contentctl 3.6.0__py3-none-any.whl → 4.0.2__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- contentctl/actions/build.py +89 -0
- contentctl/actions/detection_testing/DetectionTestingManager.py +48 -49
- contentctl/actions/detection_testing/GitService.py +148 -230
- contentctl/actions/detection_testing/infrastructures/DetectionTestingInfrastructure.py +14 -24
- contentctl/actions/detection_testing/infrastructures/DetectionTestingInfrastructureContainer.py +43 -17
- contentctl/actions/detection_testing/views/DetectionTestingView.py +3 -2
- contentctl/actions/detection_testing/views/DetectionTestingViewFile.py +0 -8
- contentctl/actions/doc_gen.py +1 -1
- contentctl/actions/initialize.py +28 -65
- contentctl/actions/inspect.py +260 -0
- contentctl/actions/new_content.py +106 -13
- contentctl/actions/release_notes.py +168 -144
- contentctl/actions/reporting.py +24 -13
- contentctl/actions/test.py +39 -20
- contentctl/actions/validate.py +25 -48
- contentctl/contentctl.py +196 -754
- contentctl/enrichments/attack_enrichment.py +69 -19
- contentctl/enrichments/cve_enrichment.py +28 -13
- contentctl/helper/link_validator.py +24 -26
- contentctl/helper/utils.py +7 -3
- contentctl/input/director.py +139 -201
- contentctl/input/new_content_questions.py +63 -61
- contentctl/input/sigma_converter.py +1 -2
- contentctl/input/ssa_detection_builder.py +16 -7
- contentctl/input/yml_reader.py +4 -3
- contentctl/objects/abstract_security_content_objects/detection_abstract.py +487 -154
- contentctl/objects/abstract_security_content_objects/security_content_object_abstract.py +155 -51
- contentctl/objects/alert_action.py +40 -0
- contentctl/objects/atomic.py +212 -0
- contentctl/objects/baseline.py +44 -43
- contentctl/objects/baseline_tags.py +69 -20
- contentctl/objects/config.py +857 -125
- contentctl/objects/constants.py +0 -1
- contentctl/objects/correlation_search.py +1 -1
- contentctl/objects/data_source.py +2 -4
- contentctl/objects/deployment.py +61 -21
- contentctl/objects/deployment_email.py +2 -2
- contentctl/objects/deployment_notable.py +4 -4
- contentctl/objects/deployment_phantom.py +2 -2
- contentctl/objects/deployment_rba.py +3 -4
- contentctl/objects/deployment_scheduling.py +2 -3
- contentctl/objects/deployment_slack.py +2 -2
- contentctl/objects/detection.py +1 -5
- contentctl/objects/detection_tags.py +210 -119
- contentctl/objects/enums.py +312 -24
- contentctl/objects/integration_test.py +1 -1
- contentctl/objects/integration_test_result.py +0 -2
- contentctl/objects/investigation.py +62 -53
- contentctl/objects/investigation_tags.py +30 -6
- contentctl/objects/lookup.py +80 -31
- contentctl/objects/macro.py +29 -45
- contentctl/objects/mitre_attack_enrichment.py +29 -5
- contentctl/objects/observable.py +3 -7
- contentctl/objects/playbook.py +60 -30
- contentctl/objects/playbook_tags.py +45 -8
- contentctl/objects/security_content_object.py +1 -5
- contentctl/objects/ssa_detection.py +8 -4
- contentctl/objects/ssa_detection_tags.py +19 -26
- contentctl/objects/story.py +142 -44
- contentctl/objects/story_tags.py +46 -33
- contentctl/objects/unit_test.py +7 -2
- contentctl/objects/unit_test_attack_data.py +10 -19
- contentctl/objects/unit_test_baseline.py +1 -1
- contentctl/objects/unit_test_old.py +4 -3
- contentctl/objects/unit_test_result.py +5 -3
- contentctl/objects/unit_test_ssa.py +31 -0
- contentctl/output/api_json_output.py +202 -130
- contentctl/output/attack_nav_output.py +20 -9
- contentctl/output/attack_nav_writer.py +3 -3
- contentctl/output/ba_yml_output.py +3 -3
- contentctl/output/conf_output.py +125 -391
- contentctl/output/conf_writer.py +169 -31
- contentctl/output/jinja_writer.py +2 -2
- contentctl/output/json_writer.py +17 -5
- contentctl/output/new_content_yml_output.py +8 -7
- contentctl/output/svg_output.py +17 -27
- contentctl/output/templates/analyticstories_detections.j2 +8 -4
- contentctl/output/templates/analyticstories_investigations.j2 +1 -1
- contentctl/output/templates/analyticstories_stories.j2 +6 -6
- contentctl/output/templates/app.conf.j2 +2 -2
- contentctl/output/templates/app.manifest.j2 +2 -2
- contentctl/output/templates/detection_coverage.j2 +6 -8
- contentctl/output/templates/doc_detection_page.j2 +2 -2
- contentctl/output/templates/doc_detections.j2 +2 -2
- contentctl/output/templates/doc_stories.j2 +1 -1
- contentctl/output/templates/es_investigations_investigations.j2 +1 -1
- contentctl/output/templates/es_investigations_stories.j2 +1 -1
- contentctl/output/templates/header.j2 +2 -1
- contentctl/output/templates/macros.j2 +6 -10
- contentctl/output/templates/savedsearches_baselines.j2 +5 -5
- contentctl/output/templates/savedsearches_detections.j2 +36 -33
- contentctl/output/templates/savedsearches_investigations.j2 +4 -4
- contentctl/output/templates/transforms.j2 +4 -4
- contentctl/output/yml_writer.py +2 -2
- contentctl/templates/app_template/README.md +7 -0
- contentctl/{output/templates/splunk_app → templates/app_template}/default/data/ui/nav/default.xml +1 -0
- contentctl/templates/app_template/lookups/mitre_enrichment.csv +638 -0
- contentctl/templates/deployments/{00_default_anomaly.yml → escu_default_configuration_anomaly.yml} +1 -2
- contentctl/templates/deployments/{00_default_baseline.yml → escu_default_configuration_baseline.yml} +1 -2
- contentctl/templates/deployments/{00_default_correlation.yml → escu_default_configuration_correlation.yml} +2 -2
- contentctl/templates/deployments/{00_default_hunting.yml → escu_default_configuration_hunting.yml} +2 -2
- contentctl/templates/deployments/{00_default_ttp.yml → escu_default_configuration_ttp.yml} +1 -2
- contentctl/templates/detections/anomalous_usage_of_7zip.yml +0 -1
- contentctl/templates/stories/cobalt_strike.yml +0 -1
- {contentctl-3.6.0.dist-info → contentctl-4.0.2.dist-info}/METADATA +36 -15
- contentctl-4.0.2.dist-info/RECORD +168 -0
- contentctl/actions/detection_testing/DataManipulation.py +0 -149
- contentctl/actions/generate.py +0 -91
- contentctl/helper/config_handler.py +0 -75
- contentctl/input/baseline_builder.py +0 -66
- contentctl/input/basic_builder.py +0 -58
- contentctl/input/detection_builder.py +0 -370
- contentctl/input/investigation_builder.py +0 -42
- contentctl/input/new_content_generator.py +0 -95
- contentctl/input/playbook_builder.py +0 -68
- contentctl/input/story_builder.py +0 -106
- contentctl/objects/app.py +0 -214
- contentctl/objects/repo_config.py +0 -163
- contentctl/objects/test_config.py +0 -630
- contentctl/output/templates/macros_detections.j2 +0 -7
- contentctl/output/templates/splunk_app/README.md +0 -7
- contentctl-3.6.0.dist-info/RECORD +0 -176
- /contentctl/{output/templates/splunk_app → templates/app_template}/README/essoc_story_detail.txt +0 -0
- /contentctl/{output/templates/splunk_app → templates/app_template}/README/essoc_summary.txt +0 -0
- /contentctl/{output/templates/splunk_app → templates/app_template}/README/essoc_usage_dashboard.txt +0 -0
- /contentctl/{output/templates/splunk_app → templates/app_template}/default/analytic_stories.conf +0 -0
- /contentctl/{output/templates/splunk_app → templates/app_template}/default/app.conf +0 -0
- /contentctl/{output/templates/splunk_app → templates/app_template}/default/commands.conf +0 -0
- /contentctl/{output/templates/splunk_app → templates/app_template}/default/content-version.conf +0 -0
- /contentctl/{output/templates/splunk_app → templates/app_template}/default/data/ui/views/escu_summary.xml +0 -0
- /contentctl/{output/templates/splunk_app → templates/app_template}/default/data/ui/views/feedback.xml +0 -0
- /contentctl/{output/templates/splunk_app → templates/app_template}/default/distsearch.conf +0 -0
- /contentctl/{output/templates/splunk_app → templates/app_template}/default/usage_searches.conf +0 -0
- /contentctl/{output/templates/splunk_app → templates/app_template}/default/use_case_library.conf +0 -0
- /contentctl/{output/templates/splunk_app → templates/app_template}/metadata/default.meta +0 -0
- /contentctl/{output/templates/splunk_app → templates/app_template}/static/appIcon.png +0 -0
- /contentctl/{output/templates/splunk_app → templates/app_template}/static/appIconAlt.png +0 -0
- /contentctl/{output/templates/splunk_app → templates/app_template}/static/appIconAlt_2x.png +0 -0
- /contentctl/{output/templates/splunk_app → templates/app_template}/static/appIcon_2x.png +0 -0
- {contentctl-3.6.0.dist-info → contentctl-4.0.2.dist-info}/LICENSE.md +0 -0
- {contentctl-3.6.0.dist-info → contentctl-4.0.2.dist-info}/WHEEL +0 -0
- {contentctl-3.6.0.dist-info → contentctl-4.0.2.dist-info}/entry_points.txt +0 -0
|
@@ -0,0 +1,638 @@
|
|
|
1
|
+
mitre_id,technique,tactics,groups
|
|
2
|
+
T1059.010,AutoHotKey & AutoIT,Execution,APT39
|
|
3
|
+
T1564.012,File/Path Exclusions,Defense Evasion,no
|
|
4
|
+
T1027.013,Encrypted/Encoded File,Defense Evasion,APT18|APT19|APT28|APT32|APT33|APT39|BITTER|Blue Mockingbird|Dark Caracal|Darkhotel|Elderwood|Fox Kitten|Group5|Higaisa|Inception|Lazarus Group|Leviathan|Magic Hound|Malteiro|Metador|Mofang|Molerats|Moses Staff|OilRig|Putter Panda|Sidewinder|TA2541|TA505|TeamTNT|Threat Group-3390|Transparent Tribe|Tropic Trooper|Whitefly|menuPass
|
|
5
|
+
T1574.014,AppDomainManager,Defense Evasion|Persistence|Privilege Escalation,no
|
|
6
|
+
T1584.008,Network Devices,Resource Development,APT28|Volt Typhoon
|
|
7
|
+
T1548.006,TCC Manipulation,Defense Evasion|Privilege Escalation,no
|
|
8
|
+
T1588.007,Artificial Intelligence,Resource Development,no
|
|
9
|
+
T1218.015,Electron Applications,Defense Evasion,no
|
|
10
|
+
T1543.005,Container Service,Persistence|Privilege Escalation,no
|
|
11
|
+
T1665,Hide Infrastructure,Command And Control,APT29
|
|
12
|
+
T1216.002,SyncAppvPublishingServer,Defense Evasion,no
|
|
13
|
+
T1556.009,Conditional Access Policies,Credential Access|Defense Evasion|Persistence,Scattered Spider
|
|
14
|
+
T1027.012,LNK Icon Smuggling,Defense Evasion,no
|
|
15
|
+
T1036.009,Break Process Trees,Defense Evasion,no
|
|
16
|
+
T1555.006,Cloud Secrets Management Stores,Credential Access,no
|
|
17
|
+
T1016.002,Wi-Fi Discovery,Discovery,Magic Hound
|
|
18
|
+
T1566.004,Spearphishing Voice,Initial Access,no
|
|
19
|
+
