text1
stringlengths
7
2.5k
labels
stringlengths
9
100
Stuxnet uses HTTP to communicate with a command and control server.
['T1071.001']
Sys10 uses HTTP for C2.
['T1071.001']
TA551 has used HTTP for C2 communications.
['T1071.001']
TSCookie can multiple protocols including HTTP and HTTPS in communication with command and control (C2) servers.
['T1071.001']
Taidoor has used HTTP GET and POST requests for C2.
['T1071.001']
The "Uploader" variant of HAMMERTOSS visits a hard-coded server over HTTP/S to download the images HAMMERTOSS uses to receive commands.
['T1071.001']
The Komplex C2 channel uses HTTP POST requests.
['T1071.001']
The Regin malware platform supports many standard protocols, including HTTP and HTTPS.
['T1071.001']
ThiefQuest uploads files via unencrypted HTTP.
['T1071.001']
Threat Group-3390 malware has used HTTP for C2.
['T1071.001']
TinyTurla can use HTTPS in C2 communications.
['T1071.001']
Tomiris can use HTTP to establish C2 communications.
['T1071.001']
Torisma can use HTTP and HTTPS for C2 communications.
['T1071.001']
TrickBot uses HTTPS to communicate with its C2 servers, to get malware updates, modules that perform most of the malware logic and various configuration files.
['T1071.001']
Turian has the ability to use HTTP for its C2.
['T1071.001']
Turla has used HTTP and HTTPS for C2 communications.
['T1071.001']
UBoatRAT has used HTTP for C2 communications.
['T1071.001']
UNC2452 used HTTP for C2 and data exfiltration.
['T1071.001']
UPPERCUT has used HTTP for C2, including sending error codes in Cookie headers.
['T1071.001']
Ursnif has used HTTPS for C2.
['T1071.001']
VBShower has attempted to obtain a VBS script from command and control (C2) nodes over HTTP.
['T1071.001']
VERMIN uses HTTP for C2 communications.
['T1071.001']
VaporRage can use HTTP to download shellcode from compromised websites.
['T1071.001']
Various implementations of CHOPSTICK communicate with C2 over HTTP.
['T1071.001']
Vasport creates a backdoor by making a connection using a HTTP POST.
['T1071.001']
WellMess can use HTTP and HTTPS in C2 communications.
['T1071.001']
WinMM uses HTTP for C2.
['T1071.001']
WindTail has the ability to use HTTP for C2 communications.
['T1071.001']
Windshift has used tools that communicate with C2 over HTTP.
['T1071.001']
Winnti for Linux has used HTTP in outbound communications.
['T1071.001']
Winnti for Windows has the ability to use encapsulated HTTP/S in C2 communications.
['T1071.001']
Wizard Spider has used HTTP for network communications.
['T1071.001']
Xbash uses HTTP for C2 communications.
['T1071.001']
YAHOYAH uses HTTP for C2.
['T1071.001']
ZLib communicates over HTTP for C2.
['T1071.001']
ZeroT has used HTTP for C2.
['T1071.001']
Zeus Panda uses HTTP for C2 communications.
['T1071.001']
ZxShell has used HTTP for C2 connections.
['T1071.001']
httpclient uses HTTP for command and control.
['T1071.001']
pngdowner uses HTTP for command and control.
['T1071.001']
xCaon has communicated with the C2 server by sending POST requests over HTTP.
['T1071.001']
CARROTBALL has the ability to use FTP in C2 communications.
['T1071.002']
During Operation Honeybee, the threat actors had the ability to use FTP for C2.
['T1071.002']
JPIN can communicate over FTP.
['T1071.002']
Kimsuky has used FTP to download additional malware to the target machine.
['T1071.002']
Machete malware used FTP for C2.
['T1071.002']
Machete uses FTP for Command & Control.
['T1071.002']
NOKKI has used FTP for C2 communications.
['T1071.002']
SYSCON has the ability to use FTP in C2 communications.
['T1071.002']
ShadowPad has used FTP for C2 communications.
['T1071.002']
SilverTerrier uses FTP for C2 communications.
