text
stringlengths
104
2.24k
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Zeus Panda can take screenshots of the victim’s machine.### Assistant: T1113: Screen Capture
### Human:Find the techniques and ID from MITRE ATT&CK framework.,LockerGoga has encrypted files, including core Windows OS files, using RSA-OAEP MGF1 and then demanded Bitcoin be paid for the decryption key.### Assistant: T1486: Data Encrypted for Impact
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may buy, steal, or download exploits that can be used during targeting.### Assistant: T1588: Obtain Capabilities
### Human:Find the techniques and ID from MITRE ATT&CK framework.,njRAT can launch a command shell interface for executing commands.### Assistant: T1059: Command and Scripting Interpreter
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Wizard Spider has exploited or attempted to exploit Zerologon and EternalBlue vulnerabilities.### Assistant: T1210: Exploitation of Remote Services
### Human:Find the techniques and ID from MITRE ATT&CK framework.,ROKRAT captures screenshots of the infected system using the gdi32 library.### Assistant: T1113: Screen Capture
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Trojan.Karagany can communicate with C2 via HTTP POST requests.### Assistant: T1071: Application Layer Protocol
### Human:Find the techniques and ID from MITRE ATT&CK framework.,APT38 has used brute force techniques to attempt account access when passwords are unknown or when password hashes are unavailable.### Assistant: T1110: Brute Force
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The purchase of code signing certificates may be done using a front organization or using information stolen from a previously compromised entity that allows the adversary to validate to a certificate provider as that entity.### Assistant: T1588: Obtain Capabilities
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Zebrocy also runs the systeminfo command to gather system information.### Assistant: T1082: System Information Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,With this technique, the user's web browser is typically targeted for exploitation, but adversaries may also use compromised websites for non-exploitation behavior such as acquiring Application Access Token.### Assistant: T1189: Drive-by Compromise
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Turla surveys a system upon check-in to discover Group Policy details using the gpresult command.### Assistant: T1615: Group Policy Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,This shortcut file points to the path of the previously written ‘winhelp.cpl’ file### Assistant: T1547: Boot or Logon Autostart Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,An exploit takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer hardware or software.### Assistant: T1587: Develop Capabilities
### Human:Find the techniques and ID from MITRE ATT&CK framework.,This user action will typically be observed as follow-on behavior from Spearphishing Attachment.### Assistant: T1204: User Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Figure 15: Structure used to send data to server Figure 16: Structure used to send data to C2 server The structure is converted to Base64 using the CryptBinaryToStringA function### Assistant: T1048: Exfiltration Over Alternative Protocol
### Human:Find the techniques and ID from MITRE ATT&CK framework.,BRONZE BUTLER has made use of Python-based remote access tools.### Assistant: T1059: Command and Scripting Interpreter
### Human:Find the techniques and ID from MITRE ATT&CK framework.,SideTwist has primarily used port 443 for C2 but can use port 80 as a fallback.### Assistant: T1008: Fallback Channels
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Leviathan relies on web shells for an initial foothold as well as persistence into the victim's systems.### Assistant: T1505: Server Software Component
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Wizard Spider has used networkdll for network discovery and psfin specifically for financial and point of sale indicators.### Assistant: T1018: Remote System Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Babuk has the ability to unpack itself into memory using XOR.### Assistant: T1140: Deobfuscate/Decode Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,By utilizing target-specific values to decrypt the payload the adversary can avoid packaging the decryption key with the payload or sending it over a potentially monitored network connection.### Assistant: T1480: Execution Guardrails
### Human:Find the techniques and ID from MITRE ATT&CK framework.,In one instance we observed, one of the initial malware delivered to the victim, RATANKBA (TROJ_RATANKBA.A), connects to a legitimate but compromised website (eye-watch[.]in:443, a mobile application-selling site) from which a hack tool (nbt_scan.exe) is also downloaded### Assistant: T1036: Masquerading
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Grandoreiro can delete .LNK files created in the Startup folder.### Assistant: T1070: Indicator Removal on Host
