text1
stringlengths
7
2.5k
labels
stringlengths
9
100
Leafminer has obtained and used tools such as LaZagne, Mimikatz, PsExec, and MailSniper.
['T1588.002']
Moses Staff has used the commercial tool DiskCryptor.
['T1588.002']
MuddyWater has made use of legitimate tools ConnectWise and Remote Utilities to gain access to target environment.
['T1588.002']
Night Dragon has obtained and used tools such as gsecdump.
['T1588.002']
POLONIUM has obtained and used tools such as AirVPN and plink in their operations.
['T1588.002']
PittyTiger has obtained and used tools such as Mimikatz and gsecdump.
['T1588.002']
Sandworm Team has acquired open-source tools for some of it's operations; for example it acquired Invoke-PSImage to establish an encrypted channel from a compromised host to Sandworm Team's C2 server as part of its preparation for the 2018 Winter Olympics attack.
['T1588.002']
Silent Librarian has obtained free and publicly available tools including SingleFile and HTTrack to copy login pages of targeted organizations.
['T1588.002']
TA505 has used a variety of tools in their operations, including AdFind, BloodHound, Mimikatz, and PowerSploit.
['T1588.002']
TEMP.Veles has obtained and used tools such as Mimikatz and PsExec.
['T1588.002']
Threat Group-3390 has obtained and used tools such as Impacket, pwdump, Mimikatz, gsecdump, NBTscan, and Windows Credential Editor.
['T1588.002']
Turla has obtained and customized publicly-available tools like Mimikatz.
['T1588.002']
WIRTE has obtained and used Empire for post-exploitation activities.
['T1588.002']
Whitefly has obtained and used tools such as Mimikatz.
['T1588.002']
Wizard Spider has obtained and used publicly-available post-exploitation frameworks and tools like Metasploit, Empire, Mimikatz.
['T1588.002']
menuPass has used and modified open-source tools like Impacket, Mimikatz, and pwdump.
['T1588.002']
Ember Bear has stolen legitimate certificates to sign malicious payloads.
['T1588.003']
Lazarus Group has used code signing certificates issued by Sectigo RSA for some of its malware and tools.
['T1588.003']
MegaCortex has used code signing certificates issued to fake companies to bypass security controls.
['T1588.003']
Wizard Spider obtained a code signing certificate signed by Digicert for some of its malware.
['T1588.003']
BlackTech has used valid, stolen digital certificates for some of their malware and tools.
['T1588.004']
Kimsuky has obtained exploit code for various CVEs.
['T1588.005']
In 2017, Sandworm Team conducted technical research related to vulnerabilities associated with websites used by the Korean Sport and Olympic Committee, a Korean power company, and a Korean airport.
['T1588.006']
APT32 has conducted targeted surveillance against activists and bloggers.
['T1589']
HEXANE has identified specific potential victims at targeted organizations.
['T1589']
LAPSUS$ has gathered detailed information of target employees to enhance their social engineering lures.
['T1589']
APT28 has harvested user's login credentials.
['T1589.001']
APT29 has conducted credential theft operations to obtain credentials to be used for access to victim environments.
['T1589.001']
Chimera has collected credentials for the target organization from previous breaches for use in brute force attacks.
['T1589.001']
LAPSUS$ has gathered user identities and credentials to gain initial access to a victim's organization; the group has also called an organization's help desk to reset a target's credentials.
['T1589.001']
Magic Hound gathered credentials from two victims that they then attempted to validate across 75 different websites.
['T1589.001']
AADInternals can check for the existence of user email addresses using public Microsoft APIs.
['T1589.002']
APT32 has collected e-mail addresses for activists and bloggers in order to target them with spyware.
['T1589.002']
EXOTIC LILY has gathered targeted individuals' e-mail addresses through open source research and website contact forms.
['T1589.002']
HEXANE has targeted executives, human resources staff, and IT personnel for spearphishing.
['T1589.002']
Kimsuky has collected valid email addresses that were subsequently used in spearphishing campaigns.
['T1589.002']
Lazarus Group collected email addresses belonging to various departments of a targeted organization which were used in follow-on phishing campaigns.
['T1589.002']
Sandworm Team has obtained valid emails addresses while conducting research against target organizations that were subsequently used in spearphishing campaigns.
['T1589.002']
Silent Librarian has collected e-mail addresses from targeted organizations from open Internet searches.
['T1589.002']
Sandworm Team's research of potential victim organizations included the identification and collection of employee information.
['T1589.003']
Silent Librarian has collected lists of names for individuals from targeted organizations.
['T1589.003']
AADInternals can gather information about a tenant’s domains using public Microsoft APIs.
['T1590.001']
Sandworm Team conducted technical reconnaissance of the Parliament of Georgia's official internet domain prior to its 2019 attack.
['T1590.001']
Andariel has limited its watering hole attacks to specific IP address ranges.
['T1590.005']
Lazarus Group has studied publicly available information about a targeted organization to tailor spearphishing efforts against specific departments and/or individuals.
['T1591']
Dragonfly has collected open source information to identify relationships between organizations for targeting purposes.
['T1591.002']
LAPSUS$ has gathered detailed knowledge of an organization's supply chain relationships.
['T1591.002']
HEXANE has identified executives, HR, and IT staff at victim organizations for further targeting.
['T1591.004']
LAPSUS$ has gathered detailed knowledge of team structures within a target organization.