T1598.004,Spearphishing Voice,Reconnaissance,LAPSUS$|Scattered Spider
|
|
20
|
+
T1578.005,Modify Cloud Compute Configurations,Defense Evasion,no
|
|
21
|
+
T1659,Content Injection,Command And Control|Initial Access,MoustachedBouncer
|
|
22
|
+
T1564.011,Ignore Process Interrupts,Defense Evasion,no
|
|
23
|
+
T1657,Financial Theft,Impact,Akira|Cinnamon Tempest|FIN13|Malteiro|Scattered Spider|SilverTerrier
|
|
24
|
+
T1656,Impersonation,Defense Evasion,LAPSUS$|Scattered Spider
|
|
25
|
+
T1567.004,Exfiltration Over Webhook,Exfiltration,no
|
|
26
|
+
T1098.006,Additional Container Cluster Roles,Persistence|Privilege Escalation,no
|
|
27
|
+
T1654,Log Enumeration,Discovery,APT5|Volt Typhoon
|
|
28
|
+
T1548.005,Temporary Elevated Cloud Access,Defense Evasion|Privilege Escalation,no
|
|
29
|
+
T1653,Power Settings,Persistence,no
|
|
30
|
+
T1021.008,Direct Cloud VM Connections,Lateral Movement,no
|
|
31
|
+
T1562.012,Disable or Modify Linux Audit System,Defense Evasion,no
|
|
32
|
+
T1556.008,Network Provider DLL,Credential Access|Defense Evasion|Persistence,no
|
|
33
|
+
T1652,Device Driver Discovery,Discovery,no
|
|
34
|
+
T1027.011,Fileless Storage,Defense Evasion,APT32|Turla
|
|
35
|
+
T1027.010,Command Obfuscation,Defense Evasion,APT19|APT32|Aquatic Panda|Chimera|Cobalt Group|Ember Bear|FIN6|FIN7|FIN8|Fox Kitten|GOLD SOUTHFIELD|Gamaredon Group|HEXANE|LazyScripter|Leafminer|Magic Hound|MuddyWater|Patchwork|Sandworm Team|Sidewinder|Silence|TA505|TA551|Turla|Wizard Spider
|
|
36
|
+
T1562.011,Spoof Security Alerting,Defense Evasion,no
|
|
37
|
+
T1552.008,Chat Messages,Credential Access,LAPSUS$
|
|
38
|
+
T1651,Cloud Administration Command,Execution,APT29
|
|
39
|
+
T1650,Acquire Access,Resource Development,no
|
|
40
|
+
T1036.008,Masquerade File Type,Defense Evasion,Volt Typhoon
|
|
41
|
+
T1567.003,Exfiltration to Text Storage Sites,Exfiltration,no
|
|
42
|
+
T1583.008,Malvertising,Resource Development,Mustard Tempest
|
|
43
|
+
T1021.007,Cloud Services,Lateral Movement,APT29|Scattered Spider
|
|
44
|
+
T1205.002,Socket Filters,Command And Control|Defense Evasion|Persistence,no
|
|
45
|
+
T1608.006,SEO Poisoning,Resource Development,Mustard Tempest
|
|
46
|
+
T1027.009,Embedded Payloads,Defense Evasion,no
|
|
47
|
+
T1027.008,Stripped Payloads,Defense Evasion,no
|
|
48
|
+
T1556.007,Hybrid Identity,Credential Access|Defense Evasion|Persistence,APT29
|
|
49
|
+
T1546.016,Installer Packages,Persistence|Privilege Escalation,no
|
|
50
|
+
T1027.007,Dynamic API Resolution,Defense Evasion,Lazarus Group
|
|
51
|
+
T1593.003,Code Repositories,Reconnaissance,LAPSUS$
|
|
52
|
+
T1649,Steal or Forge Authentication Certificates,Credential Access,APT29
|
|
53
|
+
T1070.009,Clear Persistence,Defense Evasion,no
|
|
54
|
+
T1070.008,Clear Mailbox Data,Defense Evasion,no
|
|
55
|
+
T1584.007,Serverless,Resource Development,no
|
|
56
|
+
T1583.007,Serverless,Resource Development,no
|
|
57
|
+
T1070.007,Clear Network Connection History and Configurations,Defense Evasion,Volt Typhoon
|
|
58
|
+
T1556.006,Multi-Factor Authentication,Credential Access|Defense Evasion|Persistence,Scattered Spider
|
|
59
|
+
T1586.003,Cloud Accounts,Resource Development,APT29
|
|
60
|
+
T1585.003,Cloud Accounts,Resource Development,no
|
|
61
|
+
T1648,Serverless Execution,Execution,no
|
|
62
|
+
T1647,Plist File Modification,Defense Evasion,no
|
|
63
|
+
T1622,Debugger Evasion,Defense Evasion|Discovery,no
|
|
64
|
+
T1621,Multi-Factor Authentication Request Generation,Credential Access,APT29|LAPSUS$|Scattered Spider
|
|
65
|
+
T1505.005,Terminal Services DLL,Persistence,no
|
|
66
|
+
T1557.003,DHCP Spoofing,Collection|Credential Access,no
|
|
67
|
+
T1059.009,Cloud API,Execution,APT29|TeamTNT
|
|
68
|
+
T1595.003,Wordlist Scanning,Reconnaissance,APT41|Volatile Cedar
|
|
69
|
+
T1098.005,Device Registration,Persistence|Privilege Escalation,APT29
|
|
70
|
+
T1574.013,KernelCallbackTable,Defense Evasion|Persistence|Privilege Escalation,Lazarus Group
|
|
71
|
+
T1556.005,Reversible Encryption,Credential Access|Defense Evasion|Persistence,no
|
|
72
|
+
T1055.015,ListPlanting,Defense Evasion|Privilege Escalation,no
|
|
73
|
+
T1564.010,Process Argument Spoofing,Defense Evasion,no
|
|
74
|
+
T1564.009,Resource Forking,Defense Evasion,no
|
|
75
|
+
T1559.003,XPC Services,Execution,no
|
|
76
|
+
T1562.010,Downgrade Attack,Defense Evasion,no
|
|
77
|
+
T1547.015,Login Items,Persistence|Privilege Escalation,no
|
|
78
|
+
T1620,Reflective Code Loading,Defense Evasion,Lazarus Group
|
|
79
|
+
T1619,Cloud Storage Object Discovery,Discovery,no
|
|
80
|
+
T1218.014,MMC,Defense Evasion,no
|
|
81
|
+
T1218.013,Mavinject,Defense Evasion,no
|
|
82
|
+
T1614.001,System Language Discovery,Discovery,Ke3chang|Malteiro
|
|
83
|
+
T1615,Group Policy Discovery,Discovery,Turla
|
|
84
|
+
T1036.007,Double File Extension,Defense Evasion,Mustang Panda
|
|
85
|
+
T1562.009,Safe Mode Boot,Defense Evasion,no
|
|
86
|
+
T1564.008,Email Hiding Rules,Defense Evasion,FIN4|Scattered Spider
|
|
87
|
+
T1505.004,IIS Components,Persistence,no
|
|
88
|
+
T1027.006,HTML Smuggling,Defense Evasion,APT29
|
|
89
|
+
T1213.003,Code Repositories,Collection,APT41|LAPSUS$|Scattered Spider
|
|
90
|
+
T1553.006,Code Signing Policy Modification,Defense Evasion,APT39|Turla
|
|
91
|
+
T1614,System Location Discovery,Discovery,SideCopy
|
|
92
|
+
T1613,Container and Resource Discovery,Discovery,TeamTNT
|
|
93
|
+
T1552.007,Container API,Credential Access,no
|
|
94
|
+
T1612,Build Image on Host,Defense Evasion,no
|
|
95
|
+
T1611,Escape to Host,Privilege Escalation,TeamTNT
|
|
96
|
+
T1204.003,Malicious Image,Execution,TeamTNT
|
|
97
|
+
T1053.007,Container Orchestration Job,Execution|Persistence|Privilege Escalation,no
|
|
98
|
+
T1610,Deploy Container,Defense Evasion|Execution,TeamTNT
|
|
99
|
+
T1609,Container Administration Command,Execution,TeamTNT
|
|
100
|
+
T1608.005,Link Target,Resource Development,LuminousMoth|Silent Librarian
|
|
101
|
+
T1608.004,Drive-by Target,Resource Development,APT32|Dragonfly|FIN7|LuminousMoth|Mustard Tempest|Threat Group-3390|Transparent Tribe
|
|
102
|
+
T1608.003,Install Digital Certificate,Resource Development,no
|
|
103
|
+
T1608.002,Upload Tool,Resource Development,Threat Group-3390
|
|
104
|
+
T1608.001,Upload Malware,Resource Development,APT32|BITTER|EXOTIC LILY|Earth Lusca|FIN7|Gamaredon Group|HEXANE|Kimsuky|LazyScripter|LuminousMoth|Mustang Panda|Mustard Tempest|SideCopy|TA2541|TA505|TeamTNT|Threat Group-3390
|
|
105
|
+
T1608,Stage Capabilities,Resource Development,Mustang Panda
|
|
106
|
+
T1016.001,Internet Connection Discovery,Discovery,APT29|FIN13|FIN8|Gamaredon Group|HAFNIUM|HEXANE|Magic Hound|TA2541|Turla
|
|
107
|
+
T1553.005,Mark-of-the-Web Bypass,Defense Evasion,APT29|TA505
|
|
108
|
+
T1555.005,Password Managers,Credential Access,Fox Kitten|LAPSUS$|Threat Group-3390
|
|
109
|
+
T1484.002,Trust Modification,Defense Evasion|Privilege Escalation,Scattered Spider
|
|
110
|
+
T1484.001,Group Policy Modification,Defense Evasion|Privilege Escalation,Cinnamon Tempest|Indrik Spider
|
|
111
|
+
T1547.014,Active Setup,Persistence|Privilege Escalation,no
|
|
112
|
+
T1606.002,SAML Tokens,Credential Access,no
|
|
113
|
+
T1606.001,Web Cookies,Credential Access,no
|
|
114
|
+
T1606,Forge Web Credentials,Credential Access,no
|
|
115
|
+
T1555.004,Windows Credential Manager,Credential Access,OilRig|Stealth Falcon|Turla|Wizard Spider
|
|
116
|
+
T1059.008,Network Device CLI,Execution,no
|
|
117
|
+
T1602.002,Network Device Configuration Dump,Collection,no
|
|
118
|
+
T1542.005,TFTP Boot,Defense Evasion|Persistence,no
|
|
119
|
+
T1542.004,ROMMONkit,Defense Evasion|Persistence,no
|
|
120
|
+
T1602.001,SNMP (MIB Dump),Collection,no
|
|
121
|
+
T1602,Data from Configuration Repository,Collection,no
|
|
122
|
+
T1601.002,Downgrade System Image,Defense Evasion,no
|
|
123
|
+
T1601.001,Patch System Image,Defense Evasion,no
|
|
124
|
+
T1601,Modify System Image,Defense Evasion,no
|
|
125
|
+
T1600.002,Disable Crypto Hardware,Defense Evasion,no
|
|
126
|
+
T1600.001,Reduce Key Space,Defense Evasion,no
|
|
127
|
+
T1600,Weaken Encryption,Defense Evasion,no
|
|
128
|
+
T1556.004,Network Device Authentication,Credential Access|Defense Evasion|Persistence,no
|
|
129
|
+
T1599.001,Network Address Translation Traversal,Defense Evasion,no
|
|
130
|
+
T1599,Network Boundary Bridging,Defense Evasion,no
|
|
131
|
+
T1020.001,Traffic Duplication,Exfiltration,no
|
|
132
|
+
T1557.002,ARP Cache Poisoning,Collection|Credential Access,Cleaver|LuminousMoth
|
|
133
|
+
T1588.006,Vulnerabilities,Resource Development,Sandworm Team
|
|
134
|
+
T1053.006,Systemd Timers,Execution|Persistence|Privilege Escalation,no
|
|
135
|
+
T1562.008,Disable or Modify Cloud Logs,Defense Evasion,APT29
|
|
136
|
+
T1547.012,Print Processors,Persistence|Privilege Escalation,Earth Lusca
|
|
137
|
+
T1598.003,Spearphishing Link,Reconnaissance,APT28|APT32|Dragonfly|Kimsuky|Magic Hound|Mustang Panda|Patchwork|Sandworm Team|Sidewinder|Silent Librarian|ZIRCONIUM
|
|
138
|
+
T1598.002,Spearphishing Attachment,Reconnaissance,Dragonfly|SideCopy|Sidewinder
|
|
139
|
+
T1598.001,Spearphishing Service,Reconnaissance,no
|
|
140
|
+
T1598,Phishing for Information,Reconnaissance,APT28|Scattered Spider|ZIRCONIUM
|
|
141
|
+
T1597.002,Purchase Technical Data,Reconnaissance,LAPSUS$
|
|
142
|
+
T1597.001,Threat Intel Vendors,Reconnaissance,no
|
|
143
|
+
T1597,Search Closed Sources,Reconnaissance,EXOTIC LILY
|
|
144
|
+
T1596.005,Scan Databases,Reconnaissance,APT41
|
|
145
|
+
T1596.004,CDNs,Reconnaissance,no
|
|
146
|
+
T1596.003,Digital Certificates,Reconnaissance,no
|
|
147
|
+
T1596.001,DNS/Passive DNS,Reconnaissance,no
|
|
148
|
+
T1596.002,WHOIS,Reconnaissance,no
|
|
149
|
+
T1596,Search Open Technical Databases,Reconnaissance,no
|
|
150
|
+
T1595.002,Vulnerability Scanning,Reconnaissance,APT28|APT29|APT41|Aquatic Panda|Dragonfly|Earth Lusca|Magic Hound|Sandworm Team|TeamTNT|Volatile Cedar
|
|
151
|
+
T1595.001,Scanning IP Blocks,Reconnaissance,TeamTNT
|
|
152
|
+
T1595,Active Scanning,Reconnaissance,no
|
|
153
|
+
T1594,Search Victim-Owned Websites,Reconnaissance,EXOTIC LILY|Kimsuky|Sandworm Team|Silent Librarian
|
|
154
|
+