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Windows uses access tokens to determine the ownership of a running process.### Assistant: T1134: Access Token Manipulation
### Human:Find the techniques and ID from MITRE ATT&CK framework.,MoonWind can delete itself or specified files.### Assistant: T1070: Indicator Removal on Host
### Human:Find the techniques and ID from MITRE ATT&CK framework.,ThiefQuest exfiltrates targeted file extensions in the /Users/ folder to the command and control server via unencrypted HTTP.### Assistant: T1041: Exfiltration Over C2 Channel
### Human:Find the techniques and ID from MITRE ATT&CK framework.,the PowerShell is executed using reflectively loaded ReflectivePicker from the Empire project### Assistant: T1546: Event Triggered Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Malware may possibly utilize this memory location in part of an attack chain that includes writing code to shared sections of the process’s memory, placing a pointer to the code in EWM, then invoking execution by returning execution control to the address in the process’s EWM.### Assistant: T1055: Process Injection
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Cobian RAT uses DNS for C2.### Assistant: T1071: Application Layer Protocol
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Calisto has the capability to use rm -rf to remove folders and files from the victim's machine.### Assistant: T1070: Indicator Removal on Host
### Human:Find the techniques and ID from MITRE ATT&CK framework.,KeyBoy has a command to launch a file browser or explorer on the system.### Assistant: T1083: File and Directory Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,SeaDuke is capable of uploading and downloading files.### Assistant: T1105: Ingress Tool Transfer
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may abuse specific file formats to subvert Mark-of-the-Web controls.### Assistant: T1553: Subvert Trust Controls
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may hijack a legitimate user's SSH session to move laterally within an environment.### Assistant: T1563: Remote Service Session Hijacking
### Human:Find the techniques and ID from MITRE ATT&CK framework.,RTM can obtain information about process integrity levels.### Assistant: T1057: Process Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Each OID identifies a variable that can be read or set and permits active management tasks, such as configuration changes, through remote modification of these variables.### Assistant: T1602: Data from Configuration Repository
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Tropic Trooper has deleted dropper files on an infected system using command scripts.### Assistant: T1070: Indicator Removal on Host
### Human:Find the techniques and ID from MITRE ATT&CK framework.,GrimAgent can collect data and files from a compromised host.### Assistant: T1005: Data from Local System
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Valak has been executed via Microsoft Word documents containing malicious macros.### Assistant: T1204: User Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,KONNI can delete files.### Assistant: T1070: Indicator Removal on Host
### Human:Find the techniques and ID from MITRE ATT&CK framework.,ADVSTORESHELL achieves persistence by adding itself to the HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Registry key.### Assistant: T1547: Boot or Logon Autostart Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The email address is associated with the Lebanese domain of a major global financial institution### Assistant: T1016: System Network Configuration Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Volgmer can gather information about TCP connection state.### Assistant: T1049: System Network Connections Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,This information may also reveal supply chains and shipment paths for the victim’s hardware and software resources.### Assistant: T1591: Gather Victim Org Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,What does the Poseidon Group do? What happens after a target machine is infected? Once the target’s machine is compromised, the attacker first enumerates all processes running in the system and all services### Assistant: T1057: Process Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may grant additional permission levels, such as ReadPermission or FullAccess, to maintain persistent access to an adversary-controlled email account.### Assistant: T1098: Account Manipulation
### Human:Find the techniques and ID from MITRE ATT&CK framework.,An adversary may guess login credentials without prior knowledge of system or environment passwords during an operation by using a list of common passwords.### Assistant: T1110: Brute Force
### Human:Find the techniques and ID from MITRE ATT&CK framework.,GrimAgent has sent data related to a compromise host over its C2 channel.### Assistant: T1041: Exfiltration Over C2 Channel
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Azorult can capture screenshots of the victim’s machines.### Assistant: T1113: Screen Capture
