieved DLLs and installer binaries for malware execution...
TA551.md
cbfb93d0d9a2-0
TeamTNT - G0139 Created: 2021-10-01T01:57:31.229Z Modified: 2022-10-19T21:35:03.147Z Contributors: Will Thomas, Cyjax,Darin Smith, Cisco Aliases TeamTNT Description TeamTNT is a threat group that has primarily targeted cloud and containerized environments. The group as been active since at least October 2019 and...
TeamTNT.md
cbfb93d0d9a2-1
TeamTNT has aggregated collected credentials in text files before exfiltrating.(Citation: Cisco Talos Intelligence Group)| |mitre-attack|enterprise-attack|Windows,macOS,Linux|T1007|System Service Discovery| TeamTNT has searched for services such as Alibaba Cloud Security's aliyun service and BMC Helix Cloud Security's...
TeamTNT.md
cbfb93d0d9a2-2
TeamTNT executed Hildegard through the kubelet API run command and by executing commands on running containers.(Citation: Unit 42 Hildegard Malware)| |mitre-attack|enterprise-attack|Windows,Linux,Containers,macOS|T1133|External Remote Services| TeamTNT has used open-source tools such as Weave Scope to target exposed ...
TeamTNT.md
cbfb93d0d9a2-3
TeamTNT has used masscan to search for open Docker API ports and Kubernetes clusters.(Citation: Cado Security TeamTNT Worm August 2020)(Citation: Unit 42 Hildegard Malware)(Citation: Cisco Talos Intelligence Group) TeamTNT has also used malware that utilizes zmap and zgrab to search for vulnerable services in cloud en...
TeamTNT.md
cbfb93d0d9a2-4
TeamTNT has the TeamTNT has also used a custom user agent HTTP header in shell scripts.(Citation: Trend Micro TeamTNT)| |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1070.003|Clear Command History| TeamTNT has cleared command history with TeamTNT has run TeamTNT has also used TeamTNT has checked for...
TeamTNT.md
cbfb93d0d9a2-5
TeamTNT has modified the permissions on binaries with TeamTNT has enumerated the host machine’s IP address.(Citation: Trend Micro TeamTNT)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1014|Rootkit| TeamTNT has used rootkits such as the open-source Diamorphine rootkit and their custom bots to hide cryptocurre...
TeamTNT.md
cbfb93d0d9a2-6
TeamTNT has added batch scripts to the startup folder.(Citation: ATT TeamTNT Chimaera September 2020)| |mitre-attack|enterprise-attack|Windows,Azure AD,Office 365,SaaS,IaaS,Linux,macOS,Google Workspace|T1518.001|Security Software Discovery| TeamTNT has searched for security products on infected machines.(Citation: ATT...
TeamTNT.md
f96cd771d592-0
TEMP.Veles - G0088 Created: 2019-04-16T15:14:38.533Z Modified: 2022-11-30T22:46:40.135Z Contributors: Dragos Threat Intelligence Aliases TEMP.Veles,XENOTIME Description TEMP.Veles is a Russia-based threat group that has targeted critical infrastructure. The group has been observed utilizing TRITON, a malware f...
TEMP.Veles.md
f96cd771d592-1
TEMP.Veles has used a publicly-available PowerShell-based tool, WMImplant.(Citation: FireEye TEMP.Veles 2018) The group has also used PowerShell to perform Timestomping.(Citation: FireEye TRITON 2019)| |mitre-attack|enterprise-attack,ics-attack|Linux,Windows,macOS,Network|T1505.003|Web Shell| TEMP.Veles has planted W...
TEMP.Veles.md
f96cd771d592-2
TEMP.Veles routinely deleted tools, logs, and other files after they were finished with them.(Citation: FireEye TRITON 2019)| |mitre-attack|enterprise-attack,ics-attack|Linux,macOS,Windows|T1070.006|Timestomp| TEMP.Veles used timestomping to modify the $STANDARD_INFORMATION attribute on tools.(Citation: FireEye TRITON...
TEMP.Veles.md
f96cd771d592-3
TEMP.Veles targeted several ICS vendors and manufacturers. (Citation: Dragos Threat Intelligence August 2019)| |mitre-attack|enterprise-attack,ics-attack|Control Server,Data Historian,Engineering Workstation,Field Controller/RTU/PLC/IED,Human-Machine Interface,Input/Output Server,Safety Instrumented System/Protection R...
TEMP.Veles.md
f7ce2087f3c9-0
The White Company - G0089 Created: 2019-05-02T00:08:18.314Z Modified: 2020-03-30T19:24:52.290Z Contributors: Aliases The White Company Description The White Company is a likely state-sponsored threat actor with advanced capabilities. From 2017 through 2018, the group led an espionage campaign called Operation Sh...
The_White_Company.md
f7ce2087f3c9-1
The White Company has checked for specific antivirus products on the target’s computer, including Kaspersky, Quick Heal, AVG, BitDefender, Avira, Sophos, Avast!, and ESET.(Citation: Cylance Shaheen Nov 2018)| |mitre-attack|enterprise-attack|Windows,Network|T1124|System Time Discovery| The White Company has checked the...