T1593.002,Search Engines,Reconnaissance,Kimsuky
|
|
155
|
+
T1593.001,Social Media,Reconnaissance,EXOTIC LILY|Kimsuky
|
|
156
|
+
T1593,Search Open Websites/Domains,Reconnaissance,Sandworm Team
|
|
157
|
+
T1592.004,Client Configurations,Reconnaissance,HAFNIUM
|
|
158
|
+
T1592.003,Firmware,Reconnaissance,no
|
|
159
|
+
T1592.002,Software,Reconnaissance,Andariel|Magic Hound|Sandworm Team
|
|
160
|
+
T1592.001,Hardware,Reconnaissance,no
|
|
161
|
+
T1592,Gather Victim Host Information,Reconnaissance,no
|
|
162
|
+
T1591.004,Identify Roles,Reconnaissance,HEXANE|LAPSUS$
|
|
163
|
+
T1591.003,Identify Business Tempo,Reconnaissance,no
|
|
164
|
+
T1591.001,Determine Physical Locations,Reconnaissance,Magic Hound
|
|
165
|
+
T1591.002,Business Relationships,Reconnaissance,Dragonfly|LAPSUS$|Sandworm Team
|
|
166
|
+
T1591,Gather Victim Org Information,Reconnaissance,Kimsuky|Lazarus Group
|
|
167
|
+
T1590.006,Network Security Appliances,Reconnaissance,no
|
|
168
|
+
T1590.005,IP Addresses,Reconnaissance,Andariel|HAFNIUM|Magic Hound
|
|
169
|
+
T1590.004,Network Topology,Reconnaissance,FIN13
|
|
170
|
+
T1590.003,Network Trust Dependencies,Reconnaissance,no
|
|
171
|
+
T1590.002,DNS,Reconnaissance,no
|
|
172
|
+
T1590.001,Domain Properties,Reconnaissance,Sandworm Team
|
|
173
|
+
T1590,Gather Victim Network Information,Reconnaissance,HAFNIUM
|
|
174
|
+
T1589.003,Employee Names,Reconnaissance,APT41|Kimsuky|Sandworm Team|Silent Librarian
|
|
175
|
+
T1589.002,Email Addresses,Reconnaissance,APT32|EXOTIC LILY|HAFNIUM|HEXANE|Kimsuky|LAPSUS$|Lazarus Group|Magic Hound|Sandworm Team|Silent Librarian|TA551
|
|
176
|
+
T1589.001,Credentials,Reconnaissance,APT28|APT41|Chimera|LAPSUS$|Leviathan|Magic Hound
|
|
177
|
+
T1589,Gather Victim Identity Information,Reconnaissance,APT32|FIN13|HEXANE|LAPSUS$|Magic Hound
|
|
178
|
+
T1588.005,Exploits,Resource Development,Kimsuky
|
|
179
|
+
T1588.004,Digital Certificates,Resource Development,BlackTech|Lazarus Group|LuminousMoth|Silent Librarian
|
|
180
|
+
T1588.003,Code Signing Certificates,Resource Development,BlackTech|Ember Bear|FIN8|Threat Group-3390|Wizard Spider
|
|
181
|
+
T1588.002,Tool,Resource Development,APT-C-36|APT1|APT19|APT28|APT29|APT32|APT33|APT38|APT39|APT41|Aoqin Dragon|Aquatic Panda|BITTER|BRONZE BUTLER|BackdoorDiplomacy|BlackTech|Blue Mockingbird|Carbanak|Chimera|Cinnamon Tempest|Cleaver|Cobalt Group|CopyKittens|DarkHydrus|DarkVishnya|Dragonfly|Earth Lusca|Ember Bear|FIN10|FIN13|FIN5|FIN6|FIN7|FIN8|Ferocious Kitten|GALLIUM|Gorgon Group|HEXANE|Inception|IndigoZebra|Ke3chang|Kimsuky|LAPSUS$|Lazarus Group|Leafminer|LuminousMoth|Magic Hound|Metador|Moses Staff|MuddyWater|POLONIUM|Patchwork|PittyTiger|Sandworm Team|Silence|Silent Librarian|TA2541|TA505|Threat Group-3390|Thrip|Turla|Volt Typhoon|WIRTE|Whitefly|Wizard Spider|menuPass
|
|
182
|
+
T1588.001,Malware,Resource Development,APT1|Andariel|Aquatic Panda|BackdoorDiplomacy|Earth Lusca|LAPSUS$|LazyScripter|LuminousMoth|Metador|TA2541|TA505|Turla
|
|
183
|
+
T1588,Obtain Capabilities,Resource Development,no
|
|
184
|
+
T1587.004,Exploits,Resource Development,no
|
|
185
|
+
T1587.003,Digital Certificates,Resource Development,APT29|PROMETHIUM
|
|
186
|
+
T1587.002,Code Signing Certificates,Resource Development,PROMETHIUM|Patchwork
|
|
187
|
+
T1587.001,Malware,Resource Development,APT29|Aoqin Dragon|Cleaver|FIN13|FIN7|Indrik Spider|Ke3chang|Kimsuky|Lazarus Group|LuminousMoth|Moses Staff|Sandworm Team|TeamTNT|Turla
|
|
188
|
+
T1587,Develop Capabilities,Resource Development,Kimsuky
|
|
189
|
+
T1586.002,Email Accounts,Resource Development,APT28|APT29|HEXANE|IndigoZebra|Kimsuky|LAPSUS$|Leviathan|Magic Hound
|
|
190
|
+
T1586.001,Social Media Accounts,Resource Development,Leviathan|Sandworm Team
|
|
191
|
+
T1586,Compromise Accounts,Resource Development,no
|
|
192
|
+
T1585.002,Email Accounts,Resource Development,APT1|EXOTIC LILY|HEXANE|Indrik Spider|Kimsuky|Lazarus Group|Leviathan|Magic Hound|Mustang Panda|Sandworm Team|Silent Librarian|Wizard Spider
|
|
193
|
+
T1585.001,Social Media Accounts,Resource Development,APT32|CURIUM|Cleaver|EXOTIC LILY|Fox Kitten|HEXANE|Kimsuky|Lazarus Group|Leviathan|Magic Hound|Sandworm Team
|
|
194
|
+
T1585,Establish Accounts,Resource Development,APT17|Fox Kitten
|
|
195
|
+
T1584.006,Web Services,Resource Development,Earth Lusca|Turla
|
|
196
|
+
T1584.005,Botnet,Resource Development,Axiom|Sandworm Team
|
|
197
|
+
T1584.004,Server,Resource Development,APT16|Dragonfly|Earth Lusca|Indrik Spider|Lazarus Group|Sandworm Team|Turla|Volt Typhoon
|
|
198
|
+
T1584.003,Virtual Private Server,Resource Development,Turla
|
|
199
|
+
T1584.002,DNS Server,Resource Development,LAPSUS$
|
|
200
|
+
T1584.001,Domains,Resource Development,APT1|Kimsuky|Magic Hound|Mustard Tempest|SideCopy|Transparent Tribe
|
|
201
|
+
T1583.006,Web Services,Resource Development,APT17|APT28|APT29|APT32|Confucius|Earth Lusca|FIN7|HAFNIUM|IndigoZebra|Kimsuky|Lazarus Group|LazyScripter|Magic Hound|MuddyWater|POLONIUM|TA2541|Turla|ZIRCONIUM
|
|
202
|
+
T1583.005,Botnet,Resource Development,no
|
|
203
|
+
T1583.004,Server,Resource Development,Earth Lusca|GALLIUM|Kimsuky|Mustard Tempest|Sandworm Team
|
|
204
|
+
T1583.003,Virtual Private Server,Resource Development,APT28|Axiom|Dragonfly|HAFNIUM|LAPSUS$
|
|
205
|
+
T1583.002,DNS Server,Resource Development,Axiom|HEXANE
|
|
206
|
+
T1584,Compromise Infrastructure,Resource Development,no
|
|
207
|
+
T1583.001,Domains,Resource Development,APT1|APT28|APT32|BITTER|Dragonfly|EXOTIC LILY|Earth Lusca|FIN7|Ferocious Kitten|Gamaredon Group|HEXANE|IndigoZebra|Kimsuky|Lazarus Group|LazyScripter|Leviathan|Magic Hound|Mustang Panda|Sandworm Team|Silent Librarian|TA2541|TA505|TeamTNT|Threat Group-3390|Transparent Tribe|Winnti Group|ZIRCONIUM|menuPass
|
|
208
|
+
T1583,Acquire Infrastructure,Resource Development,Sandworm Team
|
|
209
|
+
T1564.007,VBA Stomping,Defense Evasion,no
|
|
210
|
+
T1558.004,AS-REP Roasting,Credential Access,no
|
|
211
|
+
T1580,Cloud Infrastructure Discovery,Discovery,Scattered Spider
|
|
212
|
+
T1218.012,Verclsid,Defense Evasion,no
|
|
213
|
+
T1205.001,Port Knocking,Command And Control|Defense Evasion|Persistence,PROMETHIUM
|
|
214
|
+
T1564.006,Run Virtual Instance,Defense Evasion,no
|
|
215
|
+
T1564.005,Hidden File System,Defense Evasion,Equation|Strider
|
|
216
|
+
T1556.003,Pluggable Authentication Modules,Credential Access|Defense Evasion|Persistence,no
|
|
217
|
+
T1574.012,COR_PROFILER,Defense Evasion|Persistence|Privilege Escalation,Blue Mockingbird
|
|
218
|
+
T1562.007,Disable or Modify Cloud Firewall,Defense Evasion,no
|
|
219
|
+
T1098.004,SSH Authorized Keys,Persistence|Privilege Escalation,Earth Lusca|TeamTNT
|
|
220
|
+
T1480.001,Environmental Keying,Defense Evasion,APT41|Equation
|
|
221
|
+
T1059.007,JavaScript,Execution,APT32|Cobalt Group|Earth Lusca|Ember Bear|Evilnum|FIN6|FIN7|Higaisa|Indrik Spider|Kimsuky|LazyScripter|Leafminer|Molerats|MoustachedBouncer|MuddyWater|Sidewinder|Silence|TA505|Turla
|
|
222
|
+
T1578.004,Revert Cloud Instance,Defense Evasion,no
|
|
223
|
+
T1578.003,Delete Cloud Instance,Defense Evasion,LAPSUS$
|
|
224
|
+
T1578.001,Create Snapshot,Defense Evasion,no
|
|
225
|
+
T1578.002,Create Cloud Instance,Defense Evasion,LAPSUS$|Scattered Spider
|
|
226
|
+
T1127.001,MSBuild,Defense Evasion,no
|
|
227
|
+
T1027.005,Indicator Removal from Tools,Defense Evasion,APT3|Deep Panda|GALLIUM|OilRig|Patchwork|Turla
|
|
228
|
+
T1562.006,Indicator Blocking,Defense Evasion,APT41|APT5
|
|
229
|
+
T1573.002,Asymmetric Cryptography,Command And Control,Cobalt Group|FIN6|FIN8|OilRig|TA2541|Tropic Trooper
|
|
230
|
+
T1573.001,Symmetric Cryptography,Command And Control,APT28|APT33|BRONZE BUTLER|Darkhotel|Higaisa|Inception|Lazarus Group|MuddyWater|Mustang Panda|Stealth Falcon|Volt Typhoon|ZIRCONIUM
|
|
231
|
+
T1573,Encrypted Channel,Command And Control,APT29|BITTER|Magic Hound|Tropic Trooper
|
|
232
|
+
T1027.004,Compile After Delivery,Defense Evasion,Gamaredon Group|MuddyWater|Rocke
|
|
233
|
+
T1574.004,Dylib Hijacking,Defense Evasion|Persistence|Privilege Escalation,no
|
|
234
|
+
T1546.015,Component Object Model Hijacking,Persistence|Privilege Escalation,APT28
|
|
235
|
+
T1071.004,DNS,Command And Control,APT18|APT39|APT41|Chimera|Cobalt Group|FIN7|Ke3chang|LazyScripter|OilRig|Tropic Trooper
|
|
236
|
+
T1071.003,Mail Protocols,Command And Control,APT28|APT32|Kimsuky|SilverTerrier|Turla
|
|
237
|
+
T1071.002,File Transfer Protocols,Command And Control,APT41|Dragonfly|Kimsuky|SilverTerrier
|
|
238
|
+
T1071.001,Web Protocols,Command And Control,APT18|APT19|APT28|APT32|APT33|APT37|APT38|APT39|APT41|BITTER|BRONZE BUTLER|Chimera|Cobalt Group|Confucius|Dark Caracal|FIN13|FIN4|FIN8|Gamaredon Group|HAFNIUM|Higaisa|Inception|Ke3chang|Kimsuky|Lazarus Group|LuminousMoth|Magic Hound|Metador|MuddyWater|Mustang Panda|OilRig|Orangeworm|Rancor|Rocke|Sandworm Team|Sidewinder|SilverTerrier|Stealth Falcon|TA505|TA551|TeamTNT|Threat Group-3390|Tropic Trooper|Turla|WIRTE|Windshift|Wizard Spider
|
|
239
|
+
T1572,Protocol Tunneling,Command And Control,Chimera|Cinnamon Tempest|Cobalt Group|FIN13|FIN6|Fox Kitten|Leviathan|Magic Hound|OilRig
|
|
240
|
+
T1048.003,Exfiltration Over Unencrypted Non-C2 Protocol,Exfiltration,APT32|APT33|FIN6|FIN8|Lazarus Group|OilRig|Thrip|Wizard Spider
|
|
241
|
+
T1048.002,Exfiltration Over Asymmetric Encrypted Non-C2 Protocol,Exfiltration,APT28
|
|
242
|
+
T1048.001,Exfiltration Over Symmetric Encrypted Non-C2 Protocol,Exfiltration,no
|
|
243
|
+
T1001.003,Protocol Impersonation,Command And Control,Higaisa|Lazarus Group
|
|
244
|
+
T1001.002,Steganography,Command And Control,Axiom
|
|
245
|
+
T1001.001,Junk Data,Command And Control,APT28
|
|
246
|
+
T1132.002,Non-Standard Encoding,Command And Control,no
|
|
247
|
+
T1132.001,Standard Encoding,Command And Control,APT19|APT33|BRONZE BUTLER|HAFNIUM|Lazarus Group|MuddyWater|Patchwork|Sandworm Team|TA551|Tropic Trooper
|
|
248
|
+
T1090.004,Domain Fronting,Command And Control,APT29
|
|
249
|
+
T1090.003,Multi-hop Proxy,Command And Control,APT28|APT29|FIN4|Inception|Leviathan
|
|
250
|
+
T1090.002,External Proxy,Command And Control,APT28|APT29|APT3|APT39|FIN5|GALLIUM|Lazarus Group|MuddyWater|Silence|Tonto Team|menuPass