['T1591.004']
Lazarus Group has targeted specific individuals within an organization with tailored job vacancy announcements.
['T1591.004']
Andariel has inserted a malicious script within compromised websites to collect potential victim information such as browser type, system language, Flash Player version, and other data.
['T1592.002']
Sandworm Team has researched software code to enable supply-chain operations, most notably for the 2017 NotPetya attack. Sandworm Team also collected a list of computers using specific software as part of its targeting efforts.
['T1592.002']
HAFNIUM has interacted with Office 365 tenants to gather details regarding target's environments.
['T1592.004']
EXOTIC LILY has copied data from social media sites to impersonate targeted individuals.
['T1593.001']
Kimsuky has used Twitter to monitor potential victims and to prepare targeted phishing e-mails.
['T1593.001']
Lazarus Group has used LinkedIn to identify and target specific employees within a chosen organization.
['T1593.001']
Kimsuky has searched for vulnerabilities, tools, and geopolitical trends on Google to target victims.
['T1593.002']
LAPSUS$ has searched public code repositories for exposed credentials.
['T1593.003']
EXOTIC LILY has used contact forms on victim websites to generate phishing e-mails.
['T1594']
Kimsuky has searched for information on the target company's website.
['T1594']
Sandworm Team has conducted research against potential victim websites as part of its operational planning.
['T1594']
TeamTNT has scanned specific lists of target IP addresses.
['T1595.001']
APT28 has performed large-scale scans in an attempt to find vulnerable servers.
['T1595.002']
APT29 has conducted widespread scanning of target environments to identify vulnerabilities for exploit.
['T1595.002']
Earth Lusca has scanned for vulnerabilities in the public-facing servers of their targets.
['T1595.002']
Magic Hound has conducted widespread scanning to identify public-facing systems vulnerable to Log4j (CVE-2021-44228).
['T1595.002']
Sandworm Team has scanned network infrastructure for vulnerabilities as part of its operational planning.
['T1595.002']
TeamTNT has scanned for vulnerabilities in IoT devices and other related resources such as the Docker API.
['T1595.002']
Volatile Cedar has used DirBuster and GoBuster to brute force web directories and DNS subdomains.
['T1595.003']
EXOTIC LILY has searched for information on targeted individuals on business databases including RocketReach and CrunchBase.
['T1597']
LAPSUS$ has purchased credentials and session tokens from criminal underground forums.
['T1597.002']
APT28 has used spearphishing to compromise credentials.
['T1598']
ZIRCONIUM targeted presidential campaign staffers with credential phishing e-mails.
['T1598']
Astaroth has been delivered via malicious e-mail attachments.
['T1598.002']
Dragonfly has used spearphishing with Microsoft Office attachments to enable harvesting of user credentials.
['T1598.002']
Sidewinder has sent e-mails with malicious attachments that lead victims to credential harvesting websites.
['T1598.002']
AADInternals can send phishing emails containing malicious links designed to collect users’ credentials.
['T1598.003']
APT28 has conducted credential phishing campaigns with embedded links to attacker-controlled domains.
['T1598.003']
APT32 has used malicious links to direct users to web pages designed to harvest credentials.
['T1598.003']
Dragonfly has used spearphishing with PDF attachments containing malicious links that redirected to credential harvesting websites.
['T1598.003']
Kimsuky has used links in e-mail to steal account information.
['T1598.003']
Magic Hound has used SMS and email messages with links designed to steal credentials.
['T1598.003']
SMOKEDHAM has been delivered via malicious links in phishing emails.
['T1598.003']
Sandworm Team has crafted spearphishing emails with hyperlinks designed to trick unwitting recipients into revealing their account credentials.
['T1598.003']
Sidewinder has sent e-mails with malicious links to credential harvesting websites.
['T1598.003']
Silent Librarian has used links in e-mails to direct victims to credential harvesting websites designed to appear like the targeted organization's login page.
['T1598.003']
SYNful Knock is malware that is inserted into a network device by patching the operating system image.
['T1601.001']
APT29 has bypassed MFA set on OWA accounts by generating a cookie value from a previously stolen secret key.
['T1606.001']
AADInternals can be used to create SAML tokens using the AD Federated Services token signing certificate.
['T1606.002']
APT29 created tokens using compromised SAML signing certificates.
['T1606.002']
UNC2452 created tokens using compromised SAML signing certificates.
['T1606.002']
Mustang Panda has used servers under their control to validate tracking pixels sent to phishing victims.
['T1608']
APT32 has hosted malicious payloads in Dropbox, Amazon S3, and Google Drive for use during targeting.
['T1608.001']
BITTER has registered domains to stage payloads.
['T1608.001']
During Night Dragon, threat actors uploaded commonly available hacker tools to compromised web servers.
['T1608.001']
EXOTIC LILY has uploaded malicious payloads to file-sharing services including TransferNow, TransferXL, WeTransfer, and OneDrive.
['T1608.001']
Earth Lusca has staged malware and malicious files on compromised web servers, GitHub, and Google Drive.
['T1608.001']
For C0011, Transparent Tribe hosted malicious documents on domains registered by the group.
['T1608.001']
For Operation Sharpshooter, the threat actors staged malicious files on Dropbox and other websites.
['T1608.001']
For Operation Spalax, the threat actors staged malware and malicious files in legitimate hosting services such as OneDrive or MediaFire.
['T1608.001']