id
stringlengths 5
9
| technique
stringlengths 3
43
| subtechniqueid
stringlengths 3
60
⌀ | sentences
stringlengths 1
871
|
---|---|---|---|
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | cointicker executes a bash script to establish a reverse shell. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | comnie executes bat scripts. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | comrat has used cmd.exe to execute commands. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | conti can utilize command line options to allow an attacker control over how it scans and encrypts files. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | a module in cozycar allows arbitrary commands to be executed by invoking c:windowssystem32cmd.exe. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | dark caracal has used macros in word documents that would download a second stage if executed. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | darkcomet can launch a remote shell to execute commands on the victims machine. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | darkhotel has dropped an mspaint.lnk shortcut to disk which launches a shell script that downloads and executes a file. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | daserf can execute shell commands. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | dealerschoice makes modifications to open-source scripts from github and executes them on the victims machine. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | denis can launch a remote shell to execute arbitrary commands on the victims machine. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | dipsind can spawn remote shells. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | downpaper uses the command line. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | dragonfly 2.0 used various types of scripting to perform operations including batch scripts. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | dropbook can execute arbitrary shell commands on the victims' machines. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | dtrack has used cmd.exe to add a persistent service. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | eccentricbandwagon can use cmd to execute commands on a victims machine. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | egregor has used batch files for execution and can launch internet explorer from cmd.exe. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | emissary has the capability to create a remote shell and execute specified commands. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | emotet has used cmd.exe to run a powershell script. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | empire has modules for executing scripts. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | evilbunny has an integrated scripting engine to download and execute lua scripts. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | exaramel for windows has a command to launch a remote shell and executes commands on the victims machine. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | felismus uses command line for execution. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | felixroot executes batch scripts on the victims machine and can launch a reverse shell for command execution. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | fin10 has executed malicious .bat files containing powershell commands. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | fin6 has used kill.bat script to disable security tools. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | fin7 used the command prompt to launch commands on the victims machine. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | fin8 has used a batch file to automate frequently executed post compromise cleanup activities. fin8 executes commands remotely via cmd.exe. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | fox kitten has used cmd.exe likely as a password changing mechanism. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | frankenstein has run a command script to set up persistence as a scheduled task named winupdate as well as other encoded commands from the command-line. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | gallium used the windows command shell to execute commands. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | gamaredon group has used various batch scripts to establish c2 and download additional files. gamaredon group's backdoor malware has also been written to a batch file. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | gold dragon uses cmd.exe to execute commands for discovery. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | goldenspy can execute remote commands via the command-line interface. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | goldmax can spawn a command shell and execute native commands. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | goopy has the ability to use cmd.exe to execute commands passed from an outlook c2 channel. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | gorgon group malware can use cmd.exe to download and execute payloads and to execute commands on the system. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | gravityrat executes commands remotely on the infected host. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | greyenergy uses cmd.exe to execute itself in-memory. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | h1n1 kills and disables services by using cmd.exe. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | hardrain uses cmd.exe to execute netshcommands. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | hawkball has created a cmd.exe reverse shell executed commands and uploaded output via the command line. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | hcdloader provides command-line access to the compromised system. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | helminth can provide a remote shell. one version of helminth uses batch scripting. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | hi-zor has the ability to create a reverse shell. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | hiddenwasp uses a script to automate tasks on the victim's machine and to assist in execution. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | higaisa used cmd.exe for execution. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | hikit has the ability to create a remote shell and run given commands. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | homefry uses a command-line interface. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | several commands are supported by the honeybee's implant via the command-line interface and theres also a utility to execute any custom command on an infected endpoint. honeybee used batch scripting. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | hoplight can launch cmd.exe to execute commands on the system. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | hotcroissant can remotely open applications on the infected host with the shellexecutea command. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | httpbrowser is capable of spawning a reverse shell on a victim. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | httpclient opens cmd.exe on the victim. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | indrik spider has used batch scripts on victim's machines. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | innaputrat launches a shell to execute commands on the victims machine. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | invisimole can launch a remote shell to execute commands. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | ixeshe is capable of executing commands via cmd. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | jcry has used cmd.exe to launch powershell. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | jhuhugit uses a .bat file to execute a .dll. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | jpin can use the command-line utility cacls.exe to change file permissions. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | jrat has command line access. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | kasidet can execute commands using cmd.exe. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | kazuar uses cmd.exe to execute commands on the victims machine. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | ke3chang has used batch scripts in its malware to install persistence mechanisms. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | keyboy can launch interactive shells for communicating with the victim machine. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | keymarble can execute shell commands using cmd.exe. |
t1059.007 | command and scripting interpreter | javascript | apt32 has used javascript for drive-by downloads and c2 communications. |
t1059.007 | command and scripting interpreter | javascript | astaroth uses javascript to perform its core functionalities. |
t1059.007 | command and scripting interpreter | javascript | bundlore can execute javascript by injecting it into the victim's browser. |
t1059.007 | command and scripting interpreter | javascript | cobalt group has executed javascript scriptlets on the victim's machine. |
t1059.007 | command and scripting interpreter | javascript | the cobalt strike system profiler can use javascript to perform reconnaissance actions. |
t1059.007 | command and scripting interpreter | javascript | evil nun has used malicious javascript files on the victim's machine. |
t1059.007 | command and scripting interpreter | javascript | fin6 has used malicious javascript to steal payment card data from e-commerce sites. |
t1059.007 | command and scripting interpreter | javascript | fin7 used javascript scripts to help perform tasks on the victim's machine. |
t1059.007 | command and scripting interpreter | javascript | griffon is written in and executed as javascript. |
t1059.007 | command and scripting interpreter | javascript | higaisa used javascript to execute additional files. |
t1059.007 | command and scripting interpreter | javascript | invisimole can use a javascript file as part of its execution chain. |
t1059.007 | command and scripting interpreter | javascript | jrat has been distributed as hta files with jscript. |
t1059.007 | command and scripting interpreter | javascript | kimsuky has used jscript for logging and downloading additional tools. |
t1059.007 | command and scripting interpreter | javascript | leafminer infected victims using javascript code. |
t1059.007 | command and scripting interpreter | javascript | metamorfo includes payloads written in javascript. |
t1059.007 | command and scripting interpreter | javascript | mole rats used various implants including those built with js on target machines. |
t1059.007 | command and scripting interpreter | javascript | muddy water has used javascript files to execute its powerstats payload. |
t1059.007 | command and scripting interpreter | javascript | nanhaishu executes additional jscript code on the victim's machine. |
t1059.007 | command and scripting interpreter | javascript | powerstats can use javascript code for execution. |
t1059.007 | command and scripting interpreter | javascript | sidewinder has used javascript to drop and execute malware loaders. |
t1059.007 | command and scripting interpreter | javascript | silence has used js scripts. |
t1059.007 | command and scripting interpreter | javascript | ta505 has used javascript for code execution. |
t1059.007 | command and scripting interpreter | javascript | turla has used various javascript-based backdoors. |
t1059.007 | command and scripting interpreter | javascript | valak can execute javascript containing configuration data for establishing persistence. |
t1059.007 | command and scripting interpreter | javascript | xbash can execute malicious javascript payloads on the victims machine. |
t1070 | indicator removal on host | null | adversaries may delete or alter generated artifacts on a host system including logs or captured files such as quarantined malware |
t1070 | indicator removal on host | null | events not stored on the file system may require different detection mechanisms |
t1070 | indicator removal on host | null | file system monitoring may be used to detect improper deletion or modification of indicator files |
t1070 | indicator removal on host | null | locations and format of logs are platform or product specific however standard operating system logs are captured as windows events or linuxmac os files such as bash historyt1552 |
t1070 | indicator removal on host | null | process process creation file file deletion file file modification windows registry windows registry key modification windows registry windows registry key deletion process os api execution command command execution network traffic network traffic content user account user account authentication file file metadata |
t1071 | application layer protocol | null | a client sending significantly more data than it receives from a server |
t1071 | application layer protocol | null | adversaries may communicate using application layer protocols to avoid detectionnetwork filtering by blending in with existing traffic |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.