|
|
251
|
+
T1090.001,Internal Proxy,Command And Control,APT39|FIN13|Higaisa|Lazarus Group|Strider|Turla|Volt Typhoon
|
|
252
|
+
T1102.003,One-Way Communication,Command And Control,Leviathan
|
|
253
|
+
T1102.002,Bidirectional Communication,Command And Control,APT12|APT28|APT37|APT39|Carbanak|FIN7|HEXANE|Kimsuky|Lazarus Group|Magic Hound|MuddyWater|POLONIUM|Sandworm Team|Turla|ZIRCONIUM
|
|
254
|
+
T1102.001,Dead Drop Resolver,Command And Control,APT41|BRONZE BUTLER|Patchwork|RTM|Rocke
|
|
255
|
+
T1571,Non-Standard Port,Command And Control,APT-C-36|APT32|APT33|DarkVishnya|FIN7|Lazarus Group|Magic Hound|Rocke|Sandworm Team|Silence|WIRTE
|
|
256
|
+
T1074.002,Remote Data Staging,Collection,APT28|Chimera|FIN6|FIN8|Leviathan|MoustachedBouncer|Threat Group-3390|ToddyCat|menuPass
|
|
257
|
+
T1074.001,Local Data Staging,Collection,APT28|APT3|APT39|APT5|BackdoorDiplomacy|Chimera|Dragonfly|FIN13|FIN5|GALLIUM|Indrik Spider|Kimsuky|Lazarus Group|Leviathan|MuddyWater|Mustang Panda|Patchwork|Sidewinder|TeamTNT|Threat Group-3390|Volt Typhoon|Wizard Spider|menuPass
|
|
258
|
+
T1078.004,Cloud Accounts,Defense Evasion|Initial Access|Persistence|Privilege Escalation,APT28|APT29|APT33|APT5|Ke3chang|LAPSUS$
|
|
259
|
+
T1564.004,NTFS File Attributes,Defense Evasion,APT32
|
|
260
|
+
T1564.003,Hidden Window,Defense Evasion,APT19|APT28|APT3|APT32|CopyKittens|DarkHydrus|Deep Panda|Gamaredon Group|Gorgon Group|Higaisa|Kimsuky|Magic Hound|Nomadic Octopus|ToddyCat
|
|
261
|
+
T1078.003,Local Accounts,Defense Evasion|Initial Access|Persistence|Privilege Escalation,APT29|APT32|FIN10|FIN7|HAFNIUM|Kimsuky|PROMETHIUM|Tropic Trooper|Turla
|
|
262
|
+
T1078.002,Domain Accounts,Defense Evasion|Initial Access|Persistence|Privilege Escalation,APT3|APT5|Chimera|Cinnamon Tempest|Indrik Spider|Magic Hound|Naikon|Sandworm Team|TA505|Threat Group-1314|ToddyCat|Volt Typhoon|Wizard Spider
|
|
263
|
+
T1078.001,Default Accounts,Defense Evasion|Initial Access|Persistence|Privilege Escalation,FIN13|Magic Hound
|
|
264
|
+
T1564.002,Hidden Users,Defense Evasion,Dragonfly|Kimsuky
|
|
265
|
+
T1574.006,Dynamic Linker Hijacking,Defense Evasion|Persistence|Privilege Escalation,APT41|Rocke
|
|
266
|
+
T1574.002,DLL Side-Loading,Defense Evasion|Persistence|Privilege Escalation,APT19|APT3|APT32|APT41|BRONZE BUTLER|BlackTech|Chimera|Cinnamon Tempest|Earth Lusca|FIN13|GALLIUM|Higaisa|Lazarus Group|LuminousMoth|MuddyWater|Mustang Panda|Naikon|Patchwork|SideCopy|Sidewinder|Threat Group-3390|Tropic Trooper|menuPass
|
|
267
|
+
T1574.001,DLL Search Order Hijacking,Defense Evasion|Persistence|Privilege Escalation,APT41|Aquatic Panda|BackdoorDiplomacy|Cinnamon Tempest|Evilnum|RTM|Threat Group-3390|Tonto Team|Whitefly|menuPass
|
|
268
|
+
T1574.008,Path Interception by Search Order Hijacking,Defense Evasion|Persistence|Privilege Escalation,no
|
|
269
|
+
T1574.007,Path Interception by PATH Environment Variable,Defense Evasion|Persistence|Privilege Escalation,no
|
|
270
|
+
T1574.009,Path Interception by Unquoted Path,Defense Evasion|Persistence|Privilege Escalation,no
|
|
271
|
+
T1574.011,Services Registry Permissions Weakness,Defense Evasion|Persistence|Privilege Escalation,no
|
|
272
|
+
T1574.005,Executable Installer File Permissions Weakness,Defense Evasion|Persistence|Privilege Escalation,no
|
|
273
|
+
T1574.010,Services File Permissions Weakness,Defense Evasion|Persistence|Privilege Escalation,no
|
|
274
|
+
T1574,Hijack Execution Flow,Defense Evasion|Persistence|Privilege Escalation,no
|
|
275
|
+
T1069.001,Local Groups,Discovery,Chimera|HEXANE|OilRig|Tonto Team|Turla|Volt Typhoon|admin@338
|
|
276
|
+
T1570,Lateral Tool Transfer,Lateral Movement,APT32|APT41|Aoqin Dragon|Chimera|FIN10|GALLIUM|Magic Hound|Sandworm Team|Turla|Volt Typhoon|Wizard Spider
|
|
277
|
+
T1568.003,DNS Calculation,Command And Control,APT12
|
|
278
|
+
T1204.002,Malicious File,Execution,APT-C-36|APT12|APT19|APT28|APT29|APT30|APT32|APT33|APT37|APT38|APT39|Ajax Security Team|Andariel|Aoqin Dragon|BITTER|BRONZE BUTLER|BlackTech|CURIUM|Cobalt Group|Confucius|Dark Caracal|DarkHydrus|Darkhotel|Dragonfly|EXOTIC LILY|Earth Lusca|Elderwood|Ember Bear|FIN4|FIN6|FIN7|FIN8|Ferocious Kitten|Gallmaker|Gamaredon Group|Gorgon Group|HEXANE|Higaisa|Inception|IndigoZebra|Indrik Spider|Kimsuky|Lazarus Group|LazyScripter|Leviathan|Machete|Magic Hound|Malteiro|Mofang|Molerats|MuddyWater|Mustang Panda|Naikon|Nomadic Octopus|OilRig|PLATINUM|PROMETHIUM|Patchwork|RTM|Rancor|Sandworm Team|SideCopy|Sidewinder|Silence|TA2541|TA459|TA505|TA551|The White Company|Threat Group-3390|Tonto Team|Transparent Tribe|Tropic Trooper|WIRTE|Whitefly|Windshift|Wizard Spider|admin@338|menuPass
|
|
279
|
+
T1204.001,Malicious Link,Execution,APT28|APT29|APT3|APT32|APT33|APT39|BlackTech|Cobalt Group|Confucius|EXOTIC LILY|Earth Lusca|Elderwood|Ember Bear|Evilnum|FIN4|FIN7|FIN8|Kimsuky|LazyScripter|Leviathan|LuminousMoth|Machete|Magic Hound|Mofang|Molerats|MuddyWater|Mustang Panda|Mustard Tempest|OilRig|Patchwork|Sandworm Team|Sidewinder|TA2541|TA505|Transparent Tribe|Turla|Windshift|Wizard Spider|ZIRCONIUM
|
|
280
|
+
T1195.003,Compromise Hardware Supply Chain,Initial Access,no
|
|
281
|
+
T1195.002,Compromise Software Supply Chain,Initial Access,APT41|Cobalt Group|Dragonfly|FIN7|GOLD SOUTHFIELD|Sandworm Team|Threat Group-3390
|
|
282
|
+
T1195.001,Compromise Software Dependencies and Development Tools,Initial Access,no
|
|
283
|
+
T1568.001,Fast Flux DNS,Command And Control,TA505|menuPass
|
|
284
|
+
T1052.001,Exfiltration over USB,Exfiltration,Mustang Panda|Tropic Trooper
|
|
285
|
+
T1569.002,Service Execution,Execution,APT32|APT38|APT39|APT41|Blue Mockingbird|Chimera|FIN6|Ke3chang|Silence|Wizard Spider
|
|
286
|
+
T1569.001,Launchctl,Execution,no
|
|
287
|
+
T1569,System Services,Execution,TeamTNT
|
|
288
|
+
T1568.002,Domain Generation Algorithms,Command And Control,APT41|TA551
|
|
289
|
+
T1568,Dynamic Resolution,Command And Control,APT29|BITTER|Gamaredon Group|TA2541|Transparent Tribe
|
|
290
|
+
T1011.001,Exfiltration Over Bluetooth,Exfiltration,no
|
|
291
|
+
T1567.002,Exfiltration to Cloud Storage,Exfiltration,Akira|Chimera|Cinnamon Tempest|Confucius|Earth Lusca|FIN7|HAFNIUM|HEXANE|Kimsuky|Leviathan|LuminousMoth|POLONIUM|Scattered Spider|Threat Group-3390|ToddyCat|Turla|Wizard Spider|ZIRCONIUM
|
|
292
|
+
T1567.001,Exfiltration to Code Repository,Exfiltration,no
|
|
293
|
+
T1059.006,Python,Execution,APT29|APT37|APT39|BRONZE BUTLER|Cinnamon Tempest|Dragonfly|Earth Lusca|Kimsuky|Machete|MuddyWater|Rocke|Tonto Team|Turla|ZIRCONIUM
|
|
294
|
+
T1059.005,Visual Basic,Execution,APT-C-36|APT32|APT33|APT37|APT38|APT39|BRONZE BUTLER|Cobalt Group|Confucius|Earth Lusca|FIN13|FIN4|FIN7|Gamaredon Group|Gorgon Group|HEXANE|Higaisa|Inception|Kimsuky|Lazarus Group|LazyScripter|Leviathan|Machete|Magic Hound|Malteiro|Molerats|MuddyWater|Mustang Panda|OilRig|Patchwork|Rancor|Sandworm Team|SideCopy|Sidewinder|Silence|TA2541|TA459|TA505|Transparent Tribe|Turla|WIRTE|Windshift
|
|
295
|
+
T1059.004,Unix Shell,Execution,APT41|Rocke|TeamTNT
|
|
296
|
+
T1059.003,Windows Command Shell,Execution,APT1|APT18|APT28|APT3|APT32|APT37|APT38|APT41|APT5|Aquatic Panda|BRONZE BUTLER|Blue Mockingbird|Chimera|Cinnamon Tempest|Cobalt Group|Dark Caracal|Darkhotel|Dragonfly|Ember Bear|FIN10|FIN13|FIN6|FIN7|FIN8|Fox Kitten|GALLIUM|Gamaredon Group|Gorgon Group|HAFNIUM|Higaisa|Indrik Spider|Ke3chang|Kimsuky|Lazarus Group|LazyScripter|Machete|Magic Hound|Metador|MuddyWater|Mustang Panda|Nomadic Octopus|OilRig|Patchwork|Rancor|Silence|Sowbug|Suckfly|TA505|TA551|TeamTNT|Threat Group-1314|Threat Group-3390|ToddyCat|Tropic Trooper|Turla|Volt Typhoon|Wizard Spider|ZIRCONIUM|admin@338|menuPass
|
|
297
|
+
T1059.002,AppleScript,Execution,no
|
|
298
|
+
T1059.001,PowerShell,Execution,APT19|APT28|APT29|APT3|APT32|APT33|APT38|APT39|APT41|APT5|Aquatic Panda|BRONZE BUTLER|Blue Mockingbird|Chimera|Cinnamon Tempest|Cobalt Group|Confucius|CopyKittens|DarkHydrus|DarkVishnya|Deep Panda|Dragonfly|Earth Lusca|Ember Bear|FIN10|FIN13|FIN6|FIN7|FIN8|Fox Kitten|GALLIUM|GOLD SOUTHFIELD|Gallmaker|Gamaredon Group|Gorgon Group|HAFNIUM|HEXANE|Inception|Indrik Spider|Kimsuky|Lazarus Group|LazyScripter|Leviathan|Magic Hound|Molerats|MoustachedBouncer|MuddyWater|Mustang Panda|Nomadic Octopus|OilRig|Patchwork|Poseidon Group|Sandworm Team|Sidewinder|Silence|Stealth Falcon|TA2541|TA459|TA505|TeamTNT|Threat Group-3390|Thrip|ToddyCat|Tonto Team|Turla|Volt Typhoon|WIRTE|Wizard Spider|menuPass
|
|
299
|
+
T1567,Exfiltration Over Web Service,Exfiltration,APT28|Magic Hound
|
|
300
|
+
T1497.003,Time Based Evasion,Defense Evasion|Discovery,no
|
|
301
|
+
T1497.002,User Activity Based Checks,Defense Evasion|Discovery,Darkhotel|FIN7
|
|
302
|
+
T1497.001,System Checks,Defense Evasion|Discovery,Darkhotel|Evilnum|OilRig|Volt Typhoon
|
|
303
|
+
T1498.002,Reflection Amplification,Impact,no
|
|
304
|
+
T1498.001,Direct Network Flood,Impact,no
|
|
305
|
+
T1566.003,Spearphishing via Service,Initial Access,APT29|Ajax Security Team|CURIUM|Dark Caracal|EXOTIC LILY|FIN6|Lazarus Group|Magic Hound|OilRig|ToddyCat|Windshift
|
|
306
|
+
T1566.002,Spearphishing Link,Initial Access,APT1|APT28|APT29|APT3|APT32|APT33|APT39|BlackTech|Cobalt Group|Confucius|EXOTIC LILY|Earth Lusca|Elderwood|Ember Bear|Evilnum|FIN4|FIN7|FIN8|Kimsuky|Lazarus Group|LazyScripter|Leviathan|LuminousMoth|Machete|Magic Hound|Mofang|Molerats|MuddyWater|Mustang Panda|Mustard Tempest|OilRig|Patchwork|Sandworm Team|Sidewinder|TA2541|TA505|Transparent Tribe|Turla|Windshift|Wizard Spider|ZIRCONIUM
|
|
307
|
+
T1566.001,Spearphishing Attachment,Initial Access,APT-C-36|APT1|APT12|APT19|APT28|APT29|APT30|APT32|APT33|APT37|APT38|APT39|APT41|Ajax Security Team|Andariel|BITTER|BRONZE BUTLER|BlackTech|Cobalt Group|Confucius|DarkHydrus|Darkhotel|Dragonfly|EXOTIC LILY|Elderwood|Ember Bear|FIN4|FIN6|FIN7|FIN8|Ferocious Kitten|Gallmaker|Gamaredon Group|Gorgon Group|Higaisa|Inception|IndigoZebra|Kimsuky|Lazarus Group|LazyScripter|Leviathan|Machete|Malteiro|Mofang|Molerats|MuddyWater|Mustang Panda|Naikon|Nomadic Octopus|OilRig|PLATINUM|Patchwork|RTM|Rancor|Sandworm Team|SideCopy|Sidewinder|Silence|TA2541|TA459|TA505|TA551|The White Company|Threat Group-3390|Tonto Team|Transparent Tribe|Tropic Trooper|WIRTE|Windshift|Wizard Spider|admin@338|menuPass