The_White_Company.md
45d83e496ce4-0
Threat Group-1314 - G0028 Created: 2017-05-31T21:31:59.120Z Modified: 2020-03-19T21:58:20.831Z Contributors: Aliases Threat Group-1314,TG-1314 Description Threat Group-1314 is an unattributed threat group that has used compromised credentials to log into a victim's remote access infrastructure. (Citation: Dell T...
Threat_Group-1314.md
3505384b1d08-0
Threat Group-3390 - G0027 Created: 2017-05-31T21:31:58.518Z Modified: 2023-03-29T16:53:17.235Z Contributors: Daniyal Naeem, BT Security,Kyaw Pyiyt Htet, @KyawPyiytHtet Aliases Threat Group-3390,Earth Smilodon,TG-3390,Emissary Panda,BRONZE UNION,APT27,Iron Tiger,LuckyMouse Description Threat Group-3390 is a Chine...
Threat_Group-3390.md
3505384b1d08-1
Threat Group-3390 has used Threat Group-3390 has packed malware and tools, including using VMProtect.(Citation: Trend Micro DRBControl February 2020)(Citation: Trend Micro Iron Tiger April 2021)| |mitre-attack|enterprise-attack|PRE|T1608.001|Upload Malware| Threat Group-3390 has hosted malicious payloads on Dropbox.(...
Threat_Group-3390.md
3505384b1d08-2
Threat Group-3390 has obtained and used tools such as Impacket, pwdump, Mimikatz, gsecdump, NBTscan, and Windows Credential Editor.(Citation: Unit42 Emissary Panda May 2019)(Citation: Dell TG-3390)| |mitre-attack|enterprise-attack|PRE|T1608.002|Upload Tool| Threat Group-3390 has staged tools, including gsecdump...
Threat_Group-3390.md
3505384b1d08-3
Threat Group-3390 has exploited CVE-2018-0798 in Equation Editor.(Citation: Trend Micro Iron Tiger April 2021)| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1210|Exploitation of Remote Services| Threat Group-3390 has exploited MS17-010 to move laterally to other systems on the network.(Citation: Unit42 Emissar...
Threat_Group-3390.md
3505384b1d08-4
Threat Group-3390 tool has created new Registry keys under Threat Group-3390 malware deobfuscates and decompresses code that was encoded with Metasploit’s shikata_ga_nai encoder as well as compressed with LZNT1 compression.(Citation: Securelist LuckyMouse June 2018)| |mitre-attack|enterprise-attack|Windows,Linux,macOS...
Threat_Group-3390.md
3505384b1d08-5
Threat Group-3390 has used CVE-2014-6324 and CVE-2017-0213 to escalate privileges.(Citation: SecureWorks BRONZE UNION June 2017)(Citation: Profero APT27 December 2020)| |mitre-attack|enterprise-attack|Windows|T1059.003|Windows Command Shell| Threat Group-3390 has used command-line interfaces for execution.(Citation: S...
Threat_Group-3390.md
3505384b1d08-6
Threat Group-3390 actors look for and use VPN profiles during an operation to access the network using external VPN services.(Citation: Dell TG-3390) Threat Group-3390 has also obtained OWA account credentials during intrusions that it subsequently used to attempt to regain access when evicted from a victim network.(C...
Threat_Group-3390.md
3505384b1d08-7
Threat Group-3390 has downloaded additional malware and tools, including through the use of Threat Group-3390 actors use the Hunter tool to conduct network service discovery for vulnerable systems.(Citation: Dell TG-3390)(Citation: Unit42 Emissary Panda May 2019)| |mitre-attack|enterprise-attack|Windows|T1003.004|LSA ...
Threat_Group-3390.md
9646df93f378-0
Thrip - G0076 Created: 2018-10-17T00:14:20.652Z Modified: 2021-10-12T20:13:42.274Z Contributors: Aliases Thrip Description Thrip is an espionage group that has targeted satellite communications, telecoms, and defense contractor companies in the U.S. and Southeast Asia. The group uses custom malware as well as "l...
Thrip.md
9c86e2818661-0
Tonto Team - G0131 Created: 2021-05-05T17:18:25.987Z Modified: 2022-01-27T17:51:41.433Z Contributors: Aliases Tonto Team,Earth Akhlut,BRONZE HUNTLEY,CactusPete,Karma Panda Description Tonto Team is a suspected Chinese state-sponsored cyber espionage threat group that has primarily targeted South Korea, Japan, Ta...
Tonto_Team.md
9c86e2818661-1
NBTscan to enumerate network shares.(Citation: TrendMicro Tonto Team October 2020)| |mitre-attack|enterprise-attack|Windows,Linux,macOS|T1003|OS Credential Dumping| Tonto Team has used a variety of credential dumping tools.(Citation: TrendMicro Tonto Team October 2020) | |mitre-attack|enterprise-attack|Linux,Windows,m...