['T1071.002']
XAgentOSX contains the ftpUpload function to use the FTPManager:uploadFile method to upload files from the target system.
['T1071.002']
ZxShell has used FTP for C2 connections.
['T1071.002']
A SUGARDUMP variant used SMTP for C2.
['T1071.003']
APT28 has used IMAP, POP3, and SMTP for a communication channel in various implants, including using self-registered Google Mail accounts and later compromised email servers of its victims.
['T1071.003']
APT32 has used email for C2 via an Office macro.
['T1071.003']
Agent Tesla has used SMTP for C2 communications.
['T1071.003']
BadPatch uses SMTP for C2.
['T1071.003']
CORESHELL can communicate over SMTP and POP3 for C2.
['T1071.003']
Cannon uses SMTP/S and POP3/S for C2 communications by sending and receiving emails.
['T1071.003']
JPIN can send email over SMTP.
['T1071.003']
LightNeuron uses SMTP for C2.
['T1071.003']
NavRAT uses the email platform, Naver, for C2 communications, leveraging SMTP.
['T1071.003']
OLDBAIT can use SMTP for C2.
['T1071.003']
RDAT can use email attachments for C2 communications.
['T1071.003']
Remsec is capable of using SMTP for C2.
['T1071.003']
SilverTerrier uses SMTP for C2 communications.
['T1071.003']
Turla has used multiple backdoors which communicate with a C2 server via email attachments.
['T1071.003']
Various implementations of CHOPSTICK communicate with C2 over SMTP and POP3.
['T1071.003']
Zebrocy uses SMTP and POP3 for C2.
['T1071.003']
APT18 uses DNS for C2 communications.
['T1071.004']
APT39 has used remote access tools that leverage DNS in communications with C2.
['T1071.004']
APT41 used DNS for C2 communications.
['T1071.004']
BONDUPDATER can use DNS and TXT records within its DNS tunneling protocol for command and control.
['T1071.004']
Chimera has used Cobalt Strike to encapsulate C2 in DNS traffic.
['T1071.004']
Cobalt Group has used DNS tunneling for C2.
['T1071.004']
Cobalt Strike can use a custom command and control protocol that can be encapsulated in DNS. All protocols use their standard assigned ports.
['T1071.004']
Cobalt Strike uses a custom command and control protocol that can encapsulated in DNS. All protocols use their standard assigned ports.
['T1071.004']
Cobian RAT uses DNS for C2.
['T1071.004']
DanBot can use use IPv4 A records and IPv6 AAAA DNS records in C2 communications.
['T1071.004']
Denis has used DNS tunneling for C2 communications.
['T1071.004']
DnsSystem can direct queries to custom DNS servers and return C2 commands using TXT records.
['T1071.004']
Ebury has used DNS requests over UDP port 53 for C2.
['T1071.004']
Gelsemium has the ability to use DNS in communication with C2.
['T1071.004']
Goopy has the ability to communicate with its C2 over DNS.
['T1071.004']
HTTPBrowser has used DNS for command and control.
['T1071.004']
Helminth can use DNS for C2.
['T1071.004']
Heyoka Backdoor can use DNS tunneling for C2 communications.
['T1071.004']
InvisiMole has used a custom implementation of DNS tunneling to embed C2 communications in DNS requests and replies.
['T1071.004']
Ke3chang malware RoyalDNS has used DNS for C2.
['T1071.004']
LazyScripter has leveraged dynamic DNS providers for C2 communications.
['T1071.004']
Matryoshka uses DNS for C2.
['T1071.004']
Mythic supports DNS-based C2 profiles.
['T1071.004']
NanHaiShu uses DNS for the C2 communications.
['T1071.004']
OilRig has used DNS for C2 including the publicly available "requestbin.net" tunneling service.
['T1071.004']
POWRUNER can use DNS for C2 communications.
['T1071.004']
Pisloader uses DNS as its C2 protocol.
['T1071.004']
RDAT has used DNS to communicate with the C2.
['T1071.004']
Remsec is capable of using DNS for C2.
['T1071.004']
SOUNDBITE communicates via DNS for C2.
['T1071.004']