|
|
308
|
+
T1566,Phishing,Initial Access,Axiom|GOLD SOUTHFIELD
|
|
309
|
+
T1565.003,Runtime Data Manipulation,Impact,APT38
|
|
310
|
+
T1565.002,Transmitted Data Manipulation,Impact,APT38
|
|
311
|
+
T1565.001,Stored Data Manipulation,Impact,APT38
|
|
312
|
+
T1565,Data Manipulation,Impact,FIN13
|
|
313
|
+
T1564.001,Hidden Files and Directories,Defense Evasion,APT28|APT32|FIN13|HAFNIUM|Lazarus Group|LuminousMoth|Mustang Panda|Rocke|Transparent Tribe|Tropic Trooper
|
|
314
|
+
T1564,Hide Artifacts,Defense Evasion,no
|
|
315
|
+
T1563.002,RDP Hijacking,Lateral Movement,Axiom
|
|
316
|
+
T1563.001,SSH Hijacking,Lateral Movement,no
|
|
317
|
+
T1563,Remote Service Session Hijacking,Lateral Movement,no
|
|
318
|
+
T1518.001,Security Software Discovery,Discovery,APT38|Aquatic Panda|Cobalt Group|Darkhotel|FIN8|Kimsuky|Malteiro|MuddyWater|Naikon|Patchwork|Rocke|SideCopy|Sidewinder|TA2541|TeamTNT|The White Company|ToddyCat|Tropic Trooper|Turla|Windshift|Wizard Spider
|
|
319
|
+
T1069.003,Cloud Groups,Discovery,no
|
|
320
|
+
T1069.002,Domain Groups,Discovery,Dragonfly|FIN7|Inception|Ke3chang|LAPSUS$|OilRig|ToddyCat|Turla|Volt Typhoon
|
|
321
|
+
T1087.004,Cloud Account,Discovery,APT29
|
|
322
|
+
T1087.003,Email Account,Discovery,Magic Hound|Sandworm Team|TA505
|
|
323
|
+
T1087.002,Domain Account,Discovery,APT41|BRONZE BUTLER|Chimera|Dragonfly|FIN13|FIN6|Fox Kitten|Ke3chang|LAPSUS$|MuddyWater|OilRig|Poseidon Group|Sandworm Team|Scattered Spider|ToddyCat|Turla|Volt Typhoon|Wizard Spider|menuPass
|
|
324
|
+
T1087.001,Local Account,Discovery,APT1|APT3|APT32|APT41|Chimera|Fox Kitten|Ke3chang|Moses Staff|OilRig|Poseidon Group|Threat Group-3390|Turla|admin@338
|
|
325
|
+
T1553.004,Install Root Certificate,Defense Evasion,no
|
|
326
|
+
T1562.004,Disable or Modify System Firewall,Defense Evasion,APT38|Carbanak|Dragonfly|Kimsuky|Lazarus Group|Magic Hound|Moses Staff|Rocke|TeamTNT|ToddyCat
|
|
327
|
+
T1562.003,Impair Command History Logging,Defense Evasion,APT38
|
|
328
|
+
T1562.002,Disable Windows Event Logging,Defense Evasion,Magic Hound|Threat Group-3390
|
|
329
|
+
T1562.001,Disable or Modify Tools,Defense Evasion,Aquatic Panda|BRONZE BUTLER|Ember Bear|FIN6|Gamaredon Group|Gorgon Group|Indrik Spider|Kimsuky|Lazarus Group|Magic Hound|MuddyWater|Putter Panda|Rocke|TA2541|TA505|TeamTNT|Turla|Wizard Spider
|
|
330
|
+
T1562,Impair Defenses,Defense Evasion,Magic Hound
|
|
331
|
+
T1003.004,LSA Secrets,Credential Access,APT29|APT33|Dragonfly|Ke3chang|Leafminer|MuddyWater|OilRig|Threat Group-3390|menuPass
|
|
332
|
+
T1003.005,Cached Domain Credentials,Credential Access,APT33|Leafminer|MuddyWater|OilRig
|
|
333
|
+
T1561.002,Disk Structure Wipe,Impact,APT37|APT38|Lazarus Group|Sandworm Team
|
|
334
|
+
T1561.001,Disk Content Wipe,Impact,Lazarus Group
|
|
335
|
+
T1561,Disk Wipe,Impact,no
|
|
336
|
+
T1560.003,Archive via Custom Method,Collection,CopyKittens|FIN6|Kimsuky|Lazarus Group|Mustang Panda
|
|
337
|
+
T1560.002,Archive via Library,Collection,Lazarus Group|Threat Group-3390
|
|
338
|
+
T1560.001,Archive via Utility,Collection,APT1|APT28|APT3|APT33|APT39|APT41|APT5|Akira|Aquatic Panda|BRONZE BUTLER|Chimera|CopyKittens|Earth Lusca|FIN13|FIN8|Fox Kitten|GALLIUM|Gallmaker|HAFNIUM|Ke3chang|Kimsuky|Magic Hound|MuddyWater|Mustang Panda|Sowbug|ToddyCat|Turla|Volt Typhoon|Wizard Spider|menuPass
|
|
339
|
+
T1560,Archive Collected Data,Collection,APT28|APT32|Axiom|Dragonfly|FIN6|Ke3chang|Lazarus Group|Leviathan|LuminousMoth|Patchwork|menuPass
|
|
340
|
+
T1499.004,Application or System Exploitation,Impact,no
|
|
341
|
+
T1499.003,Application Exhaustion Flood,Impact,no
|
|
342
|
+
T1499.002,Service Exhaustion Flood,Impact,no
|
|
343
|
+
T1499.001,OS Exhaustion Flood,Impact,no
|
|
344
|
+
T1491.002,External Defacement,Impact,Sandworm Team
|
|
345
|
+
T1491.001,Internal Defacement,Impact,Gamaredon Group|Lazarus Group
|
|
346
|
+
T1114.003,Email Forwarding Rule,Collection,Kimsuky|LAPSUS$|Silent Librarian
|
|
347
|
+
T1114.002,Remote Email Collection,Collection,APT1|APT28|APT29|Chimera|Dragonfly|FIN4|HAFNIUM|Ke3chang|Kimsuky|Leafminer|Magic Hound
|
|
348
|
+
T1114.001,Local Email Collection,Collection,APT1|Chimera|Magic Hound
|
|
349
|
+
T1134.005,SID-History Injection,Defense Evasion|Privilege Escalation,no
|
|
350
|
+
T1134.004,Parent PID Spoofing,Defense Evasion|Privilege Escalation,no
|
|
351
|
+
T1134.003,Make and Impersonate Token,Defense Evasion|Privilege Escalation,FIN13
|
|
352
|
+
T1134.002,Create Process with Token,Defense Evasion|Privilege Escalation,Lazarus Group|Turla
|
|
353
|
+
T1134.001,Token Impersonation/Theft,Defense Evasion|Privilege Escalation,APT28|FIN8
|
|
354
|
+
T1213.002,Sharepoint,Collection,APT28|Akira|Chimera|Ke3chang|LAPSUS$
|
|
355
|
+
T1213.001,Confluence,Collection,LAPSUS$
|
|
356
|
+
T1555.003,Credentials from Web Browsers,Credential Access,APT3|APT33|APT37|APT41|Ajax Security Team|FIN6|HEXANE|Inception|Kimsuky|LAPSUS$|Leafminer|Malteiro|Molerats|MuddyWater|OilRig|Patchwork|Sandworm Team|Stealth Falcon|TA505|ZIRCONIUM
|
|
357
|
+
T1555.002,Securityd Memory,Credential Access,no
|
|
358
|
+
T1555.001,Keychain,Credential Access,no
|
|
359
|
+
T1559.002,Dynamic Data Exchange,Execution,APT28|APT37|BITTER|Cobalt Group|FIN7|Gallmaker|Leviathan|MuddyWater|Patchwork|Sidewinder|TA505
|
|
360
|
+
T1559.001,Component Object Model,Execution,Gamaredon Group|MuddyWater
|
|
361
|
+
T1559,Inter-Process Communication,Execution,no
|
|
362
|
+
T1558.002,Silver Ticket,Credential Access,no
|
|
363
|
+
T1558.001,Golden Ticket,Credential Access,Ke3chang
|
|
364
|
+
T1558,Steal or Forge Kerberos Tickets,Credential Access,no
|
|
365
|
+
T1557.001,LLMNR/NBT-NS Poisoning and SMB Relay,Collection|Credential Access,Lazarus Group|Wizard Spider
|
|
366
|
+
T1557,Adversary-in-the-Middle,Collection|Credential Access,Kimsuky
|
|
367
|
+
T1556.002,Password Filter DLL,Credential Access|Defense Evasion|Persistence,Strider
|
|
368
|
+
T1556.001,Domain Controller Authentication,Credential Access|Defense Evasion|Persistence,Chimera
|
|
369
|
+
T1556,Modify Authentication Process,Credential Access|Defense Evasion|Persistence,FIN13
|
|
370
|
+
T1056.004,Credential API Hooking,Collection|Credential Access,PLATINUM
|
|
371
|
+
T1056.003,Web Portal Capture,Collection|Credential Access,no
|
|
372
|
+
T1056.002,GUI Input Capture,Collection|Credential Access,FIN4
|
|
373
|
+
T1056.001,Keylogging,Collection|Credential Access,APT28|APT3|APT32|APT38|APT39|APT41|APT5|Ajax Security Team|Darkhotel|FIN13|FIN4|Group5|HEXANE|Ke3chang|Kimsuky|Lazarus Group|Magic Hound|OilRig|PLATINUM|Sandworm Team|Sowbug|Threat Group-3390|Tonto Team|menuPass
|
|
374
|
+
T1555,Credentials from Password Stores,Credential Access,APT33|APT39|Evilnum|FIN6|HEXANE|Leafminer|Malteiro|MuddyWater|OilRig|Stealth Falcon|Volt Typhoon
|
|
375
|
+
T1552.005,Cloud Instance Metadata API,Credential Access,TeamTNT
|
|
376
|
+
T1003.008,/etc/passwd and /etc/shadow,Credential Access,no
|
|
377
|
+
T1003.007,Proc Filesystem,Credential Access,no
|
|
378
|
+
T1003.006,DCSync,Credential Access,Earth Lusca|LAPSUS$
|
|
379
|
+
T1558.003,Kerberoasting,Credential Access,FIN7|Wizard Spider
|
|
380
|
+
T1552.006,Group Policy Preferences,Credential Access,APT33|Wizard Spider
|
|
381
|
+
T1003.003,NTDS,Credential Access,APT28|APT41|Chimera|Dragonfly|FIN13|FIN6|Fox Kitten|HAFNIUM|Ke3chang|LAPSUS$|Mustang Panda|Sandworm Team|Scattered Spider|Volt Typhoon|Wizard Spider|menuPass
|
|
382
|
+
T1003.002,Security Account Manager,Credential Access,APT29|APT41|APT5|Dragonfly|FIN13|GALLIUM|Ke3chang|Threat Group-3390|Wizard Spider|menuPass
|
|
383
|
+
T1003.001,LSASS Memory,Credential Access,APT1|APT28|APT3|APT32|APT33|APT39|APT41|APT5|Aquatic Panda|BRONZE BUTLER|Blue Mockingbird|Cleaver|Earth Lusca|FIN13|FIN6|FIN8|Fox Kitten|GALLIUM|HAFNIUM|Indrik Spider|Ke3chang|Kimsuky|Leafminer|Leviathan|Magic Hound|MuddyWater|OilRig|PLATINUM|Sandworm Team|Silence|Threat Group-3390|Volt Typhoon|Whitefly|Wizard Spider
|
|
384
|
+
T1110.004,Credential Stuffing,Credential Access,Chimera
|
|
385
|
+
T1110.003,Password Spraying,Credential Access,APT28|APT29|APT33|Chimera|HEXANE|Lazarus Group|Leafminer|Silent Librarian
|
|
386
|
+
T1110.002,Password Cracking,Credential Access,APT3|APT41|Dragonfly|FIN6
|
|
387
|
+
T1110.001,Password Guessing,Credential Access,APT28|APT29
|
|
388
|
+
T1021.006,Windows Remote Management,Lateral Movement,Chimera|FIN13|Threat Group-3390|Wizard Spider
|
|
389
|
+
T1021.005,VNC,Lateral Movement,FIN7|Fox Kitten|GCMAN|Gamaredon Group
|
|
390
|
+
T1021.004,SSH,Lateral Movement,APT39|APT5|BlackTech|FIN13|FIN7|Fox Kitten|GCMAN|Lazarus Group|Leviathan|OilRig|Rocke|TeamTNT|menuPass
|
|
391
|
+
T1021.003,Distributed Component Object Model,Lateral Movement,no
|
|
392
|
+
T1021.002,SMB/Windows Admin Shares,Lateral Movement,APT28|APT3|APT32|APT39|APT41|Blue Mockingbird|Chimera|Cinnamon Tempest|Deep Panda|FIN13|FIN8|Fox Kitten|Ke3chang|Lazarus Group|Moses Staff|Orangeworm|Sandworm Team|Threat Group-1314|ToddyCat|Turla|Wizard Spider
|
|
393
|
+
T1021.001,Remote Desktop Protocol,Lateral Movement,APT1|APT3|APT39|APT41|APT5|Axiom|Blue Mockingbird|Chimera|Cobalt Group|Dragonfly|FIN10|FIN13|FIN6|FIN7|FIN8|Fox Kitten|HEXANE|Kimsuky|Lazarus Group|Leviathan|Magic Hound|OilRig|Patchwork|Silence|Wizard Spider|menuPass
|
|
394
|
+
T1554,Compromise Host Software Binary,Persistence,APT5
|
|
395
|
+
T1036.006,Space after Filename,Defense Evasion,no
|
|
396
|
+
T1036.005,Match Legitimate Name or Location,Defense Evasion,APT1|APT28|APT29|APT32|APT39|APT41|APT5|Aoqin Dragon|BRONZE BUTLER|BackdoorDiplomacy|Blue Mockingbird|Carbanak|Chimera|Darkhotel|Earth Lusca|FIN13|FIN7|Ferocious Kitten|Fox Kitten|Gamaredon Group|Indrik Spider|Ke3chang|Kimsuky|Lazarus Group|LuminousMoth|Machete|Magic Hound|MuddyWater|Mustang Panda|Mustard Tempest|Naikon|PROMETHIUM|Patchwork|Poseidon Group|Rocke|Sandworm Team|SideCopy|Sidewinder|Silence|Sowbug|TA2541|TeamTNT|ToddyCat|Transparent Tribe|Tropic Trooper|Volt Typhoon|WIRTE|Whitefly|admin@338|menuPass
|
|
397
|
+