Tonto_Team.md
9c86e2818661-2
Tonto Team has delivered payloads via spearphishing attachments.(Citation: TrendMicro Tonto Team October 2020)| |mitre-attack|enterprise-attack|Linux,Windows,macOS|T1203|Exploitation for Client Execution| Tonto Team has exploited Microsoft vulnerabilities, including CVE-2018-0798, CVE-2018-8174, CVE-2018-0802, CVE-201...
Tonto_Team.md
e08caf1f4de6-0
Transparent Tribe - G0134 Created: 2021-09-02T15:14:33.738Z Modified: 2022-09-22T20:27:21.053Z Contributors: Manikantan Srinivasan, NEC Corporation India,Pooja Natarajan, NEC Corporation India,Hiroki Nagahama, NEC Corporation Aliases Transparent Tribe,COPPER FIELDSTONE,APT36,Mythic Leopard,ProjectM Description T...
Transparent_Tribe.md
e08caf1f4de6-1
Transparent Tribe can mimic legitimate Windows directories by using the same icons and names.(Citation: Kaspersky Transparent Tribe August 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1568|Dynamic Resolution| Transparent Tribe has used dynamic DNS services to set up C2.(Citation: Proofpoint Operation Tr...
Transparent_Tribe.md
e08caf1f4de6-2
Transparent Tribe has used weaponized documents in e-mail to compromise targeted systems.(Citation: Proofpoint Operation Transparent Tribe March 2016)(Citation: Kaspersky Transparent Tribe August 2020)(Citation: Talos Oblique RAT March 2021)(Citation: Talos Transparent Tribe May 2021)(Citation: Unit 42 ProjectM March 2...
Transparent_Tribe.md
17f30a764cdd-0
Tropic Trooper - G0081 Created: 2019-01-29T20:17:48.717Z Modified: 2021-04-26T14:15:15.610Z Contributors: Edward Millington,Bart Parys Aliases Tropic Trooper,Pirate Panda,KeyBoy Description Tropic Trooper is an unaffiliated threat group that has led targeted campaigns against targets in Taiwan, the Philippines, ...
Tropic_Trooper.md
17f30a764cdd-1
Tropic Trooper has collected information automatically using the adversary's USBferry attack.(Citation: TrendMicro Tropic Trooper May 2020) | |mitre-attack|enterprise-attack|Linux,macOS,Windows,Network|T1083|File and Directory Discovery| Tropic Trooper has monitored files' modified time.(Citation: TrendMicro Tropi...
Tropic_Trooper.md
17f30a764cdd-2
Tropic Trooper's backdoor has communicated to the C2 over the DNS protocol.(Citation: TrendMicro Tropic Trooper May 2020) | |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1573|Encrypted Channel| Tropic Trooper has encrypted traffic with the C2 to prevent network detection.(Citation: TrendMicro Tropic Trooper ...
Tropic_Trooper.md
17f30a764cdd-3
Tropic Trooper has created shortcuts in the Startup folder to establish persistence.(Citation: Anomali Pirate Panda April 2020)(Citation: TrendMicro Tropic Trooper May 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1071.001|Web Protocols| Tropic Trooper has used HTTP in communication with the C2.(Citation...
Tropic_Trooper.md
17f30a764cdd-4
Tropic Trooper has injected a DLL backdoor into dllhost.exe and svchost.exe.(Citation: TrendMicro Tropic Trooper Mar 2018)(Citation: TrendMicro Tropic Trooper May 2020)| |mitre-attack|enterprise-attack|Linux,macOS,Windows|T1027|Obfuscated Files or Information| Tropic Trooper has encrypted configuration files.(Citation...
Tropic_Trooper.md
17f30a764cdd-5
Tropic Trooper used shellcode with an XOR algorithm to decrypt a payload. Tropic Trooper also decrypted image files which contained a payload.(Citation: Unit 42 Tropic Trooper Nov 2016)(Citation: TrendMicro Tropic Trooper May 2020)| |mitre-attack|enterprise-attack|Windows|T1547.004|Winlogon Helper DLL| Tropic Trooper...
Tropic_Trooper.md
0ec9e27477c7-0
Turla - G0010 Created: 2017-05-31T21:31:49.816Z Modified: 2023-03-22T05:41:28.428Z Contributors: Matthieu Faou, ESET,Edward Millington Aliases Turla,IRON HUNTER,Group 88,Belugasturgeon,Waterbug,WhiteBear,Snake,Krypton,Venomous Bear Description Turla is a Russian-based threat group that has infected victims in ov...
Turla.md
0ec9e27477c7-1
Mimikatz.(Citation: Symantec Waterbug Jun 2019)| |mitre-attack|enterprise-attack|Windows,macOS,Linux|T1059.007|JavaScript| Turla has used various JavaScript-based backdoors.(Citation: ESET Turla Mosquito Jan 2018) | |mitre-attack|enterprise-attack|Windows,macOS|T1553.006|Code Signing Policy Modification| Turla has...
Turla.md