id
stringlengths
5
9
technique
stringlengths
3
43
subtechniqueid
stringlengths
3
60
sentences
stringlengths
1
871
t1036.005
masquerading
legitimateTechnique location
pony has used the adobe reader icon for the downloaded file to look more trustworthy.
t1036.005
masquerading
legitimateTechnique location
poseidon group tools attempt to spoof anti-virus processes as a means of self-defense.
t1036.005
masquerading
legitimateTechnique location
promethium has disguised malicious installer files by bundling them with legitimate software installers.
t1036.005
masquerading
legitimateTechnique location
punchbuggy mimics filenames from systemsystem32 to hide dlls in windir andor temp.
t1036.005
masquerading
legitimateTechnique location
pysa has executed a malicious executable by naming it svchost.exe.
t1036.005
masquerading
legitimateTechnique location
quadagent used the powershell filenames office365dcomcheck.ps1 and systemdiskclean.ps1.
t1036.005
masquerading
legitimateTechnique location
raindrop was installed under names that resembled legitimate windows file and directory names.
t1036.005
masquerading
legitimateTechnique location
ramsay has masqueraded as a 7zip installer.
t1036.005
masquerading
legitimateTechnique location
rdat has masqueraded as vmware.exe.
t1036.005
masquerading
legitimateTechnique location
the remsec loader implements itself with the name security support provider a legitimate windows function. various remsec .exe files mimic legitimate file names used by microsoft symantec kaspersky hewlett-packard and vmware. remsec also disguised malicious modules using similar filenames as custom network encryption software on victims.
t1036.005
masquerading
legitimateTechnique location
revil can mimic the names of known executables.
t1036.005
masquerading
legitimateTechnique location
rocke has used shell scripts which download mining executables and saves them with the filename java.
t1036.005
masquerading
legitimateTechnique location
ryuk has constructed legitimate appearing installation folder paths by calling getwindowsdirectoryw and then inserting a null byte at the fourth character of the path. for windows vista or higher the path would appear as c:userspublic.
t1036.005
masquerading
legitimateTechnique location
s-type may save itself as a file named msdtc.exe which is also the name of the legitimate microsoft distributed transaction coordinator service binary.
t1036.005
masquerading
legitimateTechnique location
sandworm team has avoided detection by naming a malicious binary explorer.exe.
t1036.005
masquerading
legitimateTechnique location
shimratreporter spoofed itself as alphazawgyl_font.exe a specialized unicode font.
t1036.005
masquerading
legitimateTechnique location
sibot has downloaded a dll to the c:windowssystem32drivers folder and renamed it with a .sys extension.
t1036.005
masquerading
legitimateTechnique location
sidewinder has named malicious files rekeywiz.exe to match the name of a legitimate windows executable.
t1036.005
masquerading
legitimateTechnique location
silence has named its backdoor winword.exe.
t1036.005
masquerading
legitimateTechnique location
skidmap has created a fake rm binary to replace the legitimate linux binary.
t1036.005
masquerading
legitimateTechnique location
slothful media has mimicked the names of known executables such as mediaplayer.exe.
t1036.005
masquerading
legitimateTechnique location
sowbug named its tools to masquerade as windows or adobe reader software such as by using the file name adobecms.exe and the directory csidl_appdatamicrosoftsecurity.
t1036.005
masquerading
legitimateTechnique location
to establish persistence sslmm identifies the start menu startup directory and drops a link to its own executable disguised as an œoffice start  œyahoo talk  œmsn gaming z0ne  or œmsn talk shortcut.
t1036.005
masquerading
legitimateTechnique location
starloader has masqueraded as legitimate software update packages such as adobe acrobat reader and intel.
t1036.005
masquerading
legitimateTechnique location
strongpity has been bundled with legitimate software installation files for disguise.
t1036.005
masquerading
legitimateTechnique location
sunburst created vbscripts that were named after existing services or folders to blend into legitimate activities.
t1036.005
masquerading
legitimateTechnique location
sunspot was identified on disk with a filename of taskhostsvc.exe and it created an encrypted log file at c:windowstempvmware-vmdmp.log.
t1036.005
masquerading
legitimateTechnique location
supernova has masqueraded as a legitimate solarwinds dll.
t1036.005
masquerading
legitimateTechnique location
the taintedscribe main executable has disguised itself as microsofts narrator.
t1036.005
masquerading
legitimateTechnique location
teardrop files had names that resembled legitimate window file and directory names.
t1036.005
masquerading
legitimateTechnique location
temp.veles has renamed files to look like legitimate files such as windows update files or schneider electric application files.
t1036.005
masquerading
legitimateTechnique location
thiefquest prepends a copy of itself to the beginning of an executable file while maintaining the name of the executable.
t1036.005
masquerading
legitimateTechnique location
tropic trooper has hidden payloads in flash directories and fake installer files.
t1036.005
masquerading
legitimateTechnique location
unc 2452 renamed a version of adfind to sqlceip.exe or csrss.exe in an attempt to appear as the sql server telemetry client or client service runtime process respectively.
t1036.005
masquerading
legitimateTechnique location
ursnif has used strings from legitimate system files and existing folders for its file folder and registry entry names.
t1036.005
masquerading
legitimateTechnique location
usbstealer mimics a legitimate russian program called usb disk security.
t1036.005
masquerading
legitimateTechnique location
whitefly has named the malicious dll the same name as dlls belonging to legitimate software from various security vendors.