T1036.004,Masquerade Task or Service,Defense Evasion,APT-C-36|APT32|APT41|BITTER|BackdoorDiplomacy|Carbanak|FIN13|FIN6|FIN7|Fox Kitten|Higaisa|Kimsuky|Lazarus Group|Magic Hound|Naikon|PROMETHIUM|Wizard Spider|ZIRCONIUM
|
|
398
|
+
T1036.003,Rename System Utilities,Defense Evasion,APT32|GALLIUM|Lazarus Group|menuPass
|
|
399
|
+
T1036.002,Right-to-Left Override,Defense Evasion,BRONZE BUTLER|BlackTech|Ferocious Kitten|Ke3chang|Scarlet Mimic
|
|
400
|
+
T1036.001,Invalid Code Signature,Defense Evasion,APT37|Windshift
|
|
401
|
+
T1553.003,SIP and Trust Provider Hijacking,Defense Evasion,no
|
|
402
|
+
T1553.002,Code Signing,Defense Evasion,APT41|CopyKittens|Darkhotel|Ember Bear|FIN6|FIN7|GALLIUM|Kimsuky|Lazarus Group|Leviathan|LuminousMoth|Molerats|Moses Staff|PROMETHIUM|Patchwork|Scattered Spider|Silence|Suckfly|TA505|Winnti Group|Wizard Spider|menuPass
|
|
403
|
+
T1553.001,Gatekeeper Bypass,Defense Evasion,no
|
|
404
|
+
T1553,Subvert Trust Controls,Defense Evasion,Axiom
|
|
405
|
+
T1027.003,Steganography,Defense Evasion,APT37|Andariel|BRONZE BUTLER|Earth Lusca|Leviathan|MuddyWater|TA551|Tropic Trooper
|
|
406
|
+
T1027.002,Software Packing,Defense Evasion,APT29|APT3|APT38|APT39|APT41|Aoqin Dragon|Dark Caracal|Elderwood|Ember Bear|GALLIUM|Kimsuky|MoustachedBouncer|Patchwork|Rocke|TA2541|TA505|TeamTNT|The White Company|Threat Group-3390|ZIRCONIUM
|
|
407
|
+
T1027.001,Binary Padding,Defense Evasion,APT29|APT32|BRONZE BUTLER|Ember Bear|FIN7|Gamaredon Group|Higaisa|Leviathan|Moafee|Mustang Panda|Patchwork
|
|
408
|
+
T1222.002,Linux and Mac File and Directory Permissions Modification,Defense Evasion,APT32|Rocke|TeamTNT
|
|
409
|
+
T1222.001,Windows File and Directory Permissions Modification,Defense Evasion,Wizard Spider
|
|
410
|
+
T1552.004,Private Keys,Credential Access,Rocke|Scattered Spider|TeamTNT
|
|
411
|
+
T1552.003,Bash History,Credential Access,no
|
|
412
|
+
T1552.002,Credentials in Registry,Credential Access,APT32
|
|
413
|
+
T1552.001,Credentials In Files,Credential Access,APT3|APT33|FIN13|Fox Kitten|Kimsuky|Leafminer|MuddyWater|OilRig|Scattered Spider|TA505|TeamTNT
|
|
414
|
+
T1552,Unsecured Credentials,Credential Access,no
|
|
415
|
+
T1216.001,PubPrn,Defense Evasion,APT32
|
|
416
|
+
T1070.006,Timestomp,Defense Evasion,APT28|APT29|APT32|APT38|APT5|Chimera|Kimsuky|Lazarus Group|Rocke
|
|
417
|
+
T1070.005,Network Share Connection Removal,Defense Evasion,Threat Group-3390
|
|
418
|
+
T1070.004,File Deletion,Defense Evasion,APT18|APT28|APT29|APT3|APT32|APT38|APT39|APT41|APT5|Aquatic Panda|BRONZE BUTLER|Chimera|Cobalt Group|Dragonfly|Evilnum|FIN10|FIN5|FIN6|FIN8|Gamaredon Group|Group5|Kimsuky|Lazarus Group|Magic Hound|Metador|Mustang Panda|OilRig|Patchwork|Rocke|Sandworm Team|Silence|TeamTNT|The White Company|Threat Group-3390|Tropic Trooper|Volt Typhoon|Wizard Spider|menuPass
|
|
419
|
+
T1070.003,Clear Command History,Defense Evasion,APT41|APT5|Lazarus Group|Magic Hound|TeamTNT|menuPass
|
|
420
|
+
T1550.004,Web Session Cookie,Defense Evasion|Lateral Movement,no
|
|
421
|
+
T1550.001,Application Access Token,Defense Evasion|Lateral Movement,APT28
|
|
422
|
+
T1550.003,Pass the Ticket,Defense Evasion|Lateral Movement,APT29|APT32|BRONZE BUTLER
|
|
423
|
+
T1550.002,Pass the Hash,Defense Evasion|Lateral Movement,APT1|APT28|APT32|APT41|Chimera|FIN13|GALLIUM|Kimsuky|Wizard Spider
|
|
424
|
+
T1550,Use Alternate Authentication Material,Defense Evasion|Lateral Movement,no
|
|
425
|
+
T1548.004,Elevated Execution with Prompt,Defense Evasion|Privilege Escalation,no
|
|
426
|
+
T1548.003,Sudo and Sudo Caching,Defense Evasion|Privilege Escalation,no
|
|
427
|
+
T1548.002,Bypass User Account Control,Defense Evasion|Privilege Escalation,APT29|APT37|BRONZE BUTLER|Cobalt Group|Earth Lusca|Evilnum|MuddyWater|Patchwork|Threat Group-3390
|
|
428
|
+
T1548.001,Setuid and Setgid,Defense Evasion|Privilege Escalation,no
|
|
429
|
+
T1548,Abuse Elevation Control Mechanism,Defense Evasion|Privilege Escalation,no
|
|
430
|
+
T1136.003,Cloud Account,Persistence,APT29|LAPSUS$
|
|
431
|
+
T1070.002,Clear Linux or Mac System Logs,Defense Evasion,Rocke|TeamTNT
|
|
432
|
+
T1070.001,Clear Windows Event Logs,Defense Evasion,APT28|APT32|APT38|APT41|Chimera|Dragonfly|FIN5|FIN8|Indrik Spider
|
|
433
|
+
T1136.002,Domain Account,Persistence,GALLIUM|HAFNIUM|Wizard Spider
|
|
434
|
+
T1136.001,Local Account,Persistence,APT3|APT39|APT41|APT5|Dragonfly|FIN13|Fox Kitten|Kimsuky|Leafminer|Magic Hound|TeamTNT|Wizard Spider
|
|
435
|
+
T1547.010,Port Monitors,Persistence|Privilege Escalation,no
|
|
436
|
+
T1547.009,Shortcut Modification,Persistence|Privilege Escalation,APT39|Gorgon Group|Lazarus Group|Leviathan
|
|
437
|
+
T1547.008,LSASS Driver,Persistence|Privilege Escalation,no
|
|
438
|
+
T1547.007,Re-opened Applications,Persistence|Privilege Escalation,no
|
|
439
|
+
T1547.006,Kernel Modules and Extensions,Persistence|Privilege Escalation,no
|
|
440
|
+
T1547.005,Security Support Provider,Persistence|Privilege Escalation,no
|
|
441
|
+
T1547.004,Winlogon Helper DLL,Persistence|Privilege Escalation,Tropic Trooper|Turla|Wizard Spider
|
|
442
|
+
T1547.003,Time Providers,Persistence|Privilege Escalation,no
|
|
443
|
+
T1546.014,Emond,Persistence|Privilege Escalation,no
|
|
444
|
+
T1546.013,PowerShell Profile,Persistence|Privilege Escalation,Turla
|
|
445
|
+
T1546.012,Image File Execution Options Injection,Persistence|Privilege Escalation,no
|
|
446
|
+
T1218.008,Odbcconf,Defense Evasion,Cobalt Group
|
|
447
|
+
T1546.011,Application Shimming,Persistence|Privilege Escalation,FIN7
|
|
448
|
+
T1547.002,Authentication Package,Persistence|Privilege Escalation,no
|
|
449
|
+
T1546.010,AppInit DLLs,Persistence|Privilege Escalation,APT39
|
|
450
|
+
T1546.009,AppCert DLLs,Persistence|Privilege Escalation,no
|
|
451
|
+
T1218.007,Msiexec,Defense Evasion,Machete|Molerats|Rancor|TA505|ZIRCONIUM
|
|
452
|
+
T1546.008,Accessibility Features,Persistence|Privilege Escalation,APT29|APT3|APT41|Axiom|Deep Panda|Fox Kitten
|
|
453
|
+
T1546.007,Netsh Helper DLL,Persistence|Privilege Escalation,no
|
|
454
|
+
T1546.006,LC_LOAD_DYLIB Addition,Persistence|Privilege Escalation,no
|
|
455
|
+
T1546.005,Trap,Persistence|Privilege Escalation,no
|
|
456
|
+
T1546.004,Unix Shell Configuration Modification,Persistence|Privilege Escalation,no
|
|
457
|
+
T1546.003,Windows Management Instrumentation Event Subscription,Persistence|Privilege Escalation,APT29|APT33|Blue Mockingbird|FIN8|HEXANE|Leviathan|Metador|Mustang Panda|Rancor|Turla
|
|
458
|
+
T1546.002,Screensaver,Persistence|Privilege Escalation,no
|
|
459
|
+
T1546.001,Change Default File Association,Persistence|Privilege Escalation,Kimsuky
|
|
460
|
+
T1547.001,Registry Run Keys / Startup Folder,Persistence|Privilege Escalation,APT18|APT19|APT28|APT29|APT3|APT32|APT33|APT37|APT39|APT41|BRONZE BUTLER|Cobalt Group|Confucius|Dark Caracal|Darkhotel|Dragonfly|FIN10|FIN13|FIN6|FIN7|Gamaredon Group|Gorgon Group|Higaisa|Inception|Ke3chang|Kimsuky|Lazarus Group|LazyScripter|Leviathan|LuminousMoth|Magic Hound|Molerats|MuddyWater|Mustang Panda|Naikon|PROMETHIUM|Patchwork|Putter Panda|RTM|Rocke|Sidewinder|Silence|TA2541|TeamTNT|Threat Group-3390|Tropic Trooper|Turla|Windshift|Wizard Spider|ZIRCONIUM
|
|
461
|
+
T1218.002,Control Panel,Defense Evasion,Ember Bear
|
|
462
|
+
T1218.010,Regsvr32,Defense Evasion,APT19|APT32|Blue Mockingbird|Cobalt Group|Deep Panda|Inception|Kimsuky|Leviathan|TA551|WIRTE
|
|
463
|
+
T1218.009,Regsvcs/Regasm,Defense Evasion,no
|
|
464
|
+
T1218.005,Mshta,Defense Evasion,APT29|APT32|Confucius|Earth Lusca|FIN7|Gamaredon Group|Inception|Kimsuky|Lazarus Group|LazyScripter|MuddyWater|Mustang Panda|SideCopy|Sidewinder|TA2541|TA551
|
|
465
|
+
T1218.004,InstallUtil,Defense Evasion,Mustang Panda|menuPass
|
|
466
|
+
T1218.001,Compiled HTML File,Defense Evasion,APT38|APT41|Dark Caracal|OilRig|Silence
|
|
467
|
+
T1218.003,CMSTP,Defense Evasion,Cobalt Group|MuddyWater
|
|
468
|
+
T1218.011,Rundll32,Defense Evasion,APT19|APT28|APT3|APT32|APT38|APT41|Blue Mockingbird|Carbanak|CopyKittens|FIN7|Gamaredon Group|HAFNIUM|Kimsuky|Lazarus Group|LazyScripter|Magic Hound|MuddyWater|Sandworm Team|TA505|TA551|Wizard Spider
|
|
469
|
+
T1547,Boot or Logon Autostart Execution,Persistence|Privilege Escalation,no
|
|
470
|
+
T1546,Event Triggered Execution,Persistence|Privilege Escalation,no
|
|
471
|
+
T1098.003,Additional Cloud Roles,Persistence|Privilege Escalation,LAPSUS$|Scattered Spider
|
|
472
|
+
T1098.002,Additional Email Delegate Permissions,Persistence|Privilege Escalation,APT28|APT29|Magic Hound
|
|
473
|
+
T1098.001,Additional Cloud Credentials,Persistence|Privilege Escalation,no
|
|
474
|
+
T1543.004,Launch Daemon,Persistence|Privilege Escalation,no
|
|
475
|
+
T1543.003,Windows Service,Persistence|Privilege Escalation,APT19|APT3|APT32|APT38|APT41|Blue Mockingbird|Carbanak|Cinnamon Tempest|Cobalt Group|DarkVishnya|Earth Lusca|FIN7|Ke3chang|Kimsuky|Lazarus Group|PROMETHIUM|TeamTNT|Threat Group-3390|Tropic Trooper|Wizard Spider
|
|
476
|
+
T1543.002,Systemd Service,Persistence|Privilege Escalation,Rocke|TeamTNT
|
|
477
|
+
T1543.001,Launch Agent,Persistence|Privilege Escalation,no
|
|
478
|
+
T1037.005,Startup Items,Persistence|Privilege Escalation,no
|
|
479
|
+
T1037.004,RC Scripts,Persistence|Privilege Escalation,APT29
|
|
480
|
+
T1055.012,Process Hollowing,Defense Evasion|Privilege Escalation,Gorgon Group|Kimsuky|Patchwork|TA2541|Threat Group-3390|menuPass
|
|
481
|
+
T1055.013,Process Doppelgänging,Defense Evasion|Privilege Escalation,Leafminer
|
|
482
|
+
T1055.011,Extra Window Memory Injection,Defense Evasion|Privilege Escalation,no
|
|
483
|
+
T1055.014,VDSO Hijacking,Defense Evasion|Privilege Escalation,no
|
|
484
|
+
T1055.009,Proc Memory,Defense Evasion|Privilege Escalation,no
|
|
485
|
+
T1055.008,Ptrace System Calls,Defense Evasion|Privilege Escalation,no
|
|
486
|
+
T1055.005,Thread Local Storage,Defense Evasion|Privilege Escalation,no
|
|
487
|
+
T1055.004,Asynchronous Procedure Call,Defense Evasion|Privilege Escalation,FIN8
|
|
488
|
+
T1055.003,Thread Execution Hijacking,Defense Evasion|Privilege Escalation,no
|
|
489
|
+
T1055.002,Portable Executable Injection,Defense Evasion|Privilege Escalation,Gorgon Group|Rocke
|
|
490
|
+
