text1
stringlengths
7
2.5k
labels
stringlengths
9
100
FIN4 has lured victims to click malicious links delivered via spearphishing emails (often sent from compromised accounts).
['T1204.001']
FIN7 has used malicious links to lure victims into downloading malware.
['T1204.001']
Grandoreiro has used malicious links to gain execution on victim machines.
['T1204.001']
Hancitor has relied upon users clicking on a malicious link delivered through phishing.
['T1204.001']
Javali has achieved execution through victims clicking links to malicious websites.
['T1204.001']
KOCTOPUS has relied on victims clicking on a malicious link delivered via email.
['T1204.001']
Kerrdown has gained execution through victims opening malicious links.
['T1204.001']
Kimsuky has lured victims into clicking malicious links.
['T1204.001']
Lazarus Group has sent spearphishing emails in an attempt to lure users to click on a malicious link.
['T1204.001']
LazyScripter has relied upon users clicking on links to malicious files.
['T1204.001']
Leviathan has sent spearphishing email links attempting to get a user to click.
['T1204.001']
Magic Hound has attempted to lure victims into opening malicious links embedded in emails.
['T1204.001']
Melcoz has gained execution through victims opening malicious links.
['T1204.001']
Mofang's spearphishing emails required a user to click the link to connect to a compromised website.
['T1204.001']
MuddyWater has distributed URLs in phishing e-mails that link to lure documents.
['T1204.001']
Mustang Panda has sent malicious links including links directing victims to a Google Drive folder.
['T1204.001']
NETWIRE has been executed through convincing victims into clicking malicious links.
['T1204.001']
ObliqueRAT has gained execution on targeted systems through luring users to click on links to malicious URLs.
['T1204.001']
OilRig has delivered malicious links to achieve execution on the target system.
['T1204.001']
OutSteel has relied on a user to click a malicious link within a spearphishing email.
['T1204.001']
PLEAD has been executed via malicious links in e-mails.
['T1204.001']
QakBot has gained execution through users opening malicious links.
['T1204.001']
SMOKEDHAM has relied upon users clicking on a malicious link delivered through phishing.
['T1204.001']
Sandworm Team has tricked unwitting recipients into clicking on malicious hyperlinks within emails crafted to resemble trustworthy senders.
['T1204.001']
Sidewinder has lured targets to click on malicious links to gain execution in the target environment.
['T1204.001']
SpicyOmelette has been executed through malicious links within spearphishing emails.
['T1204.001']
Squirrelwaffle has relied on victims to click on a malicious link send via phishing campaigns.
['T1204.001']
TSCookie has been executed via malicious links embedded in e-mails spoofing the Ministries of Education, Culture, Sports, Science and Technology of Japan.
['T1204.001']
Transparent Tribe has directed users to open URLs hosting malicious content.
['T1204.001']
Turla has used spearphishing via a link to get users to download and run their malware.
['T1204.001']
Windshift has used links embedded in e-mails to lure victims into executing malicious code.
['T1204.001']
Wizard Spider has lured victims into clicking a malicious link delivered through spearphishing.
['T1204.001']
ZIRCONIUM has used malicious links in e-mails to lure victims into downloading malware.
['T1204.001']
A Word document delivering TYPEFRAME prompts the user to enable macro execution.
['T1204.002']
APT-C-36 has prompted victims to accept macros in order to execute the subsequent payload.
['T1204.002']
APT28 attempted to get users to click on Microsoft Office attachments containing malicious macro scripts.
['T1204.002']
APT29 has used various forms of spearphishing attempting to get a user to open attachments, including, but not limited to, malicious Microsoft Word documents, .pdf, and .lnk files.
['T1204.002']
APT30 has relied on users to execute malicious file attachments delivered via spearphishing emails.
['T1204.002']
APT32 has attempted to lure users to execute a malicious dropper delivered via a spearphishing attachment.
['T1204.002']
APT37 has sent spearphishing attachments attempting to get a user to open them.
['T1204.002']
APT39 has sent spearphishing emails in an attempt to lure users to click on a malicious attachment.
['T1204.002']
Ajax Security Team has lured victims into executing malicious files.
['T1204.002']
Aoqin Dragon has lured victims into opening weaponized documents, fake external drives, and fake antivirus to execute malicious payloads.
['T1204.002']
AppleJeus has required user execution of a malicious MSI installer.
['T1204.002']
AppleSeed can achieve execution through users running malicious file attachments distributed via email.
['T1204.002']
Astaroth has used malicious files including VBS, LNK, and HTML for execution.
['T1204.002']
BITTER has attempted to lure victims into opening malicious attachments delivered via spearphishing.
['T1204.002']
BLINDINGCAN has lured victims into executing malicious macros embedded within Microsoft Office documents.
['T1204.002']
BRONZE BUTLER has attempted to get users to launch malicious Microsoft Word attachments delivered via spearphishing emails.
['T1204.002']
Bad Rabbit has been executed through user installation of an executable disguised as a flash installer.
['T1204.002']
Bisonal has relied on users to execute malicious file attachments delivered via spearphishing emails.
