id
stringlengths
5
9
technique
stringlengths
3
43
subtechniqueid
stringlengths
3
60
sentences
stringlengths
1
871
t1059.003
command and scripting interpreter
windows Technique command Technique shell
cointicker executes a bash script to establish a reverse shell.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
comnie executes bat scripts.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
comrat has used cmd.exe to execute commands.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
conti can utilize command line options to allow an attacker control over how it scans and encrypts files.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
a module in cozycar allows arbitrary commands to be executed by invoking c:windowssystem32cmd.exe.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
dark caracal has used macros in word documents that would download a second stage if executed.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
darkcomet can launch a remote shell to execute commands on the victims machine.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
darkhotel has dropped an mspaint.lnk shortcut to disk which launches a shell script that downloads and executes a file.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
daserf can execute shell commands.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
dealerschoice makes modifications to open-source scripts from github and executes them on the victims machine.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
denis can launch a remote shell to execute arbitrary commands on the victims machine.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
dipsind can spawn remote shells.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
downpaper uses the command line.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
dragonfly 2.0 used various types of scripting to perform operations including batch scripts.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
dropbook can execute arbitrary shell commands on the victims' machines.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
dtrack has used cmd.exe to add a persistent service.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
eccentricbandwagon can use cmd to execute commands on a victims machine.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
egregor has used batch files for execution and can launch internet explorer from cmd.exe.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
emissary has the capability to create a remote shell and execute specified commands.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
emotet has used cmd.exe to run a powershell script.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
empire has modules for executing scripts.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
evilbunny has an integrated scripting engine to download and execute lua scripts.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
exaramel for windows has a command to launch a remote shell and executes commands on the victims machine.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
felismus uses command line for execution.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
felixroot executes batch scripts on the victims machine and can launch a reverse shell for command execution.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
fin10 has executed malicious .bat files containing powershell commands.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
fin6 has used kill.bat script to disable security tools.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
fin7 used the command prompt to launch commands on the victims machine.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
fin8 has used a batch file to automate frequently executed post compromise cleanup activities. fin8 executes commands remotely via cmd.exe.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
fox kitten has used cmd.exe likely as a password changing mechanism.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
frankenstein has run a command script to set up persistence as a scheduled task named winupdate as well as other encoded commands from the command-line.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
gallium used the windows command shell to execute commands.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
gamaredon group has used various batch scripts to establish c2 and download additional files. gamaredon group's backdoor malware has also been written to a batch file.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
gold dragon uses cmd.exe to execute commands for discovery.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
goldenspy can execute remote commands via the command-line interface.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
goldmax can spawn a command shell and execute native commands.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
goopy has the ability to use cmd.exe to execute commands passed from an outlook c2 channel.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
gorgon group malware can use cmd.exe to download and execute payloads and to execute commands on the system.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
gravityrat executes commands remotely on the infected host.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
greyenergy uses cmd.exe to execute itself in-memory.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
h1n1 kills and disables services by using cmd.exe.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
hardrain uses cmd.exe to execute netshcommands.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
hawkball has created a cmd.exe reverse shell executed commands and uploaded output via the command line.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
hcdloader provides command-line access to the compromised system.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
helminth can provide a remote shell. one version of helminth uses batch scripting.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
hi-zor has the ability to create a reverse shell.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
hiddenwasp uses a script to automate tasks on the victim's machine and to assist in execution.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
higaisa used cmd.exe for execution.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
hikit has the ability to create a remote shell and run given commands.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
homefry uses a command-line interface.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
several commands are supported by the honeybee's implant via the command-line interface and theres also a utility to execute any custom command on an infected endpoint. honeybee used batch scripting.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
hoplight can launch cmd.exe to execute commands on the system.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
hotcroissant can remotely open applications on the infected host with the shellexecutea command.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
httpbrowser is capable of spawning a reverse shell on a victim.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
httpclient opens cmd.exe on the victim.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
indrik spider has used batch scripts on victim's machines.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
innaputrat launches a shell to execute commands on the victims machine.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
invisimole can launch a remote shell to execute commands.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
ixeshe is capable of executing commands via cmd.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
jcry has used cmd.exe to launch powershell.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
jhuhugit uses a .bat file to execute a .dll.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
jpin can use the command-line utility cacls.exe to change file permissions.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
jrat has command line access.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
kasidet can execute commands using cmd.exe.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
kazuar uses cmd.exe to execute commands on the victims machine.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
ke3chang has used batch scripts in its malware to install persistence mechanisms.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
keyboy can launch interactive shells for communicating with the victim machine.