T1055.001,Dynamic-link Library Injection,Defense Evasion|Privilege Escalation,BackdoorDiplomacy|Lazarus Group|Leviathan|Malteiro|Putter Panda|TA505|Tropic Trooper|Turla|Wizard Spider
|
|
491
|
+
T1037.003,Network Logon Script,Persistence|Privilege Escalation,no
|
|
492
|
+
T1543,Create or Modify System Process,Persistence|Privilege Escalation,no
|
|
493
|
+
T1037.002,Login Hook,Persistence|Privilege Escalation,no
|
|
494
|
+
T1037.001,Logon Script (Windows),Persistence|Privilege Escalation,APT28|Cobalt Group
|
|
495
|
+
T1542.003,Bootkit,Defense Evasion|Persistence,APT28|APT41|Lazarus Group
|
|
496
|
+
T1542.002,Component Firmware,Defense Evasion|Persistence,Equation
|
|
497
|
+
T1542.001,System Firmware,Defense Evasion|Persistence,no
|
|
498
|
+
T1505.003,Web Shell,Persistence,APT28|APT29|APT32|APT38|APT39|APT5|BackdoorDiplomacy|Deep Panda|Dragonfly|FIN13|Fox Kitten|GALLIUM|HAFNIUM|Kimsuky|Leviathan|Magic Hound|Moses Staff|OilRig|Sandworm Team|Threat Group-3390|Tonto Team|Tropic Trooper|Volatile Cedar|Volt Typhoon
|
|
499
|
+
T1505.002,Transport Agent,Persistence,no
|
|
500
|
+
T1505.001,SQL Stored Procedures,Persistence,no
|
|
501
|
+
T1053.003,Cron,Execution|Persistence|Privilege Escalation,APT38|APT5|Rocke
|
|
502
|
+
T1053.005,Scheduled Task,Execution|Persistence|Privilege Escalation,APT-C-36|APT29|APT3|APT32|APT33|APT37|APT38|APT39|APT41|BITTER|BRONZE BUTLER|Blue Mockingbird|Chimera|Cobalt Group|Confucius|Dragonfly|FIN10|FIN13|FIN6|FIN7|FIN8|Fox Kitten|GALLIUM|Gamaredon Group|HEXANE|Higaisa|Kimsuky|Lazarus Group|LuminousMoth|Machete|Magic Hound|Molerats|MuddyWater|Mustang Panda|Naikon|OilRig|Patchwork|Rancor|Silence|Stealth Falcon|TA2541|ToddyCat|Wizard Spider|menuPass
|
|
503
|
+
T1053.002,At,Execution|Persistence|Privilege Escalation,APT18|BRONZE BUTLER|Threat Group-3390
|
|
504
|
+
T1542,Pre-OS Boot,Defense Evasion|Persistence,no
|
|
505
|
+
T1137.001,Office Template Macros,Persistence,MuddyWater
|
|
506
|
+
T1137.004,Outlook Home Page,Persistence,OilRig
|
|
507
|
+
T1137.003,Outlook Forms,Persistence,no
|
|
508
|
+
T1137.005,Outlook Rules,Persistence,no
|
|
509
|
+
T1137.006,Add-ins,Persistence,Naikon
|
|
510
|
+
T1137.002,Office Test,Persistence,APT28
|
|
511
|
+
T1531,Account Access Removal,Impact,Akira|LAPSUS$
|
|
512
|
+
T1539,Steal Web Session Cookie,Credential Access,Evilnum|LuminousMoth|Sandworm Team|Scattered Spider
|
|
513
|
+
T1529,System Shutdown/Reboot,Impact,APT37|APT38|Lazarus Group
|
|
514
|
+
T1518,Software Discovery,Discovery,BRONZE BUTLER|HEXANE|Inception|MuddyWater|Mustang Panda|SideCopy|Sidewinder|Tropic Trooper|Volt Typhoon|Windigo|Windshift|Wizard Spider
|
|
515
|
+
T1547.013,XDG Autostart Entries,Persistence|Privilege Escalation,no
|
|
516
|
+
T1534,Internal Spearphishing,Lateral Movement,Gamaredon Group|HEXANE|Kimsuky|Leviathan
|
|
517
|
+
T1528,Steal Application Access Token,Credential Access,APT28|APT29
|
|
518
|
+
T1535,Unused/Unsupported Cloud Regions,Defense Evasion,no
|
|
519
|
+
T1525,Implant Internal Image,Persistence,no
|
|
520
|
+
T1538,Cloud Service Dashboard,Discovery,Scattered Spider
|
|
521
|
+
T1530,Data from Cloud Storage,Collection,Fox Kitten|Scattered Spider
|
|
522
|
+
T1578,Modify Cloud Compute Infrastructure,Defense Evasion,no
|
|
523
|
+
T1537,Transfer Data to Cloud Account,Exfiltration,no
|
|
524
|
+
T1526,Cloud Service Discovery,Discovery,no
|
|
525
|
+
T1505,Server Software Component,Persistence,no
|
|
526
|
+
T1499,Endpoint Denial of Service,Impact,Sandworm Team
|
|
527
|
+
T1497,Virtualization/Sandbox Evasion,Defense Evasion|Discovery,Darkhotel
|
|
528
|
+
T1498,Network Denial of Service,Impact,APT28
|
|
529
|
+
T1496,Resource Hijacking,Impact,APT41|Blue Mockingbird|Rocke|TeamTNT
|
|
530
|
+
T1495,Firmware Corruption,Impact,no
|
|
531
|
+
T1491,Defacement,Impact,no
|
|
532
|
+
T1490,Inhibit System Recovery,Impact,Wizard Spider
|
|
533
|
+
T1489,Service Stop,Impact,Indrik Spider|LAPSUS$|Lazarus Group|Wizard Spider
|
|
534
|
+
T1486,Data Encrypted for Impact,Impact,APT38|APT41|Akira|FIN7|FIN8|Indrik Spider|Magic Hound|Sandworm Team|Scattered Spider|TA505
|
|
535
|
+
T1485,Data Destruction,Impact,APT38|Gamaredon Group|LAPSUS$|Lazarus Group|Sandworm Team
|
|
536
|
+
T1484,Domain or Tenant Policy Modification,Defense Evasion|Privilege Escalation,no
|
|
537
|
+
T1482,Domain Trust Discovery,Discovery,Akira|Chimera|Earth Lusca|FIN8|Magic Hound
|
|
538
|
+
T1480,Execution Guardrails,Defense Evasion,no
|
|
539
|
+
T1222,File and Directory Permissions Modification,Defense Evasion,no
|
|
540
|
+
T1220,XSL Script Processing,Defense Evasion,Cobalt Group|Higaisa
|
|
541
|
+
T1221,Template Injection,Defense Evasion,APT28|Confucius|DarkHydrus|Dragonfly|Gamaredon Group|Inception|Tropic Trooper
|
|
542
|
+
T1190,Exploit Public-Facing Application,Initial Access,APT28|APT29|APT39|APT41|APT5|Axiom|BackdoorDiplomacy|BlackTech|Blue Mockingbird|Cinnamon Tempest|Dragonfly|Earth Lusca|FIN13|FIN7|Fox Kitten|GALLIUM|GOLD SOUTHFIELD|HAFNIUM|Ke3chang|Kimsuky|Magic Hound|Moses Staff|MuddyWater|Rocke|Sandworm Team|Threat Group-3390|ToddyCat|Volatile Cedar|Volt Typhoon|menuPass
|
|
543
|
+
T1213,Data from Information Repositories,Collection,APT28|FIN6|Fox Kitten|LAPSUS$|Sandworm Team|Turla
|
|
544
|
+
T1202,Indirect Command Execution,Defense Evasion,Lazarus Group
|
|
545
|
+
T1207,Rogue Domain Controller,Defense Evasion,no
|
|
546
|
+
T1212,Exploitation for Credential Access,Credential Access,no
|
|
547
|
+
T1201,Password Policy Discovery,Discovery,Chimera|OilRig|Turla
|
|
548
|
+
T1197,BITS Jobs,Defense Evasion|Persistence,APT39|APT41|Leviathan|Patchwork|Wizard Spider
|
|
549
|
+
T1189,Drive-by Compromise,Initial Access,APT19|APT28|APT32|APT37|APT38|Andariel|Axiom|BRONZE BUTLER|Dark Caracal|Darkhotel|Dragonfly|Earth Lusca|Elderwood|Lazarus Group|Leafminer|Leviathan|Machete|Magic Hound|Mustard Tempest|PLATINUM|PROMETHIUM|Patchwork|RTM|Threat Group-3390|Transparent Tribe|Turla|Windigo|Windshift
|
|
550
|
+
T1218,System Binary Proxy Execution,Defense Evasion,Lazarus Group
|
|
551
|
+
T1210,Exploitation of Remote Services,Lateral Movement,APT28|Dragonfly|Earth Lusca|FIN7|Fox Kitten|MuddyWater|Threat Group-3390|Tonto Team|Wizard Spider|menuPass
|
|
552
|
+
T1203,Exploitation for Client Execution,Execution,APT12|APT28|APT29|APT3|APT32|APT33|APT37|APT41|Andariel|Aoqin Dragon|Axiom|BITTER|BRONZE BUTLER|BlackTech|Cobalt Group|Confucius|Darkhotel|Dragonfly|EXOTIC LILY|Elderwood|Ember Bear|Higaisa|Inception|Lazarus Group|Leviathan|MuddyWater|Mustang Panda|Patchwork|Sandworm Team|Sidewinder|TA459|The White Company|Threat Group-3390|Tonto Team|Transparent Tribe|Tropic Trooper|admin@338
|
|
553
|
+
T1211,Exploitation for Defense Evasion,Defense Evasion,APT28
|
|
554
|
+
T1216,System Script Proxy Execution,Defense Evasion,no
|
|
555
|
+
T1195,Supply Chain Compromise,Initial Access,no
|
|
556
|
+
T1219,Remote Access Software,Command And Control,Akira|Carbanak|Cobalt Group|DarkVishnya|Evilnum|FIN7|GOLD SOUTHFIELD|Kimsuky|MuddyWater|Mustang Panda|RTM|Sandworm Team|Scattered Spider|TeamTNT|Thrip
|
|
557
|
+
T1205,Traffic Signaling,Command And Control|Defense Evasion|Persistence,no
|
|
558
|
+
T1204,User Execution,Execution,LAPSUS$|Scattered Spider
|
|
559
|
+
T1199,Trusted Relationship,Initial Access,APT28|APT29|GOLD SOUTHFIELD|LAPSUS$|POLONIUM|Sandworm Team|Threat Group-3390|menuPass
|
|
560
|
+
T1217,Browser Information Discovery,Discovery,APT38|Chimera|Fox Kitten|Scattered Spider
|
|
561
|
+
T1200,Hardware Additions,Initial Access,DarkVishnya
|
|
562
|
+
T1176,Browser Extensions,Persistence,Kimsuky
|
|
563
|
+
T1185,Browser Session Hijacking,Collection,no
|
|
564
|
+
T1187,Forced Authentication,Credential Access,DarkHydrus|Dragonfly
|
|
565
|
+
T1137,Office Application Startup,Persistence,APT32|Gamaredon Group
|
|
566
|
+
T1140,Deobfuscate/Decode Files or Information,Defense Evasion,APT19|APT28|APT39|BRONZE BUTLER|Cinnamon Tempest|Darkhotel|Earth Lusca|FIN13|Gamaredon Group|Gorgon Group|Higaisa|Ke3chang|Kimsuky|Lazarus Group|Leviathan|Malteiro|Molerats|MuddyWater|OilRig|Rocke|Sandworm Team|TA505|TeamTNT|Threat Group-3390|Tropic Trooper|Turla|WIRTE|ZIRCONIUM|menuPass
|
|
567
|
+
T1136,Create Account,Persistence,Indrik Spider|Scattered Spider
|
|
568
|
+
T1135,Network Share Discovery,Discovery,APT1|APT32|APT38|APT39|APT41|Chimera|DarkVishnya|Dragonfly|FIN13|Sowbug|Tonto Team|Tropic Trooper|Wizard Spider
|
|
569
|
+
T1134,Access Token Manipulation,Defense Evasion|Privilege Escalation,Blue Mockingbird|FIN6
|
|
570
|
+
T1133,External Remote Services,Initial Access|Persistence,APT18|APT28|APT29|APT41|Akira|Chimera|Dragonfly|FIN13|FIN5|GALLIUM|GOLD SOUTHFIELD|Ke3chang|Kimsuky|LAPSUS$|Leviathan|OilRig|Sandworm Team|Scattered Spider|TeamTNT|Threat Group-3390|Wizard Spider
|
|
571
|
+
T1132,Data Encoding,Command And Control,no
|
|
572
|
+
T1129,Shared Modules,Execution,no
|
|
573
|
+
T1127,Trusted Developer Utilities Proxy Execution,Defense Evasion,no
|
|
574
|
+
T1125,Video Capture,Collection,FIN7|Silence
|
|
575
|
+
T1124,System Time Discovery,Discovery,BRONZE BUTLER|Chimera|Darkhotel|Higaisa|Lazarus Group|Sidewinder|The White Company|Turla|ZIRCONIUM
|
|
576
|
+
T1123,Audio Capture,Collection,APT37
|
|
577
|
+
T1120,Peripheral Device Discovery,Discovery,APT28|APT37|BackdoorDiplomacy|Equation|Gamaredon Group|OilRig|TeamTNT|Turla
|
|
578
|
+
T1119,Automated Collection,Collection,APT1|APT28|Chimera|Confucius|FIN5|FIN6|Gamaredon Group|Ke3chang|Mustang Panda|OilRig|Patchwork|Sidewinder|Threat Group-3390|Tropic Trooper|menuPass
|
|
579
|
+
T1115,Clipboard Data,Collection,APT38|APT39
|
|
580
|
+
T1114,Email Collection,Collection,Magic Hound|Silent Librarian
|
|
581
|
+
T1113,Screen Capture,Collection,APT28|APT39|BRONZE BUTLER|Dark Caracal|Dragonfly|FIN7|GOLD SOUTHFIELD|Gamaredon Group|Group5|Magic Hound|MoustachedBouncer|MuddyWater|OilRig|Silence
|
|
582
|
+
T1112,Modify Registry,Defense Evasion,APT19|APT32|APT38|APT41|Blue Mockingbird|Dragonfly|Earth Lusca|Ember Bear|FIN8|Gamaredon Group|Gorgon Group|Kimsuky|LuminousMoth|Magic Hound|Patchwork|Silence|TA505|Threat Group-3390|Turla|Wizard Spider
|
|
583
|
+
T1111,Multi-Factor Authentication Interception,Credential Access,Chimera|Kimsuky|LAPSUS$
|
|
584
|
+