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Symantec determined a more accurate picture of Buckeye’s targets by looking at where Buckeye remained active on the network longer than a day, deployed additional tools, and spread onto multiple computers### Assistant: T1105: Ingress Tool Transfer
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may exfiltrate data to a cloud storage service rather than over their primary command and control channel.### Assistant: T1567: Exfiltration Over Web Service
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may compromise email accounts that can be used during targeting.### Assistant: T1586: Compromise Accounts
### Human:Find the techniques and ID from MITRE ATT&CK framework.,IcedID can query LDAP to identify additional users on the network to infect.### Assistant: T1087: Account Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,APT41 used certutil to download additional files.### Assistant: T1105: Ingress Tool Transfer
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Lucifer can identify the IP and port numbers for all remote connections from the compromised host.### Assistant: T1049: System Network Connections Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,BACKSPACE may collect information about running processes.### Assistant: T1057: Process Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,APT33 has lured users to click links to malicious HTML applications delivered via spearphishing emails.### Assistant: T1204: User Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The event logs can be cleared with the following utility commands: * wevtutil cl system * wevtutil cl application * wevtutil cl security These logs may also be cleared through other mechanisms, such as the event viewer GUI or PowerShell.### Assistant: T1070: Indicator Removal on Host
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The group has also leveraged default manufacturer's passwords to gain initial access to corporate networks via IoT devices such as a VOIP phone, printer, and video decoder.### Assistant: T1078: Valid Accounts
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may search private data from threat intelligence vendors for information that can be used during targeting.### Assistant: T1597: Search Closed Sources
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Astaroth can abuse alternate data streams to store content for malicious payloads.### Assistant: T1564: Hide Artifacts
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Sandworm Team has enumerated files on a compromised host.### Assistant: T1083: File and Directory Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,OilRig has used DNS for C2 including the publicly available requestbin.net tunneling service.### Assistant: T1071: Application Layer Protocol
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Uroburos uses a custom packer.### Assistant: T1027: Obfuscated Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Users must explicitly ask to show the hidden files either via a series of Graphical User Interface prompts or with command line switches .### Assistant: T1564: Hide Artifacts
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Turla has used WebDAV to upload stolen USB files to a cloud drive.### Assistant: T1567: Exfiltration Over Web Service
### Human:Find the techniques and ID from MITRE ATT&CK framework.,This file is usually found in the user's home directory under <user-home>/.ssh/authorized_keys.### Assistant: T1098: Account Manipulation
### Human:Find the techniques and ID from MITRE ATT&CK framework.,EWM injection is a method of executing arbitrary code in the address space of a separate live process.### Assistant: T1055: Process Injection
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Machete has used msiexec to install the Machete malware.### Assistant: T1218: Signed Binary Proxy Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The launcher module, obfuscated with the notorious Metasploit’s shikata_ga_nai encoder, is the same for all the droppers### Assistant: T1027: Obfuscated Files or Information
### Human:Find the techniques and ID from MITRE ATT&CK framework.,If the executing process is set to run at a specific time or during a certain event then this technique can also be used for persistence.### Assistant: T1574: Hijack Execution Flow
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may manipulate application software prior to receipt by a final consumer for the purpose of data or system compromise.### Assistant: T1195: Supply Chain Compromise
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Operation Wocao has used local account credentials found during the intrusion for lateral movement and privilege escalation.### Assistant: T1078: Valid Accounts
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The Deep Panda group is known to utilize WMI for lateral movement.### Assistant: T1047: Windows Management Instrumentation
### Human:Find the techniques and ID from MITRE ATT&CK framework.,On macOS systems the dscl -create command can be used to create a local account.### Assistant: T1136: Create Account
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Melcoz can monitor the clipboard for cryptocurrency addresses and change the intended address to one controlled by the adversary.### Assistant: T1565: Data Manipulation