['T1204.002']
BlackTech has used e-mails with malicious documents to lure victims into installing malware.
['T1204.002']
BoomBox has gained execution through user interaction with a malicious file.
['T1204.002']
Bumblebee has relied upon a user opening an ISO file to enable execution of malicious shortcut files and DLLs.
['T1204.002']
Bundlore has attempted to get users to execute a malicious .app file that looks like a Flash Player update.
['T1204.002']
CARROTBALL has been executed through users being lured into opening malicious e-mail attachments.
['T1204.002']
CSPY Downloader has been delivered via malicious documents with embedded macros.
['T1204.002']
Clambling has gained execution through luring victims into opening malicious files.
['T1204.002']
Cobalt Group has sent emails containing malicious attachments that require users to execute a file or macro to infect the victim machine.
['T1204.002']
DanBot has relied on victims' opening a malicious file for initial execution.
['T1204.002']
Dark Caracal makes their malware look like Flash Player, Office, or PDF documents in order to entice a user to click on it.
['T1204.002']
DnsSystem has lured victims into opening macro-enabled Word documents for execution.
['T1204.002']
Dragonfly has used various forms of spearphishing in attempts to get users to open malicious attachments.
['T1204.002']
During C0011, Transparent Tribe relied on a student target to open a malicious document delivered via email.
['T1204.002']
During Operation Dust Storm, the threat actors relied on potential victims to open a malicious Microsoft Word document sent via email.
['T1204.002']
During Operation Sharpshooter, the threat actors relied on victims executing malicious Microsoft Word or PDF files.
['T1204.002']
During Operation Spalax, the threat actors relied on a victim to open a PDF document and click on an embedded malicious link to download malware.
['T1204.002']
EXOTIC LILY has gained execution through victims clicking on malicious LNK files contained within ISO files, which can execute hidden DLLs within the ISO.
['T1204.002']
Earth Lusca required users to click on a malicious file for the loader to activate.
['T1204.002']
Elderwood has leveraged multiple types of spearphishing in order to attempt to get a user to open attachments.
['T1204.002']
Ember Bear has attempted to lure victims into executing malicious files.
['T1204.002']
Emotet has relied upon users clicking on a malicious attachment delivered through spearphishing.
['T1204.002']
FIN4 has lured victims to launch malicious attachments delivered via spearphishing emails (often sent from compromised accounts).
['T1204.002']
FIN7 lured victims to double-click on images in the attachments they sent which would then execute the hidden LNK file.
['T1204.002']
FIN8 has used malicious e-mail attachments to lure victims into executing malware.
['T1204.002']
Ferocious Kitten has attempted to convince victims to enable malicious content within a spearphishing email by including an odd decoy message.
['T1204.002']
Frankenstein has used trojanized Microsoft Word documents sent via email, which prompted the victim to enable macros.
['T1204.002']
Gallmaker sent victims a lure document with a warning that asked victims to “enable content” for execution.
['T1204.002']
Gamaredon Group has attempted to get users to click on Office attachments with malicious macros embedded.
['T1204.002']
Gorgon Group attempted to get users to launch malicious Microsoft Office attachments delivered via spearphishing emails.
['T1204.002']
Grandoreiro has infected victims via malicious attachments.
['T1204.002']
IcedID has been executed through Word documents with malicious embedded macros.
['T1204.002']
InvisiMole can deliver trojanized versions of software and documents, relying on user execution.
['T1204.002']
JCry has achieved execution by luring users to click on a file that appeared to be an Adobe Flash Player update installer.
['T1204.002']
Javali has achieved execution through victims opening malicious attachments, including MSI files with embedded VBScript.
['T1204.002']
KONNI has relied on a victim to enable malicious macros within an attachment delivered via email.
['T1204.002']
Kerrdown has gained execution through victims opening malicious files.
['T1204.002']
Kimsuky has used attempted to lure victims into opening malicious e-mail attachments.
['T1204.002']
Leviathan has sent spearphishing attachments attempting to get a user to click.
['T1204.002']
Lokibot has tricked recipients into enabling malicious macros by getting victims to click "enable content" in email attachments.
['T1204.002']
Magic Hound has attempted to lure victims into opening malicious email attachments.
['T1204.002']
Magic Hound has lured victims into executing malicious files.
['T1204.002']
Metamorfo requires the user to double-click the executable to run the malicious HTA file or to download a malicious installer.
['T1204.002']
Mofang's malicious spearphishing attachments required a user to open the file after receiving.
['T1204.002']
Molerats has sent malicious files via email that tricked users into clicking Enable Content to run an embedded macro and to download malicious archives.
['T1204.002']
Mongall has relied on a user opening a malicious document for execution.
['T1204.002']
MuddyWater has attempted to get users to enable macros and launch malicious Microsoft Word documents delivered via spearphishing emails.
['T1204.002']
Mustang Panda has sent malicious files requiring direct victim interaction to execute.
['T1204.002']
NETWIRE has been executed through luring victims into opening malicious documents.
['T1204.002']
Naikon has convinced victims to open malicious attachments to execute malware.
['T1204.002']