T1110,Brute Force,Credential Access,APT28|APT38|APT39|DarkVishnya|Dragonfly|FIN5|Fox Kitten|HEXANE|OilRig|Turla
|
|
585
|
+
T1106,Native API,Execution,APT37|APT38|BlackTech|Chimera|Gamaredon Group|Gorgon Group|Higaisa|Lazarus Group|SideCopy|Silence|TA505|ToddyCat|Tropic Trooper|Turla|menuPass
|
|
586
|
+
T1105,Ingress Tool Transfer,Command And Control,APT-C-36|APT18|APT28|APT29|APT3|APT32|APT33|APT37|APT38|APT39|APT41|Ajax Security Team|Andariel|Aquatic Panda|BITTER|BRONZE BUTLER|BackdoorDiplomacy|Chimera|Cinnamon Tempest|Cobalt Group|Confucius|Darkhotel|Dragonfly|Elderwood|Ember Bear|Evilnum|FIN13|FIN7|FIN8|Fox Kitten|GALLIUM|Gamaredon Group|Gorgon Group|HAFNIUM|HEXANE|IndigoZebra|Indrik Spider|Ke3chang|Kimsuky|Lazarus Group|LazyScripter|Leviathan|LuminousMoth|Magic Hound|Metador|Molerats|Moses Staff|MuddyWater|Mustang Panda|Mustard Tempest|Nomadic Octopus|OilRig|PLATINUM|Patchwork|Rancor|Rocke|Sandworm Team|SideCopy|Sidewinder|Silence|TA2541|TA505|TA551|TeamTNT|Threat Group-3390|Tonto Team|Tropic Trooper|Turla|Volatile Cedar|WIRTE|Whitefly|Windshift|Winnti Group|Wizard Spider|ZIRCONIUM|menuPass
|
|
587
|
+
T1104,Multi-Stage Channels,Command And Control,APT3|APT41|Lazarus Group|MuddyWater
|
|
588
|
+
T1102,Web Service,Command And Control,APT32|EXOTIC LILY|Ember Bear|FIN6|FIN8|Fox Kitten|Gamaredon Group|Inception|LazyScripter|Mustang Panda|Rocke|TeamTNT|Turla
|
|
589
|
+
T1098,Account Manipulation,Persistence|Privilege Escalation,APT3|APT41|APT5|Dragonfly|FIN13|HAFNIUM|Kimsuky|Lazarus Group|Magic Hound
|
|
590
|
+
T1095,Non-Application Layer Protocol,Command And Control,APT3|BITTER|BackdoorDiplomacy|FIN6|HAFNIUM|Metador|PLATINUM|ToddyCat
|
|
591
|
+
T1092,Communication Through Removable Media,Command And Control,APT28
|
|
592
|
+
T1091,Replication Through Removable Media,Initial Access|Lateral Movement,APT28|Aoqin Dragon|Darkhotel|FIN7|LuminousMoth|Mustang Panda|Tropic Trooper
|
|
593
|
+
T1090,Proxy,Command And Control,APT41|Blue Mockingbird|Cinnamon Tempest|CopyKittens|Earth Lusca|Fox Kitten|LAPSUS$|Magic Hound|MoustachedBouncer|POLONIUM|Sandworm Team|Turla|Volt Typhoon|Windigo
|
|
594
|
+
T1087,Account Discovery,Discovery,FIN13
|
|
595
|
+
T1083,File and Directory Discovery,Discovery,APT18|APT28|APT3|APT32|APT38|APT39|APT41|APT5|Aoqin Dragon|BRONZE BUTLER|Chimera|Confucius|Dark Caracal|Darkhotel|Dragonfly|FIN13|Fox Kitten|Gamaredon Group|HAFNIUM|Inception|Ke3chang|Kimsuky|Lazarus Group|Leafminer|LuminousMoth|Magic Hound|MuddyWater|Mustang Panda|Patchwork|Sandworm Team|Scattered Spider|Sidewinder|Sowbug|TeamTNT|ToddyCat|Tropic Trooper|Turla|Windigo|Winnti Group|admin@338|menuPass
|
|
596
|
+
T1082,System Information Discovery,Discovery,APT18|APT19|APT3|APT32|APT37|APT38|APT41|Aquatic Panda|Blue Mockingbird|Chimera|Confucius|Darkhotel|FIN13|FIN8|Gamaredon Group|HEXANE|Higaisa|Inception|Ke3chang|Kimsuky|Lazarus Group|Magic Hound|Malteiro|Moses Staff|MuddyWater|Mustang Panda|Mustard Tempest|OilRig|Patchwork|Rocke|Sandworm Team|SideCopy|Sidewinder|Sowbug|Stealth Falcon|TA2541|TeamTNT|ToddyCat|Tropic Trooper|Turla|Volt Typhoon|Windigo|Windshift|Wizard Spider|ZIRCONIUM|admin@338
|
|
597
|
+
T1080,Taint Shared Content,Lateral Movement,BRONZE BUTLER|Cinnamon Tempest|Darkhotel|Gamaredon Group
|
|
598
|
+
T1078,Valid Accounts,Defense Evasion|Initial Access|Persistence|Privilege Escalation,APT18|APT28|APT29|APT33|APT39|APT41|Akira|Axiom|Carbanak|Chimera|Cinnamon Tempest|Dragonfly|FIN10|FIN4|FIN5|FIN6|FIN7|FIN8|Fox Kitten|GALLIUM|Ke3chang|LAPSUS$|Lazarus Group|Leviathan|OilRig|POLONIUM|PittyTiger|Sandworm Team|Silence|Silent Librarian|Suckfly|Threat Group-3390|Wizard Spider|menuPass
|
|
599
|
+
T1074,Data Staged,Collection,Scattered Spider|Volt Typhoon|Wizard Spider
|
|
600
|
+
T1072,Software Deployment Tools,Execution|Lateral Movement,APT32|Sandworm Team|Silence|Threat Group-1314
|
|
601
|
+
T1071,Application Layer Protocol,Command And Control,Magic Hound|Rocke|TeamTNT
|
|
602
|
+
T1070,Indicator Removal,Defense Evasion,APT5|Lazarus Group
|
|
603
|
+
T1069,Permission Groups Discovery,Discovery,APT3|APT41|FIN13|TA505
|
|
604
|
+
T1068,Exploitation for Privilege Escalation,Privilege Escalation,APT28|APT29|APT32|APT33|BITTER|Cobalt Group|FIN6|FIN8|LAPSUS$|MoustachedBouncer|PLATINUM|Scattered Spider|Threat Group-3390|Tonto Team|Turla|Whitefly|ZIRCONIUM
|
|
605
|
+
T1059,Command and Scripting Interpreter,Execution,APT19|APT32|APT37|APT39|Dragonfly|FIN5|FIN6|FIN7|Fox Kitten|Ke3chang|OilRig|Stealth Falcon|Whitefly|Windigo
|
|
606
|
+
T1057,Process Discovery,Discovery,APT1|APT28|APT3|APT37|APT38|APT5|Andariel|Chimera|Darkhotel|Deep Panda|Earth Lusca|Gamaredon Group|HAFNIUM|HEXANE|Higaisa|Inception|Ke3chang|Kimsuky|Lazarus Group|Magic Hound|Molerats|MuddyWater|Mustang Panda|OilRig|Poseidon Group|Rocke|Sidewinder|Stealth Falcon|TeamTNT|ToddyCat|Tropic Trooper|Turla|Volt Typhoon|Windshift|Winnti Group
|
|
607
|
+
T1056,Input Capture,Collection|Credential Access,APT39
|
|
608
|
+
T1055,Process Injection,Defense Evasion|Privilege Escalation,APT32|APT37|APT41|APT5|Cobalt Group|Kimsuky|PLATINUM|Silence|TA2541|Turla|Wizard Spider
|
|
609
|
+
T1053,Scheduled Task/Job,Execution|Persistence|Privilege Escalation,Earth Lusca
|
|
610
|
+
T1052,Exfiltration Over Physical Medium,Exfiltration,no
|
|
611
|
+
T1049,System Network Connections Discovery,Discovery,APT1|APT3|APT32|APT38|APT41|APT5|Andariel|BackdoorDiplomacy|Chimera|Earth Lusca|FIN13|GALLIUM|HEXANE|Ke3chang|Lazarus Group|Magic Hound|MuddyWater|Mustang Panda|OilRig|Poseidon Group|Sandworm Team|TeamTNT|Threat Group-3390|ToddyCat|Tropic Trooper|Turla|Volt Typhoon|admin@338|menuPass
|
|
612
|
+
T1048,Exfiltration Over Alternative Protocol,Exfiltration,TeamTNT
|
|
613
|
+
T1047,Windows Management Instrumentation,Execution,APT29|APT32|APT41|Blue Mockingbird|Chimera|Cinnamon Tempest|Deep Panda|Earth Lusca|FIN13|FIN6|FIN7|FIN8|GALLIUM|Gamaredon Group|Indrik Spider|Lazarus Group|Leviathan|Magic Hound|MuddyWater|Mustang Panda|Naikon|OilRig|Sandworm Team|Stealth Falcon|TA2541|Threat Group-3390|ToddyCat|Volt Typhoon|Windshift|Wizard Spider|menuPass
|
|
614
|
+
T1046,Network Service Discovery,Discovery,APT32|APT39|APT41|BackdoorDiplomacy|BlackTech|Chimera|Cobalt Group|DarkVishnya|FIN13|FIN6|Fox Kitten|Lazarus Group|Leafminer|Magic Hound|Naikon|OilRig|Rocke|Suckfly|TeamTNT|Threat Group-3390|Tropic Trooper|menuPass
|
|
615
|
+
T1041,Exfiltration Over C2 Channel,Exfiltration,APT3|APT32|APT39|Chimera|Confucius|GALLIUM|Gamaredon Group|Higaisa|Ke3chang|Kimsuky|Lazarus Group|Leviathan|LuminousMoth|MuddyWater|Sandworm Team|Stealth Falcon|Wizard Spider|ZIRCONIUM
|
|
616
|
+
T1040,Network Sniffing,Credential Access|Discovery,APT28|APT33|DarkVishnya|Kimsuky|Sandworm Team
|
|
617
|
+
T1039,Data from Network Shared Drive,Collection,APT28|BRONZE BUTLER|Chimera|Fox Kitten|Gamaredon Group|Sowbug|menuPass
|
|
618
|
+
T1037,Boot or Logon Initialization Scripts,Persistence|Privilege Escalation,APT29|Rocke
|
|
619
|
+
T1036,Masquerading,Defense Evasion,APT28|APT32|BRONZE BUTLER|Dragonfly|FIN13|LazyScripter|Nomadic Octopus|OilRig|PLATINUM|Sandworm Team|TA551|TeamTNT|Windshift|ZIRCONIUM|menuPass
|
|
620
|
+
T1033,System Owner/User Discovery,Discovery,APT19|APT3|APT32|APT37|APT38|APT39|APT41|Chimera|Dragonfly|Earth Lusca|FIN10|FIN7|FIN8|GALLIUM|Gamaredon Group|HAFNIUM|HEXANE|Ke3chang|Lazarus Group|LuminousMoth|Magic Hound|MuddyWater|OilRig|Patchwork|Sandworm Team|Sidewinder|Stealth Falcon|Threat Group-3390|Tropic Trooper|Volt Typhoon|Windshift|Wizard Spider|ZIRCONIUM
|
|
621
|
+
T1030,Data Transfer Size Limits,Exfiltration,APT28|APT41|LuminousMoth|Threat Group-3390
|
|
622
|
+
T1029,Scheduled Transfer,Exfiltration,Higaisa
|
|
623
|
+
T1027,Obfuscated Files or Information,Defense Evasion,APT-C-36|APT3|APT37|APT41|BackdoorDiplomacy|BlackOasis|Earth Lusca|Ember Bear|GALLIUM|Gallmaker|Gamaredon Group|Ke3chang|Kimsuky|Mustang Panda|Rocke|Sandworm Team|Windshift
|
|
624
|
+
T1025,Data from Removable Media,Collection,APT28|Gamaredon Group|Turla
|
|
625
|
+
T1021,Remote Services,Lateral Movement,Wizard Spider
|
|
626
|
+
T1020,Automated Exfiltration,Exfiltration,Gamaredon Group|Ke3chang|Sidewinder|Tropic Trooper
|
|
627
|
+
T1018,Remote System Discovery,Discovery,APT3|APT32|APT39|Akira|BRONZE BUTLER|Chimera|Deep Panda|Dragonfly|Earth Lusca|FIN5|FIN6|FIN8|Fox Kitten|GALLIUM|HAFNIUM|HEXANE|Indrik Spider|Ke3chang|Leafminer|Magic Hound|Naikon|Rocke|Sandworm Team|Scattered Spider|Silence|Threat Group-3390|ToddyCat|Turla|Volt Typhoon|Wizard Spider|menuPass
|
|
628
|
+
T1016,System Network Configuration Discovery,Discovery,APT1|APT19|APT3|APT32|APT41|Chimera|Darkhotel|Dragonfly|Earth Lusca|FIN13|GALLIUM|HAFNIUM|HEXANE|Higaisa|Ke3chang|Kimsuky|Lazarus Group|Magic Hound|Moses Staff|MuddyWater|Mustang Panda|Naikon|OilRig|SideCopy|Sidewinder|Stealth Falcon|TeamTNT|Threat Group-3390|Tropic Trooper|Turla|Volt Typhoon|Wizard Spider|ZIRCONIUM|admin@338|menuPass
|
|
629
|
+
T1014,Rootkit,Defense Evasion,APT28|APT41|Rocke|TeamTNT|Winnti Group
|
|
630
|
+
T1012,Query Registry,Discovery,APT32|APT39|APT41|Chimera|Dragonfly|Fox Kitten|Kimsuky|Lazarus Group|OilRig|Stealth Falcon|Threat Group-3390|Turla|Volt Typhoon|ZIRCONIUM
|
|
631
|
+
T1011,Exfiltration Over Other Network Medium,Exfiltration,no
|
|
632
|
+
T1010,Application Window Discovery,Discovery,HEXANE|Lazarus Group
|
|
633
|
+
T1008,Fallback Channels,Command And Control,APT41|FIN7|Lazarus Group|OilRig
|
|
634
|
+
T1007,System Service Discovery,Discovery,APT1|Aquatic Panda|BRONZE BUTLER|Chimera|Earth Lusca|Indrik Spider|Ke3chang|Kimsuky|OilRig|Poseidon Group|TeamTNT|Turla|admin@338
|
|
635
|
+
T1006,Direct Volume Access,Defense Evasion,Scattered Spider
|
|
636
|
+
T1005,Data from Local System,Collection,APT1|APT28|APT29|APT3|APT37|APT38|APT39|APT41|Andariel|Axiom|BRONZE BUTLER|CURIUM|Dark Caracal|Dragonfly|FIN13|FIN6|FIN7|Fox Kitten|GALLIUM|Gamaredon Group|HAFNIUM|Inception|Ke3chang|Kimsuky|LAPSUS$|Lazarus Group|LuminousMoth|Magic Hound|Patchwork|Sandworm Team|Stealth Falcon|Threat Group-3390|ToddyCat|Turla|Volt Typhoon|Windigo|Wizard Spider|menuPass
|
|
637
|
+
T1003,OS Credential Dumping,Credential Access,APT28|APT32|APT39|Axiom|Leviathan|Poseidon Group|Sowbug|Suckfly|Tonto Team
|
|
638
|
+
T1001,Data Obfuscation,Command And Control,no
|