t1036.005
masquerading
legitimateTechnique location
a winnti for windows implant file was named aspnet_filter.dll mimicking the legitimate asp.net isapi filter dll with the same name.
t1036.005
masquerading
legitimateTechnique location
zlib mimics the resource version information of legitimate realtek semiconductor nvidia or synaptics modules.
t1037
boot or logon initialization scripts
null
adversaries may use scripts automatically executed at boot or logon initialization to establish persistence
t1037
boot or logon initialization scripts
null
initialization scripts can be used to perform administrative functions which may often execute other programs or send information to an internal logging server
t1037
boot or logon initialization scripts
null
look for files added or modified by unusual accounts outside of normal administration duties
t1037
boot or logon initialization scripts
null
monitor logon scripts for unusual access by abnormal users or at abnormal times
t1037
boot or logon initialization scripts
null
monitor running process for actions that could be indicative of abnormal programs or executables running upon logon
t1037
boot or logon initialization scripts
null
windows registry windows registry key creation process process creation command command execution active directory active directory object modification file file creation file file modification
t1037.004
boot or logon initialization scripts
rcTechniquescripts
hidden wasp installs reboot persistence by adding itself to etc rc.local.
t1037.004
boot or logon initialization scripts
rcTechniquescripts
ikitten adds an entry to the rc.common file for persistence.
t1037.004
boot or logon initialization scripts
rcTechniquescripts
install persistence through rc.d services: rc.d etc rc.d'init.dlinux_kill.
t1037.004
boot or logon initialization scripts
rcTechniquescripts
backwards compatibility on ubuntu allowed attackers to achieve persistence via rc scripts.
t1037.004
boot or logon initialization scripts
rcTechniquescripts
as the malware tries to achieve persistence, hatching triage analysis reports suspicious behavior: œmodifies rc script.
t1039
data from network shared drive
null
adversaries may search network shares on computers they have compromised to find files of interest
t1039
data from network shared drive
null
data may also be acquired through windows system management tools such as windows management instrumentationt1047 and powershellt1059
t1039
data from network shared drive
null
file file access network share network share access command command execution
t1039
data from network shared drive
null
monitor processes and command line arguments for actions that could be taken to collect files from a network share
t1039
data from network shared drive
null
remote access tools with built in features may interact directly with the windows api to gather data
t1039
data from network shared drive
null
sensitive data can be collected from remote systems via shared network drives host shared directory network file server etc
t1059.003
command and scripting interpreter
windows Technique command Technique shell
4h rat has the capability to create a remote shell.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
abk has the ability to use cmd to run a portable executable pe on the compromised host.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
adbupd can run a copy of cmd.exe.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
following exploitation with lowball malware admin@338 actors created a file containing a list of commands to be executed on the compromised computer.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
advstoreshell can create a remote shell and run a given command.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
anchor has used cmd.exe to run its self deletion routine.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
apt1 has used the windows command shell to execute commands and batch scripting to automate execution.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
apt18 uses cmd.exe to execute commands on the victims machine.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
an apt28 loader trojan uses a cmd.exe and batch script to run its payload. the group has also used macros to execute payloads.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
apt29 used cmd.exe to execute commands on remote machines.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
an apt3 downloader uses the windows command cmd.exe c whoami. the group also uses a tool to execute commands on remote computers.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
apt32 has used cmd.exe for execution.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
apt37 has used the command-line interface.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
apt38 has used a command-line tunneler nachocheese to give them shell access to a victims machine.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
apt41 used cmd.exe c to execute commands on remote machines.apt41 used a batch file to install persistence for the cobalt strike beacon loader.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
astaroth spawns a cmd process to execute commands.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
auditcred can open a reverse shell on the system to execute commands.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
babyshark has used cmd.exe to execute commands.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
backconfig can download and run batch files to execute commands on a compromised host.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
adversaries can direct backspace to execute from the command line on infected hosts or have backspace create a reverse shell.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
badnews is capable of executing commands via cmd.exe.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
bandook is capable of spawning a windows command shell.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
bankshot uses the command-line interface to execute arbitrary commands.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
bazar can launch cmd.exe to perform reconnaissance commands.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
bbk has the ability to use cmd to run a portable executable pe on the compromised host.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
biscuit has a command to launch a command shell on the system.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
bisonal can launch cmd.exe to execute commands on the system.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
blackcoffee has the capability to create a reverse shell.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
blackmould can run cmd.exe with parameters.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
blindingcan has executed commands via cmd.exe.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
blue mockingbird has used batch script files to automate execution and deployment of payloads.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
bondupdater can read batch commands in a file sent from its c2 server and execute them with cmd.exe.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
bronze butler has used batch scripts and the command-line interface for execution.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
calendar has a command to run cmd.exe to execute commands.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
carbanak has a command to create a reverse shell.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
cardinal rat can execute commands.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
carrotbat has the ability to execute command line arguments on a compromised host.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
caterpillar webshell can run commands on the compromised asset with cmd functions.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
chimera has used the windows command shell and batch scripts for execution on compromised hosts.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
china chopper's server component is capable of opening a command terminal.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
cmd is used to execute programs and other actions at the command-line interface.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
cobalt group has used a javascript backdoor that is capable of launching cmd.exe to execute shell commands. the group has used an exploit toolkit known as threadkit that launches .bat files.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
cobalt strike uses a command-line interface to interact with systems.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
cobian rat can launch a remote command shell interface for executing commands.