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The emond binary at /sbin/emond will load any rules from the /etc/emond.d/rules/ directory and take action once an explicitly defined event takes place.### Assistant: T1546: Event Triggered Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Create a process by impersonating a logged-on user Getting a user token using WTSQueryUserToken### Assistant: T1134: Access Token Manipulation
### Human:Find the techniques and ID from MITRE ATT&CK framework.,InvisiMole can use Data Protection API to encrypt its components on the victim’s computer, to evade detection, and to make sure the payload can only be decrypted and loaded on one specific compromised computer.### Assistant: T1480: Execution Guardrails
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Epic uses the net view command on the victim’s machine.### Assistant: T1018: Remote System Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Egregor contains functionality to query the local/system time.### Assistant: T1124: System Time Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,This is done by limiting the protocol specified in the second parameter to LDAP://, vice the script: moniker which could be used to reference remote code via HTTP.### Assistant: T1216: Signed Script Proxy Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,These four were then all modified on the same date and time on October 13, 2018 08:21### Assistant: T1124: System Time Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Tropic Trooper has encrypted traffic with the C2 to prevent network detection.### Assistant: T1573: Encrypted Channel
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may abuse AppleScript to execute various behaviors, such as interacting with an open SSH connection, moving to remote machines, and even presenting users with fake dialog boxes.### Assistant: T1059: Command and Scripting Interpreter
### Human:Find the techniques and ID from MITRE ATT&CK framework.,If there is a version match between the _VBA_PROJECT stream and host MS Office application, the p-code will be executed, otherwise the benign VBA source code will be decompressed and recompiled to p-code, thus removing malicious p-code and potentially bypassing dynamic analysis.### Assistant: T1564: Hide Artifacts
### Human:Find the techniques and ID from MITRE ATT&CK framework.,FatDuke can copy files and directories from a compromised host.### Assistant: T1005: Data from Local System
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Lucifer can scan for open ports including TCP ports 135 and 1433.### Assistant: T1046: Network Service Scanning
### Human:Find the techniques and ID from MITRE ATT&CK framework.,FLIPSIDE is a simple proxy that creates an outbound RDP connection.### Assistant: T1090: Proxy
### Human:Find the techniques and ID from MITRE ATT&CK framework.,injects a malicious DLL into the IExplorer.exe process.### Assistant: T1055: Process Injection
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Business and government personnel who are traveling, especially in a foreign country, often rely on systems to conduct business other than those at their home office, and may be unfamiliar with threats posed while abroad### Assistant: T1083: File and Directory Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Plist files are used by macOS applications to store properties and configuration settings for applications and services.### Assistant: T1547: Boot or Logon Autostart Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Okrum can collect computer name, locale information, and information about the OS and architecture.### Assistant: T1082: System Information Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Kasidet creates a Registry Run key to establish persistence.### Assistant: T1547: Boot or Logon Autostart Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,An adversary can perform several methods to take advantage of built-in control mechanisms in order to escalate privileges on a system.### Assistant: T1548: Abuse Elevation Control Mechanism
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Chimera has used scheduled tasks to invoke Cobalt Strike including through batch script schtasks /create /ru "SYSTEM" /tn "update" /tr "cmd /c c:\windows\temp\update.bat" /sc once /f /st and to maintain persistence.### Assistant: T1053: Scheduled Task/Job
### Human:Find the techniques and ID from MITRE ATT&CK framework.,After compromising a victim, Poseidon Group discovers all running services.### Assistant: T1007: System Service Discovery
### Human:Find the techniques and ID from MITRE ATT&CK framework.,PROMETHIUM has used Registry run keys to establish persistence.### Assistant: T1547: Boot or Logon Autostart Execution
### Human:Find the techniques and ID from MITRE ATT&CK framework.,PoetRAT used TLS to encrypt communications over port 143 RTM used Port 44443 for its VNC module.### Assistant: T1571: Non-Standard Port