t1059.003
command and scripting interpreter
windows Technique command Technique shell
keymarble can execute shell commands using cmd.exe.
t1059.007
command and scripting interpreter
javascript
apt32 has used javascript for drive-by downloads and c2 communications.
t1059.007
command and scripting interpreter
javascript
astaroth uses javascript to perform its core functionalities.
t1059.007
command and scripting interpreter
javascript
bundlore can execute javascript by injecting it into the victim's browser.
t1059.007
command and scripting interpreter
javascript
cobalt group has executed javascript scriptlets on the victim's machine.
t1059.007
command and scripting interpreter
javascript
the cobalt strike system profiler can use javascript to perform reconnaissance actions.
t1059.007
command and scripting interpreter
javascript
evil nun has used malicious javascript files on the victim's machine.
t1059.007
command and scripting interpreter
javascript
fin6 has used malicious javascript to steal payment card data from e-commerce sites.
t1059.007
command and scripting interpreter
javascript
fin7 used javascript scripts to help perform tasks on the victim's machine.
t1059.007
command and scripting interpreter
javascript
griffon is written in and executed as javascript.
t1059.007
command and scripting interpreter
javascript
higaisa used javascript to execute additional files.
t1059.007
command and scripting interpreter
javascript
invisimole can use a javascript file as part of its execution chain.
t1059.007
command and scripting interpreter
javascript
jrat has been distributed as hta files with jscript.
t1059.007
command and scripting interpreter
javascript
kimsuky has used jscript for logging and downloading additional tools.
t1059.007
command and scripting interpreter
javascript
leafminer infected victims using javascript code.
t1059.007
command and scripting interpreter
javascript
metamorfo includes payloads written in javascript.
t1059.007
command and scripting interpreter
javascript
mole rats used various implants including those built with js on target machines.
t1059.007
command and scripting interpreter
javascript
muddy water has used javascript files to execute its powerstats payload.
t1059.007
command and scripting interpreter
javascript
nanhaishu executes additional jscript code on the victim's machine.
t1059.007
command and scripting interpreter
javascript
powerstats can use javascript code for execution.
t1059.007
command and scripting interpreter
javascript
sidewinder has used javascript to drop and execute malware loaders.
t1059.007
command and scripting interpreter
javascript
silence has used js scripts.
t1059.007
command and scripting interpreter
javascript
ta505 has used javascript for code execution.
t1059.007
command and scripting interpreter
javascript
turla has used various javascript-based backdoors.
t1059.007
command and scripting interpreter
javascript
valak can execute javascript containing configuration data for establishing persistence.
t1059.007
command and scripting interpreter
javascript
xbash can execute malicious javascript payloads on the victims machine.
t1070
indicator removal on host
null
adversaries may delete or alter generated artifacts on a host system including logs or captured files such as quarantined malware
t1070
indicator removal on host
null
events not stored on the file system may require different detection mechanisms
t1070
indicator removal on host
null
file system monitoring may be used to detect improper deletion or modification of indicator files
t1070
indicator removal on host
null
locations and format of logs are platform or product specific however standard operating system logs are captured as windows events or linuxmac os files such as bash historyt1552
t1070
indicator removal on host
null
process process creation file file deletion file file modification windows registry windows registry key modification windows registry windows registry key deletion process os api execution command command execution network traffic network traffic content user account user account authentication file file metadata
t1071
application layer protocol
null
a client sending significantly more data than it receives from a server
t1071
application layer protocol
null
adversaries may communicate using application layer protocols to avoid detectionnetwork filtering by blending in with existing traffic